Issue briefs and reports - Atlantic Council https://www.atlanticcouncil.org/category/in-depth-research-reports/ Shaping the global future together Fri, 30 Jan 2026 20:30:24 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://www.atlanticcouncil.org/wp-content/uploads/2019/09/favicon-150x150.png Issue briefs and reports - Atlantic Council https://www.atlanticcouncil.org/category/in-depth-research-reports/ 32 32 The US needs a cybersecurity roadmap https://www.atlanticcouncil.org/in-depth-research-reports/report/the-us-needs-a-cybersecurity-roadmap/ Thu, 29 Jan 2026 20:24:20 +0000 https://www.atlanticcouncil.org/?p=901734 A national cybersecurity strategy will require an operational road map.

The post The US needs a cybersecurity roadmap appeared first on Atlantic Council.

]]>
A fundamental approach of the Trump administration is ensuring and enhancing the defense of the United States homeland. Border security has accordingly been prioritized, and a “Golden Dome” missile defense has been proposed. But equivalent to the challenges of the border and of missile defense is the defense of the information and operational technology systems upon which the national security, economy, and public safety of the United States depend. This report focuses on operations and its companion report focuses on technology and architectures; together they identify the challenges facing the United States and describe a proposed national cybersecurity strategy that encompasses key roles for government and for the private sector.

A national cybersecurity strategy will require an operational road map for offensive and defensive campaigning and significantly enhanced resilience for key critical infrastructures built upon the development and adoption of safe coding and the implementation of zero trust architectures. Establishment of such capabilities will provide the president and the national leadership with the necessary capabilities to deter and defeat nation-state and criminal activities in cyberspace.

About the authors

Franklin D. Kramer is a distinguished fellow and board director at the Atlantic Council. Kramer has served as a senior political appointee in two administrations, including as assistant secretary of defense for international security affairs.

Robert J. Butler serves as the Managing Director for Cyber Strategies LLC.

Melanie J. Teplinsky is a cyber law and policy expert with over thirty years of experience spanning the private sector, government, and academia. She is an adjunct professor at American University, Washington College of Law (WCL); a senior fellow in the Technology, Law and Security Program at WCL; and a faculty fellow at American University’s Internet Governance Laboratory.

related reading

Explore the programs

The Atlantic Council Technology Programs comprises five existing efforts—the Digital Forensic Research Lab (DFRLab), the GeoTech Center, the Cyber Statecraft Initiative, the Democracy + Tech Initiative, and the Capacity Building Initiative. These operations work together to address the geopolitical implications of technology and provide policymakers and global stakeholders necessary research, insights, and convenings to address challenges around global technology and ensure its responsible advancement.

The post The US needs a cybersecurity roadmap appeared first on Atlantic Council.

]]>
Congress has championed the Abraham Accords. Here’s how it can push them forward. https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/congress-has-championed-the-abraham-accords-heres-how-it-can-push-them-forward/ Thu, 29 Jan 2026 17:10:43 +0000 https://www.atlanticcouncil.org/?p=901541 This issue brief offers recommendations for Congress to reassert its leadership role in supporting the Abraham Accords.

The post Congress has championed the Abraham Accords. Here’s how it can push them forward. appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Congress has been the most consistent supporter of the Abraham Accords and should pass additional authorizations and appropriations to advance them.
  • Lawmakers should pursue legislation that bolsters US leadership on regional economic and trade cooperation, helping lay the groundwork for the Middle Eastern prosperity envisioned by the Abraham Accords.
  • Congressional actions should include restoring the Abraham Fund, mandating consistent trade delegations to the region, and providing targeted bilateral leadership through congressional delegations.

Introduction

Following a brief respite after a cease-fire between Israel and Hamas brokered by US President Donald Trump, and in the wake of the twelve-day war and US-backed strikes on Iran’s nuclear facilities, the Middle East appears once again to be sliding toward broader instability. Fractures among the Gulf states over Yemen’s future, growing instability inside Iran, and ongoing efforts to stabilize Syria are only some of the complex challenges confronting the region.

Despite these pressures, the Abraham Accords have endured, reinforcing their long-term significance. The United States—through both executive and congressional leadership—has continued to champion their success. Yet after Congress failed to reintroduce the Regional Integration Normalization Act (RINA) following the disgraceful exit of its former sponsor, Senator Bob Menendez, congressional engagement has largely become incremental and narrowly focused on defense relationships. This need not be the case.

In the summer of 2025, the Atlantic Council’s regional integration project—dedicated to strengthening cooperation between the United States, Israel, and Arab and Muslim countries—led its first-ever congressional delegation focused on the Abraham Accords to the Middle East amid the twelve-day war. Bipartisan engagement with Abraham Accords countries—then, as now—across areas such as interfaith dialogue, trade, and regional investment demonstrates that meaningful progress on normalization is possible, and may even accelerate, during turbulent times. This issue brief offers recommendations for Congress to reassert its leadership role in supporting the Abraham Accords and to expand the scope of US engagement on normalization and regional prosperity.

Advance regional prosperity through the Abraham Accords

Recommendation one: Expand business and commercial delegations supporting the economic integration of Abraham Accords countries. 

US trade missions are an essential bridge for US and foreign companies to connect and identify areas of mutual interest. Congress should consider requiring an annual US trade mission focused on a topic of high interest for regional integration, including travel to multiple Abraham Accords countries.

Following the signing of the Abraham Accords in 2020, then Treasury Secretary Steven Mnuchin led a trade delegation to Israel, Bahrain, and the United Arab Emirates (UAE) to support the “expanded economic cooperation” promised by the Accords and announced the Abraham Fund—a planned $3 billion fund designed to support private-sector-led development projects. However, lower-level but consistent missions are also crucial to facilitate regional economic integration and prosperity. In 2022, the US Department of Commerce’s International Trade Administration led two trade missions to the Middle East: one to Israel, Bahrain, and the UAE, engaging aerospace and defense industries, and a flagship “Trade Winds” mission to the UAE that included an optional visit to Israel or Morocco before the main event. While these missions succeeded in connecting US firms with regional industries, there have been fewer recent US-led trade missions supporting regional integration through multi-country engagement. Against this background, Congress should make regional integration a clear priority when it benefits US commercial interests and consider codifying support for the Abraham Accords.

Recommendation two: Expand Abraham Accord Caucus engagement on regional economic projects, including the India-Middle East-Europe Economic Corridor.

The India-Middle East-Europe Economic Corridor (IMEC) is a proposed transportation, energy, and digital corridor designed to provide more efficient and resilient infrastructure capable of meeting the needs of a changing global economy. It could serve as the backbone for regional integration while unlocking substantial economic incentives by leveraging the Middle East’s role as a bridge between Europe and Asia. If the United States can help shape IMEC development—setting standards for ports and digital infrastructure, identifying opportunities for US companies, and countering influence from Russia and China—it could effectively balance against China’s Belt and Road Initiative while reasserting US economic leadership in a critical region.

The Abraham Accords Caucus co-chairs and congressional committee leaders should organize regular briefings with both the administration and relevant private-sector stakeholders to explore how the United States can influence the development of IMEC and ensure opportunities for US companies. While Congress has advanced political and security integration initiatives, economic integration, which is foundational for regional peace and prosperity, has received less attention. IMEC and similar initiatives offer an opportunity for Congress to do more on this front. The Abraham Accords Caucuses should also establish staff-level working groups for frequent engagement on economic integration projects. Recent efforts by Representatives Brad Schneider (who joined the June congressional delegation) and Blake Moore to launch a House Abraham Accords Caucus trade working group offer excellent platforms for such briefings. Additionally, the Abraham Accords Caucus should coordinate with the US Department of Commerce to identify businesses and industries that could benefit from regional integration, generating district- and state-level connections that strengthen Middle East prosperity.

Recommendation three: Formally authorize and support the Abraham Fund and prioritize regional Abraham Accords projects for US International Development Finance Cooperation support.

After the signing of the Abraham Accords, the United States, Israel, and the UAE established a $3 billion fund to support private-sector investments and development initiatives advancing regional economic integration. Efforts by the US International Development Finance Cooperation (DFC) late in the first Trump administration attempted to energize the fund, including a call for proposals for projects in Morocco and a $50 million commitment from Uzbekistan. However, since a 2021 interagency review under then-US President Joe Biden, no public activity has been registered regarding the Abraham Fund.

In 2023, Congress signaled continued interest in supporting economic integration through Section 8 of the RINA, which would have authorized the creation of the “Abraham Accords, Negev Forum, and Regional Integration Opportunity Fund” with $105 million, enabling the US secretary of state to support interagency projects including the Abraham Fund. While this number was far lower than the Abraham Fund’s announced $3 billion, it demonstrated robust bipartisan support for US diplomatic leadership and the potential for a rigorous approach to leveraging development finance. Congress should build on the RINA example by authorizing and appropriating funds for regional economic integration projects while maintaining the current framework for special envoy leadership of the fund and clarifying the role of such an envoy in fund dispersal. By building on recent changes to DFC through the National Defense Authorization Act for Fiscal Year 2026 , Congress can advance the Abraham Fund in parallel with other new initiatives.

Institutionalize and expand US diplomatic leadership on the accords

Recommendation four: Allow exceptions for a dual-hatted Abraham Accords envoy.

Both the Biden and Trump administrations have demonstrated commitment to senior official engagement on expanding the Abraham Accords. Under Biden, this included the appointment of Dan Shapiro, former ambassador to Israel, as the first Abraham Accords envoy. In the National Defense Authorization Act for Fiscal Year 2024, Congress codified the role of Special Envoy for the Abraham Accords, Negev Forum, and Related Integration and Normalization Fora and Agreements. However, despite the creation of this new role, no one has been nominated to the Senate-confirmed position. Members of Congress have expressed interest in seeing the vacant slot filled, including in a widely signed letter in January 2025. One possible reason for the vacancy is that legislation codifying the role explicitly requires that the individual “. . . shall not be a dual-hatted official with other responsibilities,” which may have discouraged both the Biden and Trump administrations from making a nomination. While there is significant value in having a senior official dedicated to advancing the Abraham Accords, the reality is that the kinds of strategic economic, security, and diplomatic cooperation associated with the accords can overlap with existing portfolios within the US government. For example, Special Envoy Steve Witkoff engaged on the Abraham Accords, but this represents just one of his many priorities.

Congress should consider modifying this restriction, enabling more senior US officials with synergistic portfolios to fill the position. This would enable the administration to formally designate a “lead” for the accords, elevating their priority.

Recommendation five: Authorize the State Department to lead a new strategic multilateral forum reflecting US and regional priorities.

While the Negev Forum had a robust start in 2022, a new strategic approach is needed to operationalize the goals of the Abraham Accords. Congress should direct the State Department to develop an updated plan for a new multilateral forum that regularly brings together senior officials, advancing strategic US and regional priorities in energy, investment, and security—topics not fully covered by the Negev Forum. This forum should learn from the disruption that the Negev Forum has experienced over the past two years and adapt to evolving regional dynamics. Congress should consider constructs similar to previous regional integration legislation, such as the Deterring Enemy Forces and Enabling National Defense (DEFEND) Act and the Learning Integrated National Knowledge for the Abraham Accords Act, which authorize specific objectives and activities for the executive branch to carry out and require measurable progress—through strategies, reports, and direct action—to meet congressional intent. Priority areas for multilateral coordination among accords countries include:

  • Regional security cooperation: While the present environment might not be conducive to a comprehensive security partnership, a new multilateral forum should incorporate a pathway for regional security cooperation. This could include building on existing platforms such as the Comprehensive Security Integration and Prosperity Agreement (C-SIPA) and leveraging ideas associated with past initiatives, such as the Middle East Strategic Alliance. Section 1299 of the recently passed National Defense Authorization Act for Fiscal Year 2026 provides a foundation for the further expansion of C-SIPA by requiring an assessment of the agreement’s strategic importance and its potential expansion.
  • Traditional energy: Many Gulf states are seeking to diversify their economy away from fossil fuels. However, growing energy demand and the need for resilient, diverse energy systems mean that traditional energy sources will remain a critical part of the equation for the foreseeable future. Consequently, Israel, Egypt, and others have continued to develop natural gas and other traditional energy sources and have worked to integrate their projects across the region, leading to regional bodies such as the Eastern Mediterranean Gas Forum, which includes both Israeli and Palestinian representation. In line with Trump’s executive orders titled “Unleashing American Energy,” the State Department should use a revived accords multilateral framework to explore how initiatives like the Eastern Mediterranean Gas Forum can support regional economic integration.
  • Investment: In addition to traditional energy, the State Department should encourage more integration in the financial space, including cooperation on regional investments and domestic barriers to intra-regional investments. This could include new forms of cooperation, such as around coordinated regulation of cryptocurrency consistent with the goals of the recent GENIUS Act. While this will take time and trust to build, integrating wealthier states with regional entrepreneurial projects would allow for an immediate and tangible demonstration of how the Abraham Accords advance participants’ prosperity. Efforts to advance investment and financial partnerships are familiar to Congress. Section 9 of the RINA, a bipartisan effort by the then-leadership of the Senate Foreign Relations Committee and all four Abraham Accords Caucus co-chairs in the Senate, outlines a directive for the special envoy for the Abraham Accords to negotiate the creation of such a financial forum.

Mobilize and deepen people-to-people and legislative exchanges

Recommendation six: Authorize and appropriate funds for interfaith religious dialogues to support tolerance and understanding across Abraham Accords countries.

The second paragraph of the Abraham Accords declaration supports promoting “interfaith and intercultural dialogue” to advance the accords’ mission of peace and prosperity. However, no State Department grants have yet been publicly made available to support interfaith dialogues across Abraham Accords countries. Such grants could support the work of organizations such as the Mimouna Association, which connects Jewish and Muslim youths through interfaith programming. The State Department’s reluctance to issue such grants contrasts with a bipartisan and bicameral effort by all eight House and Senate co-chairs of the Abraham Accords Caucus who formally requested their issuance in 2023. In addition to encouraging the use of existing funding for such efforts, the Senate included $1 million for such grants in Section 10 of the RINA. While the act remains only proposed legislation, Congress should revisit the oversight and appropriations efforts from 2023 and renew calls for interfaith and intercultural dialogue grants. The Trump administration has clarified that advancing and expanding the Abraham Accords is a priority. The Abraham Accords declaration clearly supports interfaith dialogues, and the promotion of such dialogues in the Middle East is particularly important in the current environment, as the region seeks to move past historical biases toward new bonds. Few interfaith efforts are as worthy of support.

Recommendation seven: Expand bilateral-focused congressional travel to Abraham Accords countries to support the accords.

While more than a dozen congressional delegations travel to the Middle East annually and engage with Abraham Accords partner countries, fewer delegations travel with the explicit objective of supporting regional integration. Unfortunately, even fewer congressional delegations spend sufficient time in a partner country to build the government-to-government ties essential for moving Abraham Accords countries toward further integration. The Abraham Accords Caucus, or another member-driven initiative, should organize more regular congressional delegations to Abraham Accords partner countries. These delegations should focus on specific projects or initiatives that can generate tangible improvements in bilateral cooperation, such as trade, and ultimately promote regional integration. Congress should look to the US Departments of Commerce, State, and Agriculture to help identify issues and topics that members can use to advance the bilateral relationship toward greater integration. Agencies can also assist in supporting the identification of shared commercial interests or frictions based on members’ constituencies.

Model legislation annex

The following legislative text is provided solely for educational and informational purposes as illustrative “model” language. It is not intended to advocate for or against the passage of any particular bill, nor to influence specific legislation pending before Congress. The sample provisions are offered to demonstrate how recommendations in this report could be operationalized in statutory form. Inclusion of this text should not be construed as lobbying activity but, rather, as a nonpartisan resource for policymakers, researchers, and stakeholders.

Read the full annex

About the author

Explore the program

Through our Rafik Hariri Center for the Middle East and Scowcroft Middle East Security Initiative, the Atlantic Council works with allies and partners in Europe and the wider Middle East to protect US interests, build peace and security, and unlock the human potential of the region.

The post Congress has championed the Abraham Accords. Here’s how it can push them forward. appeared first on Atlantic Council.

]]>
In Iraq, China’s long game unfolds https://www.atlanticcouncil.org/in-depth-research-reports/report/in-iraq-chinas-long-game-unfolds/ Mon, 26 Jan 2026 20:30:00 +0000 https://www.atlanticcouncil.org/?p=896909 As China seeks new markets abroad and energy security at home, Iraq has become integral to Beijing’s plans in the Middle East. Baghdad finds itself caught between its security needs, for which it depends on the United States, and the economic needs of its growing population.

The post In Iraq, China’s long game unfolds appeared first on Atlantic Council.

]]>

Bottom lines up front

  • As China seeks new markets abroad and energy security at home, Iraq has become integral to Beijing’s plans in the Middle East.
  • Demographic and economic trends inside Iraq are pushing the country toward China.
  • Because Baghdad remains reliant on US protection, it is likely to continue hedging between Beijing and Washington.

When it comes to the beginning of the China-Iraq relationship, there are a number of starting points. Some are framed within the longue durée and civilizational discourse favored by the Chinese and cherished by the Iraqis. For instance, in his March 15, 2023, speech introducing the Global Civilization Initiative, Chinese President Xi Jinping invoked ancient cross-cultural exchange as the foundation of China’s modern outreach. Chinese officials talk about Iraq in similar terms. When Cui Wei, China’s ambassador in Baghdad, visited a local research center, he opened by recalling that “our ancestors—more than two thousand years ago—built the ancient Silk Road for friendly communication with the countries of the world . . . As for Iraq, it is a shining pearl on the Silk Road, which left China and Iraq with good memories.” In this narrative, Abbasid-era trade brought Chinese papermaking, gunpowder, printing, compasses, silk, porcelain, and tea to Iraq and, through Iraq, to the wider Middle East and Europe. In return, astronomy, calendars, medicine, spices, and arts moved eastward into China. This semi-mythical view of the Silk Road allows Beijing to distinguish itself from Western powers and present its presence in Iraq as rooted in deep history rather than modern geopolitics. 

Alongside this civilizational rhetoric sits an official diplomatic starting point, and these two stories are mutually enhancing. China recognized the Kingdom of Iraq in 1942, though ties remained limited. A substantive relationship emerged after the 1958 coup led by Abd al-Karim Qasim and the two countries formally established diplomatic relations on August 25, 1958. Beijing viewed Qasim’s coup as part of a broader anti-imperialist realignment and saw Iraq through the lens of Cold War polarization. The Iraqi Communist Party’s strength reinforced this perception. During this period, China’s embassy in Baghdad became a key hub for distributing Maoist literature, part of Beijing’s effort to export revolutionary ideology. 

A third foundation of the two countries’ relationship is personal and ideological, as demonstrated through figures such as former Iraqi President Jalal Talabani and, later, Adil Abdul-Mahdi. Talabani visited China in 1955 and met Premier Zhou Enlai, seeking support for the Kurdish national movement in Iraq. China declined, and Talabani later recalled realizing that Beijing’s stance on national questions was incompatible with Kurdish aspirations. Despite this refusal, he remained drawn to Maoist thought. Material links also emerged early: During the Great Leap Forward famine, Iraqi dates became an important ration for Chinese households, a memory now invoked in cultural exchanges pairing Iraqi dates with Chinese tea. These civilizational, diplomatic, personal, and material strands gave China a multilayered story about its presence in Iraq and prepared the ground for the more strategic phase that followed. 

The modern relationship: War, weapons, and debt 

The modern China-Iraq relationship took shape in post-Mao China, especially during the 1980s. By the onset of the Iran-Iraq War, China had begun prioritizing economic development and external markets—priorities later embodied in the Belt and Road Initiative (BRI). But Beijing’s approach to the two countries and their conflict was never purely economic. Deng Xiaoping saw an opportunity to counter Soviet influence as Moscow appeared to pivot toward Tehran. According to historian Pierre Razoux, China pursued three goals: containing the Soviet Union, expanding markets, and maintaining a balance between the two belligerents. 

In practice, Beijing discreetly armed Iraq while avoiding any outcome that might destabilize Iran. Chinese shipments included T-59 and T-69 tanks (copies of the Soviet T-55 and T-62), Type 59 towed field guns (copies of the 130-milimeter M-46), Type 56 assault rifles (copies of the Soviet Kalashnikov), and millions of shells and assorted munitions. Throughout the war, China became Iraq’s third-largest arms supplier, after the Soviet Union and France. This arms trade generated substantial Iraqi debt and Chinese claims became the largest portion of Saddam Hussein’s external war debt, including roughly $8.5 billion in commercial obligations. These debts later provided Beijing with leverage as Iraq reentered the international system after 2003. 

For much of the Shia elite, China—not the United States—is the preferred long-term partner.

The 1990–2003 sanctions era further shaped the economic relationship. Iraq’s isolation created openings for Chinese firms willing to operate under sanctions. In 1997, the China National Petroleum Corporation (CNPC) signed a production-sharing agreement (PSA) for the al-Ahdab field in the southern Iraqi city of Kut—an uncommon contract model in Iraq, where service contracts had become the norm after the 1970s nationalization. Baghdad’s weakened negotiating position and China’s opposition to sanctions facilitated the deal. Although the PSA did not fully materialize in the 1990s, it laid the contractual groundwork for Beijing’s return in the post-Hussein era. 

Talabani turns to Beijing for debt relief

After 2003, Talabani’s long-standing ties with China became politically consequential. While serving with the US-run Coalition Provisional Authority in 2003, he traveled to Beijing. China reopened its Baghdad embassy in 2004. The decisive moment came in 2007, when Talabani, as Iraq’s president, returned to China to negotiate debt relief. Beijing agreed to cancel all Iraqi sovereign debt and 80 percent of commercial debt—roughly $6.4 billion. This forgiveness cleared the way for reviving pre-2003 energy contracts. 

When the Ahdab project was relaunched, its PSA was converted to a service contract aligned with Iraq’s post-nationalization model. Chinese officials cast the project as a flagship for renewed cooperation.  

China’s emergence as a major oil partner aligned with the preferences of Iraq’s new Shia-led political class. Reporting from 2008 indicated that Iran encouraged Iraqi authorities to steer contracts away from US oil majors. For many Shia actors, Western oil companies symbolized the risk of external interference—a view shaped partly by the legacy of the 1950s struggle over Iranian oil nationalization. Chinese firms, by contrast, were seen as politically neutral and commercially pragmatic. Their willingness to operate amid insecurity, corruption, and low margins further strengthened their position. 

As ties deepened, Iraqi leaders sought broader economic engagement with China. After Talabani’s visit, then Prime Minister Nouri al-Maliki traveled to Beijing in 2011 to solicit Chinese participation in infrastructure and power generation to “help Iraq restore its own industry.” The partial withdrawal of US forces then opened additional space for China. With much of Iraq’s oil revenue consumed by salaries and routine government spending, officials looked for alternative ways to finance major projects. Prominent Iraqi politician Ahmed Chalabi proposed borrowing from China for large-scale infrastructure—a concept that fed into the 2019 “oil-for-infrastructure” framework. 

Prime Minister Adil Abdul-Mahdi’s 2019 trip to Beijing marked the high point of this approach. He described China as a partner for rebuilding Iraq’s infrastructure and embraced an explicitly pro-China development narrative. In an op-ed for China Daily, he argued that “a new world is emerging as the old one disintegrates” and cast the BRI as an inclusive path to long-term mutual benefit. The delegation’s message—with its emphasis on speed, efficiency, and technology transfer—captured Baghdad’s hope that China could deliver what Western firms, in Iraqi eyes, had not. 

‘Everyday dependence’ leads to lasting ties

These elite choices reflect deeper social and economic shifts. Iraq’s 2024 population census revealed that the country is urbanizing rapidly: More than 70 percent of Iraqis now live in cities. Urban households demand appliances, cars, electronics, and clothing, but face limited purchasing power. Chinese products—cheaper and increasingly familiar—meet these households’ needs. Over time, this has created a form of everyday dependence on Chinese goods that reinforces the broader geopolitical relationship. Affordability has gradually translated into acceptance, and acceptance into trust. 

These economic dynamics intersect with a changing political discourse. Recent election cycles in Iraq have seen a sharp decline in the prominence of democratic norms—rule of law, human rights, institutional accountability—in party narratives. As Western states also appear less committed to these values, Iraqi elites increasingly feel less pressure and elevate other priorities. Concepts linked to China’s development model—service provision over rights, infrastructure over institutions, efficiency over process—have gained traction across the political spectrum. 

China did not originate these trends, but its model resonates with and, in some cases, strengthens them. Beijing offers investment without political conditions, engagement without democratization requirements, and diplomatic rhetoric emphasizing non-interference in domestic politics—particularly in places such as Iraq. For many Iraqi leaders, this combination is appealing. And for many Iraqi consumers, China’s presence is already embedded in daily economic life.

Together, these forces—historical narratives, wartime ties, debt diplomacy, energy cooperation, and structural shifts in Iraq’s society and political culture—have produced a relationship that is both durable and expanding. While Iraq’s future trajectory will depend on broader regional and global dynamics, China’s position in the country is now anchored in multiple layers of the Iraqi state and society, making it a long-term feature of Iraq’s economic and geopolitical landscape. 

Where China is most active in Iraq

China has established an expansive and multisectoral presence in Iraq, spanning energy, telecommunications, consumer markets, and education. Its strategy appears aimed at deepening Iraq’s economic reliance on China across vital sectors, thereby embedding Beijing’s influence within Iraq’s long-term development trajectory. Bilateral trade between the two countries amounted to $54 billion in 2024, and China is the major source of foreign direct investment in Iraq, contributing $34 billion in 2023. 

Energy dominance 

For decades, China’s interest in Iraq has centered primarily on its vast energy resources. This manifests in purchasing Iraqi oil and developing Iraq’s energy infrastructure—both of which are vital to China’s energy security and geopolitical ambitions. In 2024, China imported slightly more than 1 million barrels per day (bpd) from Iraq, or 10 percent of its total crude imports. 

Chinese state-owned firms dominate the oil sector in Iraq, which is the second-largest producer in the Organization of the Petroleum Exporting Countries (OPEC) after Saudi Arabia and home to the world’s fifth-largest reserves. Reports suggest Chinese companies manage about one-third of Iraq’s 145 billion barrels of proven reserves and hold direct shares in roughly 24 billion barrels. They produce two-thirds to three-quarters of Iraq’s output of slightly more than 4 million bpd, with CNPC alone accounting for half of total production

Initially limited to state firms, Chinese investment has recently expanded to include private energy companies attracted by Baghdad’s favorable contract terms. These firms were licensed in August 2025 to develop several new fields and plan to add 500,000 bpd to Iraq’s production by 2030, as Baghdad targets 6-million-bpd capacity. 

While Beijing’s role secures its energy interests, it also deepens Iraq’s tilt toward the East—an orientation encouraged by Shia political factions allied with Iran. These groups promote stronger ties with China (and, to a lesser degree, Russia) as a means of reducing dependence on Washington and circumventing US pressure. 

Mindful of the optics of deepening ties with China, Prime Minister Mohammed Shia al-Sudani sought to reengage US energy firms. During his April 2024 visit to the United States, he met oil executives in Houston and urged them to renew investment. The effort appeared to bear some fruit. In October 2025, Exxon Mobil signed an agreement to re-enter the Iraqi market and operate the Majnoon field in Basra, after its full exit from Iraq in January 2024 and subsequently handing over of the West Qurna 1 field to PetroChina. 

Telecommunications and digital infrastructure 

China’s involvement in Iraq’s telecom sector predates Hussein’s fall. Chinese company Zhongxing Telecom Co. first entered Iraq in 1999, when the country remained under international sanctions. Around the same time, Huawei began clandestinely building a fiber-optic network for Iraq’s military, which was later bombed during a 2001 US-UK air raid—an episode that led to Washington’s view of Huawei as a national security threat. 

In 2003, following the overthrow of the Baath regime by the United States and its allies, Huawei returned to Iraq’s emerging telecom market via Asiacell, the country’s leading carrier. In 2011, Robert C. Fonow, a US State Department adviser to Iraq’s Telecommunication Ministry, told the Washington Times that Huawei effectively “owned” Iraq’s telecom sector, alleging the firm had received more than six hundred contracts worth billions of dollars—some indirectly financed by US reconstruction funds.  

Today, Chinese technology firms remain central to Iraq’s digital expansion. In June 2025, Asiacell and China Mobile International (CMI) signed a memorandum of understanding (MoU) to expand enterprise-level digital services, billed as accelerating Iraq’s digital transformation through CMI’s global expertise. Huawei also partnered with Iraq’s Communication and Media Commission, Iraq’s top regulatory body in the field, to train personnel in cybersecurity. Iraqi officials have publicly encouraged deeper Chinese investment in telecommunications, signaling a sustained partnership in digital infrastructure. 

Consumer markets and renewable energy 

China’s commercial reach extends to Iraq’s consumer markets—from electronics to vehicles to solar energy. In the first half of 2025, Iraq imported eighteen thousand Chinese cars worth $639 million, a 30-percent increase over the same period in the previous year. The Kurdistan region accounted for the largest share, as consumers favored affordable yet feature-rich Chinese vehicles. For example, a 2025 MG GT sedan sells for about $8,850, compared with around $20,000 for comparable Asian or Western models. Similarly, a BYD hybrid sport utility vehicle (SUV) retails for $24,300, well below competitors’ SUVs. Local dealers report that “buyers who once paid more for American cars from Dubai now prefer Chinese cars with leather interiors, large screens, and panoramic roofs at a fraction of the cost.” 

Chinese solar panels have also surged. According to the Washington-based Attaqa Energy Research Group, Iraq ranked third in 2025 among Arab-majority states for Chinese solar imports. In the year’s first half, Iraq imported 0.9 gigawatts of solar panels—a nearly 600-percent increase in terms of solar generation capacity from 2024—driven by state-backed projects to install solar systems in homes, schools, and public buildings. 

Education, media, and cultural outreach 

Alongside its economic footprint, China has ramped up soft-power efforts to win Iraqi hearts and minds. Keen to counter critical media coverage of China, Chinese diplomats at times engage with Iraqi media—particularly to push back against criticism on issues such as the Uyghur crisis in Xinjiang. 

Chinese universities are offering around eighty scholarships to Iraqi students for the 2025–2026 academic year. The Chinese consulate in Erbil has backed the 2019 establishment of a Chinese language program at Salahaddin University in Erbil—one of only two such programs in the Middle East. It also helped create a China Studies Center at Sulaimaniyah University, which publishes a Kurdish-language magazine introducing China and supports translation of Chinese books.  

While Washington’s retreat from democratization and aid has eroded its image, China’s cultural outreach, development model, and messaging resonate with many Iraqis. 

China’s exchange programs regularly bring Iraqi civil servants and professionals to Chinese institutions for technical training. The Chinese consulate in Erbil now plans to establish the Great Wall organization to strengthen bilateral relations by bringing together Iraqi Kurds who have visited China through various Beijing-sponsored exchange programs. Beijing has further expanded scientific cooperation by signing an agreement with Iraq in 2025 to develop a “peaceful nuclear technology program,” including construction of Iraq’s first nuclear training reactor for academic use in nuclear physics and radiological sciences. The initiative, led by Minister of Higher Education Na’im al-Abboudi—a senior member of the Iran-backed Asa’ib Ahl al-Haq movement—has drawn scrutiny in Washington for its potential geopolitical implications. 

Beijing has a distinct approach to Kurdistan 

China’s relationship with the Kurdistan Region of Iraq (KRI) differs in tone and texture from its engagement with federal Iraq, yet both align with Beijing’s broader strategy. Energy remains the core of China-Iraq relations, and China’s activities in the KRI ultimately reinforce that foundation. However, the China-Kurdistan relationship appears more diverse, shaped by the autonomous region’s social openness and China’s preference for a low-risk, apolitical presence. 

Historically, the relationship has two main strands. The first dates to Talabani’s 1955 visit to Beijing and his fascination with Maoism, which shaped aspects of his political worldview and indirectly influenced the early identity of his party, the Patriotic Union of Kurdistan (PUK). After 2003, the PUK became essential for rebuilding China-Iraq ties, and it is no coincidence that every Iraqi ambassador to China since 2003 has been from the PUK, reflecting both personal networks and political continuity. 

Another key moment in the relationship was China’s opening of its consulate in Erbil in 2014. At the ceremony, then Kurdistan Regional Government (KRG) Prime Minister Nechirvan Barzani described it as “the first step toward building a new phase in bilateral relations,” signaling opportunities in politics, culture, infrastructure, and commerce. As the KRG’s former foreign relations chief, Falah Mustafa, put it, China’s permanent seat on the UN Security Council gives its presence in Erbil symbolic and practical weight. Yet Beijing has remained cautious in its political engagement with Kurdish authorities, consistent with its 1991 abstention on UN Resolution 688 condemning Hussein’s repression of the Kurds. 

Despite this reticence, China has built a wide-ranging network of relationships. The Chinese consulate in Erbil regularly invites Kurdish political parties, universities, media outlets, and government ministries to short study programs in China. This resembles earlier US public diplomacy programs but is more ideologically neutral. Beijing makes a point of engaging all political currents, including leftist, nationalist, and Islamist parties. As a former KRG adviser noted in an interview with one of the authors, “During a trip to China, I met a member of the Kurdistan Communist Party and a cadre of an Islamic party attending the same course.” Kurdish officials appear increasingly attentive to China’s rise and its willingness to support development in Iraq and Kurdistan. This was reflected in comments by Sulaimaniyah Governor Haval Abubakr, who recently described China as “the America of the East.” 

China’s expanding activity in the KRI also intersects with the US-KRG relationship. As the United States has constructed a massive new consulate complex in Erbil, intended as a physical symbol of long-term commitment, China has also signaled interest in building a new consulate of its own. However, while the KRI has deep diplomatic and security ties with the United States, its relationship with China remains overwhelmingly concentrated in trade and cultural domains. Indeed, this is a deliberate choice on Beijing’s part. By avoiding security and identity questions, China cultivates what might be described as a “decaf” relationship—active and useful, yet stripped of political commitments. 

Kurdistan’s openness to the world enables this strategy. Travel is highly valued socially, and China’s invitations arrive at times when economic hardship—such as salary delays by Baghdad—limits mobility. “I managed to have a trip in a time of salary crises,” a Sulaymaniyah lecturer interviewed for this report noted after joining a Chinese study program. This openness has provided fertile ground for Beijing’s soft-power outreach. 

China’s public diplomacy is more developed in the KRI than in the rest of Iraq. It promotes familiarity with Chinese institutions, culture, and political narratives through sustained engagement. This has shifted public perceptions and increased interest among Kurdish students and professionals. As noted earlier, Beijing has supported institutions such as China in Kurdish, the China Studies Center in Sulaimaniyah, and the Chinese Department at Salahaddin University, with plans for additional language programs. Events like Chinese Film Week and commemorations of the “80th Anniversary of the Victory of the Chinese People’s War of Resistance Against Japanese Aggression” give China cultural visibility and institutional depth. Collectively, these centers make cultural programming and exchanges smoother and more consistent. 

Over the past two decades, China’s expanding presence has begun to shape Iraq’s economic future, regional role, and relations with the United States.

This network also supports China’s commercial aims. The long-standing Asiacell-Huawei partnership is illustrative. Asiacell, headquartered in Sulaymaniyah, is Iraq’s largest telecom company, and its relationship with Huawei began on the eve of the 2003 US invasion. In February 2003—anticipating conflict—Huawei scouted opportunities in Kurdistan. When Washington issued its ultimatum to Hussein in March, Huawei moved Asiacell staff to Shenzhen for emergency training. In 2023, the two firms celebrated the twentieth anniversary of their “precious partnership,” outlining plans to integrate artificial intelligence into Iraq’s telecom services. Today, Huawei is the primary equipment provider to all major Iraqi telecom operators, a position rooted partly in its early foothold in the KRI. 

China’s presence also shapes Kurdistan’s sociopolitical landscape. Chinese goods—from household items to solar panels to electric vehicles—dominate local markets. As a Sulaymaniyah trader interviewed for this paper explained, “You cannot produce anything in Kurdistan, as the Chinese make it cheaper, even if it’s a pillow cover.” This economic dependency affects local production and, over time, influences political imagination. Concepts associated with China’s governance model—especially centralized party control and the importance of family connections—mirror existing patterns and appeal of China in Kurdistan and federal Iraq. 

It is important to note that when it comes to strategic economic sectors, the KRG is not linked to China in the same way the federal government and the areas under its control are. For example, while the federal government’s energy sector is dominated by Chinese firms, there is only one Chinese-owned company—Addax Petroleum, owned by Sinopec—operating in the Kurdistan region’s oil sector.

How this growing closeness affects US policy  

As China prioritizes securing new markets abroad and ensuring energy security at home, Iraq has become integral to Beijing’s geoeconomic ambitions and economic statecraft in the Middle East region. Over the past two decades, China’s expanding presence has begun to shape Iraq’s economic future, regional role, and relations with the United States. Baghdad now faces the delicate task of balancing ties with both powers to avoid alienating either side. There is an economic and geographical logic driving Iraq’s relationship with China. China is the world’s largest energy importer, and Iraq—one of the world’s top oil producers—naturally falls within Beijing’s orbit of interest. Iraq’s infrastructure gaps and development needs also make Chinese capital and expertise attractive, if not indispensable, while Chinese consumer goods remain affordable for most Iraqis. 

However, the broader implications of this relationship cannot be understood solely through economics. China’s increasing footprint unfolds against the backdrop of intensifying US-China rivalry and the global drift toward multipolarity. Iraq is gradually emerging as a site of subtle competition between these two powers—particularly in areas such as infrastructure (especially energy), digital networks, and potential land-based transit corridors. Yet, given the deeply interconnected nature of today’s global economy and Iraq’s heavy reliance on external actors for technology, investment, consumer products, and security, it is unrealistic to expect Iraq to de-link from either China or the United States. 

Beyond economic logic, Iraq’s deepening engagement with China reflects political calculations and rationale at the domestic, regional, and global levels. Globally, China’s ascent since the mid-2010s has offered states like Iraq an alternative pole through which to diversify partnerships and reduce dependence on the West. Engagement with Beijing thus forms part of Baghdad’s broader hedging strategy—maintaining ties with multiple global actors to avoid overreliance on any single one. 

Domestically, this orientation intensified as Shia parties consolidated unprecedented control of the Iraqi state, particularly after the war against the Islamic State of Iraq and al-Sham (ISIS) and the weakening of Kurdish autonomy and political influence in Iraqi politics after the unsuccessful Kurdish independence bid in 2017. Many among Iraq’s new Iran-backed power brokers view China as a politically neutral strategic partner—one that provides investment without demanding reforms or pressing governance conditions. At the elite level, China appears to have the upper hand in the soft-power contest with Washington concerning the appeal of the two countries and their approaches to Iraq. While Washington’s retreat from democratization and aid has eroded its image, China’s cultural outreach, development model, and messaging resonate with many Iraqis.  

The Iran factor

Regionally, openness toward China has grown since the early 2010s, amid the rise of the Iran-led Shia axis. Many dominant Iraqi Shia parties maintain deep ties with Tehran, and their affinity for China aligns with Iran’s own pursuit of a closer relationship with Beijing. Aware of the risks of being perceived as leaning too heavily toward China—and also Iran, particularly in the aftermath of the October 7, 2023, conflict between Israel and Gaza and the gradual weakening of the Iranian-led axis—Baghdad has recently sought to rebalance its approach by inviting more US investment in its energy sector. 

Iraq’s recent deals with US energy companies such as ExxonMobil, Chevron, and others reflect the recognition among the dominant Shia political class that excessive dependence on China risks political backlash and economic vulnerability, particularly as Washington intensifies efforts to contain Beijing’s global influence. This dynamic highlights the limits of hedging for resource-rich countries like Iraq that lack the structural leverage to shape regional outcomes or reduce dependence on the United States. 

It remains unclear whether Iraq’s renewed outreach to US companies signals a genuine attempt at balanced relations or a tactical effort to ease US pressure determined to squeeze Iraq as part of its maximum pressure campaign against Iran. What is clear is that China’s expanding economic role in Iraq is a growing concern for Washington. Greater Chinese market share means shrinking space for US businesses and, more broadly, a potent erosion of US influence that is more than symbolic. Given that the post-2003 Iraqi order was created through US intervention—and later saved from ISIS’s existential threat through a massive US-led coalition—China’s growing role in Iraq reflects a deeper transformation in the landscape of external influence shaping the country. 

Beijing’s digital infrastructure deals, including telecommunications and cybersecurity, could create new vulnerabilities for US-Iraq security cooperation not unlike Huawei’s engagement with Iraq under Hussein. The use of Chinese companies in strategic sectors—ports, refineries, and data networks—risks limiting the space for US and Western governments and companies’ engagement with Iraq. Crucially, Iraq’s ambitious Development Road Project (DRP) connecting the Gulf to Turkey and Europe could also intersect with China’s BRI, particularly its sea route portion, and diversify Beijing’s options for trade with the Middle East and from there to Europe. Despite a cool initial reception, Beijing now appears open to supporting the Iraqi DRP, perhaps recognizing its value in shortening overland trade routes with Europe. This all fits into China’s geoeconomic strategy, expanding trade, increasing access to critical energy resources, and creating new markets for Chinese companies. 

However, this is not the entire story. Iraq appears to follow a compartmentalized approach to relations with both the United States and China, whereby Baghdad has cultivated deeper ties with China in trade, energy, and telecommunications while remaining heavily dependent on the United States in finance, security, and diplomacy. Revenue from Iraq’s oil exports flows into the Federal Reserve Bank of New York, from which the Central Bank of Iraq withdraws regularly. Iraq’s monetary and financial systems thus remain deeply tethered to the US financial system and Washington’s oversight. Any disruption in this relationship—such as sanctions or delayed clearances—could trigger liquidity crises in Iraq’s fragile economy. 

Iraq’s security dependence on Washington also remains quite firm for now. The Iraqi security forces rely on US intelligence, equipment, and training for operations against ISIS and for broader defense needs. Advanced systems such as F-16s and Abrams tanks further anchor this relationship. Iraq sits at the intersection of three core US priorities: countering Iranian influence, stabilizing global energy markets, and—after the transformations set off by October 7, 2023—rebuilding a regional order friendly to Washington. As part of this broader regional reality security links remain important for both sides, particularly as Iraq’s Shia ruling class feel threatened by the developments over the past couple of years.  

Diplomatic asymmetry is even deeper: Iraqi prime ministers routinely seek White House invitations as symbols of legitimacy and international recognition. Since 2003, Iraqi leaders at the presidential, prime-ministerial, and foreign-ministerial levels have visited Beijing on numerous occasions, yet the only senior Chinese official of comparable rank to visit Iraq during that period was Foreign Minister Wang Yi in February 2014. Iraq invests in the relationship far more than China does. 

This produces a paradox: Iraq remains reliant on US protection but is increasingly integrated into China’s commercial ecosystem. Unless the United States expands its economic engagement, its influence will continue to erode. For much of the Shia elite, China—not the United States—is the preferred long-term partner. Yet Iraq cannot function without engagement with both in some form. Historically, Iraqi attempts to shift too far toward one camp produced destabilization, including coups during the Cold War. The country’s social, economic, and security needs, along with its geopolitical position, require a diversified and compartmentalized approach to major global powers—though not one that entails equal reliance across all sectors. 

Energy is a key arena. China is a major importer of Iraqi oil while increasingly serving as Iraq’s primary supplier of solar panels and renewable technologies. At the same time, China’s domestic energy consumption is shifting. The International Energy Agency (IEA) notes that China’s use of gasoline, jet fuel, and diesel—totaling 8.1 million bpd—declined slightly in 2024 and stood 2.5 percent below 2021 levels. As global oil demand plateaus and buyers gain greater leverage, Iraq has become increasingly anxious not to lose China as a primary customer. 

Demographic and economic trends inside Iraq are particularly important as they further push the country toward China. Rapid urbanization, high birth rates, and low incomes make Iraqi households dependent on inexpensive imported goods. China is often the only viable supplier. As Iraqi society and consumption patterns evolve, so will its economic and political tilt toward Beijing. By contrast, the United States has lost most of its non-military leverage—aside from sanctions and coercive tools—partly due to years of inconsistent engagement. Moreover, the nature of Iraq’s rentier economy, and its governance model built on patron-client relations and the informal patronage networks that sustain it, requires the rapid development of oil resources as the main pillar supporting this system. For the reasons outlined above, Chinese firms represent a more reliable option for Iraq to ensure the continued expansion of its oil sector and the conversion of those revenues into political power. 

Against this backdrop, Iraq’s trajectory suggests an ongoing use of hedging as its primary policy, albeit an uneasy one. Hedging is a strategic behavior through which a state avoids clearly aligning vis-à-vis two powerful actors, maintaining instead an in-between, ambiguous, flexible position. Over the past couple of years, the Shia Coordination Framework-led government under Sudani has noticeably embraced this posture. Yet Iraq’s hedging exercise remains constrained by internal and external pressures, particularly Iran’s influence. Tehran’s networks—militias, political allies, and economic ties—limit Baghdad’s freedom of maneuver. Other constraints include anti-normalization legislation in the Iraqi Parliament targeting Israel, which prevents Iraq from joining the Abraham Accords and expanding ties with US allies. The outcome of recent Iraqi parliamentary elections will likely reinforce this dynamic. Although Sudani’s coalition performed strongly, Iran-aligned militias and parties performed far better, ensuring that hedging will continue—but in a narrow and contested space at least for the foreseeable future. 

About the authors

Sardar Aziz, PhD, is a researcher, columnist, and adviser, and a nonresidential affiliate at the IRIS center at the American University of Iraq, Sulaimani. He is a former senior adviser to the Kurdistan Parliament in Iraq. He has worked extensively on China and Iraq.

Mohammed A. Salih is a nonresident senior fellow in the Foreign Policy Research Institute’s National Security Program and a researcher and journalist based in the United States. He holds a PhD from the University of Pennsylvania and has written extensively for more than two decades on Iraq, Kurdish, and regional affairs.

related content

Explore the program

The Iraq Initiative is driving policy-oriented programs and analysis that advance Iraq’s stability and sovereignty, regional integration, and democratic and economic development. It also aims to promote a strengthened US-Iraq partnership.

The post In Iraq, China’s long game unfolds appeared first on Atlantic Council.

]]>
Countering Russian escalation in space https://www.atlanticcouncil.org/in-depth-research-reports/report/countering-russian-escalation-in-space/ Wed, 21 Jan 2026 13:00:00 +0000 https://www.atlanticcouncil.org/?p=900056 Current US space policy and acquisitions are inadequate to address the growing threats from Russia in space. The United States needs a more resilient space architecture, able to withstand major-power conflict—and Russia’s designs to place a nuclear weapon in orbit. Here are fifteen recommendations to make that happen.

The post Countering Russian escalation in space appeared first on Atlantic Council.

]]>

Executive summary

This report’s findings are meant to guide policymakers in making important decisions about safety, security, and sustainability in the space domain, as well as to better inform the public on these issues. The report explains why current US space policy, Department of Defense (DOD) acquisition programs, and commercial integration strategies by themselves are inadequate to address the growing threats from Russia in space. The report makes the case for the development of policies, practical strategies, and more effective acquisition programs to better address a range of potential futures, considering possible space-related actions by Russia’s political leadership.

Beyond recommending changes to US declaratory policy, this report details why the United States needs a more resilient space architecture. It examines how Russia’s nuclear threat—specifically, its designs to place a nuclear weapon in orbit, in clear violation of its obligations under international law—could alter the rationale for pursuing proliferated low-Earth orbit (LEO) constellations. This report also explores the kind of space architecture the United States would need during a conflict against a major power, and how the United States can further integrate the private sector and allies in pursuit of its national security objectives. Each of these issues carries significant near-term policy and acquisition implications.

This report explains why some US policymakers might be reluctant to take the necessary coercive action to compel acquiescence by Russian political and military leaders. This reluctance is driven by a Western sense of morality and “rightness,” an inherent right of self-defense mentality, and current conceptions of international humanitarian law. US anticipatory actions seeking to deter Russian malicious actions might prove unreliable because any anticipatory action will be a political decision based upon a Western mindset and worldview. This observation underscores that deterrence by denial of benefit—including resilience and active defense—should play a substantial role in military strategies, one even more substantial than cost-imposition efforts. Additionally, assurance and reassurance efforts directed toward Chinese and Indian leadership could help dissuade potential Russian aggressive behavior and deescalate crises.

This report’s analysis illuminates important defense and force planning considerations. Its three scenarios span a catastrophic nuclear detonation (NUDET) in LEO to debris-generating anti-satellite (ASAT) weapons to less aggressive action against commercial satellites. A qualitative assessment using a detailed framework highlights the relative importance of the methods used to dissuade potential aggression while also prevailing in conflict. In priority order, the relative importance of affecting Russian leadership’s decision calculus is: deterrence by denial of benefit; assurance and reassurance; and deterrence by cost imposition.

Finally, this report provides fifteen actionable policy and defense acquisition recommendations for advancing a comprehensive and practical framework to counter potential Russian aggression and escalation in space. Should dissuasion efforts fail and conflict in space occur, it is necessary that the United States, its allies, and commercial partners fight through Russia’s irresponsible and aggressive actions in space, while working to deescalate any crisis and seek a lasting peace.

Read the full report

About the authors

John J. Klein, PhD, is a nonresident senior fellow in the Forward Defense program of the Atlantic Council’s Scowcroft Center for Strategy and Security. Klein is a subject matter expert on space strategy and also instructs space policy and strategy courses at the undergraduate, graduate, and doctorate levels at several universities around Washington, DC. He routinely writes on space strategy, deterrence, and the law of armed conflict. He is the author of the books Space Warfare: Strategy, Principles and Policy, 2nd Edition (2024), Understanding Space Strategy: The Art of War in Space (2019), and Fight for the Final Frontier: Irregular Warfare in Space (2023), along with a score of other book chapters and articles.

Klein is also a retired United States Navy commander, receiving his commission through the Navy Reserve Officer Training Corps program at Georgia Tech. He served for twenty-two years as a naval flight officer, primarily flying in the S-3B Viking carrier based aircraft. Klein supported combat operations in Iraq and Afghanistan. His tours included service as the executive officer of Sea Control Squadron Twenty-Four and the final commanding officer of the Sea Control Weapons School.

Clementine Starling-Daniels is a vice president at Beacon Global Strategies, the former director of the Atlantic Council’s Forward Defense program, and a nonresident senior fellow at the Council’s Scowcroft Center for Strategy and Security. At Beacon, she advises at the intersection of national security and technology policy, helping clients navigate evolving defense, intelligence, and technology landscapes. As a national security expert, her research explores how emerging technologies and operational innovation enhance US and allied deterrence, defense, and joint warfighter capabilities amid strategic competition with China and Russia. Her work particularly focuses on space strategy and policy, and on the role of special operations and unconventional warfare in modern deterrence and conflict.

As founding director of Forward Defense, Starling-Daniels led a team advancing research and thought leadership on the future of warfare. She spearheaded bipartisan commissions on Defense Innovation Adoption and Software-Defined Warfare, developing approaches to leverage technologies—including AI, hypersonics, autonomy, and space systems—to solve complex defense challenges. Earlier in her career, she served as deputy director of the Atlantic Council’s Transatlantic Security Initiative, guiding task forces on NATO force posture, military mobility, contested logistics, and Arctic security. She also supported NATO’s Public Diplomacy Division during key summits and gained extensive experience in NATO and EU defense policy and industrial cooperation.

Acknowledgements

This report was produced in accord with the Atlantic Council’s policy on intellectual independence, which states that the Atlantic Council and its staff, fellows, and directors generate their own ideas and programming, consistent with the Council’s mission, their related body of work, and the independent records of the participating team members. The Council as an organization does not adopt or advocate positions on particular matters. The Council’s publications always represent the views of the author(s) rather than those of the institution.

The Atlantic Council maintains strict intellectual independence for all of its projects and publications. Council staff, fellows, and directors and those who the Council engages to work on specific projects, are responsible for generating and communicating intellectual content resulting from Council projects. The Council requires all donors to agree to the Council maintaining independent control of the content and conclusions of any products resulting from sponsored projects. The Council also discloses sources of financial support in its annual reports to ensure transparency.

This report does not necessarily reflect the views of the US Department of Defense, the US Department of the Air Force, or any other institution with which either of the co-authors or any of the contributors are now, or have in the past been, affiliated.

The co-authors acknowledge with gratitude the sponsorship of the Smith Richardson Foundation for this project.

Explore the program

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Countering Russian escalation in space appeared first on Atlantic Council.

]]>
A three-billion-person challenge: The rising global market for financial leaders https://www.atlanticcouncil.org/in-depth-research-reports/report/a-three-billion-person-challenge-the-rising-global-market-for-financial-leaders/ Wed, 14 Jan 2026 14:30:00 +0000 https://www.atlanticcouncil.org/?p=897244 Financial-sector policymakers and financial service providers are facing both a real challenge and unique opportunity to drive economic inclusion for about three billion people and spur growth toward the Sustainable Development Goals (SDGs).

The post A three-billion-person challenge: The rising global market for financial leaders appeared first on Atlantic Council.

]]>

Executive summary

Financial-sector policymakers and financial service providers are facing both a real challenge and unique opportunity to drive economic inclusion for about three billion people and spur growth toward the Sustainable Development Goals (SDGs).

The good news from the World Bank’s Global Findex Database 2025 is that 79 percent of adults globally and 75 percent in low- and middle-income economies (LMIEs) now have a financial account of some kind. Mobile phones are even more ubiquitous, with 86 percent of adults globally and 84 percent in LMIEs having one, which in most contexts can be used to access financial services. This means about four out of every five people have the potential to save safely and borrow prudently to meet their financial needs and the potential to pay and be paid digitally. This is good news for the individuals, their families, and for these economies because, as the IMF has found,
financial inclusion serves as a catalyst for both economic participation and inclusive growth.

However, the majority of adults in LMIEs that have a financial account do not yet fully engage with the formal financial sector. Only 40 percent of adults in LMIEs (on average) saved formally and only 24 percent of adults in LMIEs (on average) borrowed from a formal financial service provider in the last year and even they do not necessarily have the type of credit they need.1 There are, therefore, about three billion people who could actively engage in the formal financial sector, and they present both a challenge for financial sector leaders and an opportunity for accelerating inclusive growth.

The main reasons adults in LMIEs do not use formal digital financial services are affordability, lack of trust in service providers, and lack of products to meet their needs. Rapid advances in digital public infrastructure (DPI) and artificial intelligence (AI) have the potential to directly tackle these challenges. Together they can reduce costs, increase trust, and tailor products for individuals, thereby improving lives and driving growth:

  • DPI has been endorsed by the Group of Twenty since India’s presidency in 2023.2 Ninety-seven countries now have DPI-like digital payments; sixty-four countries have digital IDs, and 103 have data exchange—together reducing costs and increasing trust.3
  • AI, by cheaply analyzing massive data sets, is turbocharging cost reduction and product tailoring, which translates into greater affordability and access for people on lower incomes.4

Yet, there are potentially problematic aspects to these exciting innovations. DPI has the potential for loss of data privacy (if privacy by design is not embedded), for rent extraction (if not an open-source platform), and for government surveillance (if DPI safeguards are not central).5 AI has the potential to turbocharge fraud, scams, and identity theft and compromise trust.6

Therefore, government financial-sector regulators and policymakers have urgent and important decisions to make about how to enact and enforce responsible guardrails in the financial ecosystem. These guardrails are essential so new customers have affordable, appropriate products, can trust their money and data are safe, and have effective recourse mechanisms if problems occur. National coordination at the highest level is essential, regional approaches including policy harmonization can be cost-effective, and urgency is imperative. Financial-service leaders also have key decisions to make about how to design affordable and responsible financial products that build trust, enable resilience, and foster financial well-being and economic growth. There is now a unique opportunity for financial-sector leaders to unleash economic potential for three billion people and accelerate inclusive growth.

Read the full report

About the author

Ruth Goodwin-Groen is a nonresident senior fellow with the Atlantic Council’s GeoEconomics Center. Goodwin-Groen brings thirty years of strategic and technical leadership in financial-sector development and financial inclusion in emerging markets to her current consulting practice, Goodwin-Groen Consulting. Her focus is on responsible digital financial inclusion and equality in financial services for women.

Goodwin-Groen is best known as the founding managing director of the United Nations-hosted Better Than Cash Alliance, which created a global movement from cash to responsible digital payments to achieve the Sustainable Development Goals. Alliance members and partners include over 113 governments, 229 companies, and most of the UN—accounting for over 90 percent of global gross domestic product.

Goodwin-Groen has a PhD in financial-sector development from the University of Bath, an MBA with distinction from Harvard Business School, and a Bachelor of Science with Honors from the University of Western Australia.

Acknowledgements

The author extends special thanks to those providing expert input on this paper: Isabelle Carboni, Expert Consultant; Eric Duflos, CGAP; Nicole Goldin, United Nations University-Centre for Policy Research & Atlantic Council; Leora Klapper, World Bank; David Porteous, Integral: Governance solutions; and Camilo Tellez-Merchan, Gates Foundation. She also deeply appreciates the input of Atlantic Council colleagues Josh Lipsky, Sophia Busch, and Juliet Lancey as well as those who contributed to the findings and recommendations of this report through their participation in two roundtable discussions at the Atlantic Council in April and October of 2025. See the Appendix for a list of the participants. This report was made possible in part by a grant from Tala.

Related content

Explore the program

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

1    Klapper et al., The Global Findex Database 2025, xxxiii, 152, 154, 218.
3    “The Digital Public Infrastructure Map,” DPI Mapping Project, https://dpimap.org/.
4    Sophie Sirtaine, “AI’s Promise: A New Era for Financial Inclusion,” CGAP Leadership Essay Series blog, CGAP, April 4, 2025, https://www.cgap.org/blog/ais-promise-new-era-for-financial-inclusion.
5    Zoran Jordanoski, “Safeguarding Digital Public Infrastructure: A Global Imperative for Sustainable Development,” United Nations
University Operating Unit on Policy-Driven Electronic Governance, July 9, 2025, https://unu.edu/egov/article/safeguarding-digital-public-infrastructure-global-imperative-sustainable-development.
6    Eric Duflos, “AI and Responsible Finance: A Double-Edged Sword,” AI and the Future of Financial Inclusion blog series, CGAP,
April 29, 2025, https://www.cgap.org/blog/ai-and-responsible-finance-double-edged-sword.

The post A three-billion-person challenge: The rising global market for financial leaders appeared first on Atlantic Council.

]]>
Digital sovereignty: Europe’s declaration of independence? https://www.atlanticcouncil.org/in-depth-research-reports/report/digital-sovereignty-europes-declaration-of-independence/ Wed, 14 Jan 2026 14:27:11 +0000 https://www.atlanticcouncil.org/?p=896219 In Brussels, "digital sovereignty" may be the new "strategic autonomy": a push for Europe to go its own way and depend less on the United States. As US tech companies and EU regulators clash, catch up on a policy debate with consequences playing out online and in the halls of power.

The post Digital sovereignty: Europe’s declaration of independence? appeared first on Atlantic Council.

]]>

Bottom lines up front

  • In 2025, the Trump administration’s open hostility to the EU and close connections with tech CEOs brought long-simmering transatlantic tensions over how to regulate Big Tech to a boil. 
  • The effect so far has been to accelerate the EU’s quest to break its dependence on Silicon Valley and China.
  • Washington’s combative posture toward EU tech regulation sets the stage for more conflict that could imperil the $1.5-trillion trading relationship.

Table of contents

Introduction

Over the past several years, the concept of digital sovereignty has become ever more central to European notions of competitiveness and economic resilience. Formerly a niche idea within the digital policy community, it has now gone mainstream with major European leaders, from European Commission President Ursula von der Leyen to former head of the European Central Bank Mario Draghi, calling for the European Union to achieve digital sovereignty.1 It has also become integral to European debates about technological sovereignty and strategic autonomy, and even to trade policy. And as digital sovereignty has become more prominent in European discussions, it has shifted from being a vague aspiration to a concept that EU policymakers increasingly seek to put into operation—raising the possibility of future EU restrictions on procurement from companies outside Europe, as well as other regulatory measures.

Yet, despite its growing centrality in European digital debates, digital sovereignty still does not have a clear definition.2 At times, it seems to have been encompassed by the broader term of tech sovereignty, which reflects the EU’s desire to boost its industrial capabilities—not only in the digital space, but also in renewables and other green and future technologies. European policymakers also regularly refer to data sovereignty and cloud sovereignty, which can be seen as focused on particular aspects of digital sovereignty.

What all these definitions share, however, is the notion that Europe and its economy should be less dependent on others and more capable of protecting its own interests, including its interests in the digital sphere. That leads to the key unresolved questions at the heart of digital sovereignty. Does sovereignty require an economic approach that is exclusively European or, at minimum, favors European companies? Is ownership or effective control over key companies important, or is a risk-based system more appropriate? Is it desirable to limit sovereign requirements to certain sectors of the economy? Can Europe achieve a measure of sovereignty as part of a common enterprise among international partners? And if the partnership model is acceptable, who are the partners?

The transatlantic relationship is, in turn, entangled with Europe’s internal debate about digital sovereignty. Until recently, this has been an evenly divided contest, with some European experts calling for Europe to strategically decouple from the dominance of US companies, while others—including most member-state governments—have noted the lack of local alternatives and hesitated to discriminate against US and other non-EU companies.

But the Trump administration’s initial open hostility to the EU and continuing general unpredictability have caused even the most transatlantic of EU leaders to question the reliability of the United States. The July 2025 US-EU trade deal provided some temporary clarity and predictability in transatlantic commercial relations, although digital issues were addressed in only limited ways. President Donald Trump’s Truth Social post a few weeks later, threatening additional tariffs on countries with “Digital Taxes, Digital Services Legislation, and Digital Markets regulations [that] are all designed to harm, or discriminate against American Technology,” was immediately criticized by the European Commission, France, Germany, and others as a violation of Europe’s sovereignty.3 Nevertheless, during a November 2025 visit to Brussels, Commerce Secretary Howard Lutnick directly linked the removal of EU digital regulation with a potential US-EU agreement on steel and aluminum tariffs.4

Given Trump’s close connections with leading tech executives, the US administration’s combative posture toward European tech regulation is likely to continue being a point of transatlantic friction. Whether a continued focus by the Trump administration on Europe’s digital rules will create an even stronger push in Europe for an exclusive form of digital sovereignty is not yet evident. What is clear is that without some guidelines, such as those offered in the conclusions to this report, the European Union and United States might find that their differences regarding digital sovereignty and digital rules make creating and maintaining an open transatlantic digital marketplace much more challenging.

Defining the terms of the debate

One reason why digital sovereignty has become an increasingly inflammatory label across the Atlantic is that the lack of a clear definition allows everyone to define it in ways that support their own arguments. Its rise has also coincided with the European embrace of strategic autonomy in foreign and security policy—a notion that has predictably ruffled some US feathers, especially in the defense community. Further confusion has developed as similar terms (i.e., tech sovereignty, cloud sovereignty) have emerged in related areas. To introduce some clarity into this discussion, it can be useful to categorize these different notions.

  • Strategic autonomy: First arising in the context of foreign and security policy, strategic autonomy refers primarily to Europe developing defense and foreign policy capabilities that would allow the EU to play a more independent geopolitical role. Aside from a few defense funding efforts, the idea has not yet inspired major legislative initiatives. To indicate that partnership and autonomy were not contradictory, the EU later adopted the related idea of open strategic autonomy in trade policy. More recently, the EU has begun to embrace the concept of regulatory autonomy—the idea that “the Union’s values, interests, and regulatory autonomy underpin EU action, including in the digital sphere.”5 In these notions, autonomy is a more ambiguous and flexible concept than sovereignty, which implies a legal order backed by legislative initiatives.
  • Technological sovereignty: While the first European Commission headed by von der Leyen focused largely on legislation related to the online world, the importance of technologies—and Europe’s reliance on Chinese and US technologies—had come to the fore by the end of that mandate. This was not only about the digital world, but crucially about the European Green Deal. While the commission argued that carbon reduction would be key to the future EU economy, it became woefully clear that Europe remained dependent on others for many essential technologies: solar panels, wind turbines, semiconductors, electric vehicle batteries, etc.

    Thus, in the second von der Leyen commission, the position of executive vice president for tech sovereignty, security, and democracy was created to oversee the development of EU capabilities to support the digital agenda. Others in the commission, including Executive Vice Presidents Teresa Ribera and Stéphane Séjourné, were tasked with strengthening EU technological capabilities across the Green Deal and industrial strategy generally. In June 2025, a key European Parliament committee defined tech sovereignty as “the ability to build capacity, resilience and security by reducing strategic dependencies, preventing reliance on foreign actors and single service providers, and safeguarding critical technologies and infrastructure.”6 Unlike strategic autonomy, however, tech sovereignty underlies significant legislative initiatives, from the Net Zero Industry Act and the Critical Raw Materials Act to the Public Procurement Directives. It also entails a strong focus on industrial policy, including state aid, competition policy, and other means of boosting key tech-related industries.
  • Digital sovereignty: While often used interchangeably with tech sovereignty, digital sovereignty focuses primarily on the online world. Legislation such as the General Data Protection Regulation (GDPR), Digital Services Act (DSA), Digital Markets Act (DMA), and Artificial Intelligence Act (AIA) have sought to establish a comprehensive system of governance for the online world, especially by regulating corporate behavior vis-à-vis individual or business users. With the exception of semiconductors and the EU Chips Act, much less attention has been paid to the technologies that enable the online world. However, recent proposals for a Eurostack—a European capacity to provide all elements of digital infrastructure, from cables to cloud—are indications of growing European concern about both governance and technologies.7
  • Data sovereignty: This subset of digital sovereignty—one of the earliest variants—initially focused primarily on protection of personal data under the GDPR. However, with the Data Act and other initiatives, increased attention is now paid to the re-use of industrial data that are either sensitive or commercially valuable, and to safeguarding the capacity of EU businesses and governments to exploit data generated in Europe.
  • Cloud sovereignty: The proliferation of data requires enhanced storage capabilities and increased focus on cloud storage and the security of data stored in the cloud. An increasingly sharp debate has centered on whether Europeans’ data should be stored exclusively within the EU, or whether they can be stored outside the EU by non-EU providers considered trustworthy and secure. This discussion has accelerated with the growth of artificial intelligence (AI) and its enormous requirements for cloud services and data centers. Cloud sovereignty also poses questions about how Europeans’ data can be accessed by foreign law enforcement and intelligence agencies.
  • Sovereignty over speech: Users of online services today confront a wide array of illegal or undesirable content, from child sexual abuse material to advertisements for illegal products to political disinformation. EU efforts to regulate platforms’ responsibility for illegal content and systemic risks have recently sparked criticism from the Trump administration, which regards aspects of these efforts as violations of free speech.8 Who has the right to determine allowable speech available online in a jurisdiction other than where it was produced?
  • Cybersecurity: Given the ever-growing number of cyberattacks, both in Europe and globally, the protection of the online world has become a growing element in digital sovereignty. In the past, cybersecurity had not been central to the debate about digital sovereignty, but since the Russian full-scale invasion of Ukraine in 2022 there has been a rapidly growing understanding that resilience against such attacks is an essential part of sovereignty. Europe in particular has faced numerous attacks from Russia and related online actors. The EU effort to establish standards for cybersecurity has already led to US-EU tensions, but there will likely be even more attention paid to cyber-proofing as the EU operationalizes its concept of sovereignty.

An increasingly sharp debate has centered on whether Europeans’ data should be stored exclusively within the EU.

As part of the growing effort to operationalize digital sovereignty, both EU institutions and member states have initiated efforts to elaborate the meaning of this elusive concept. The European Council, in formal conclusions to its October 23 meeting, declared, “It is crucial to advance Europe’s digital transformation, reinforce its sovereignty, and strengthen its own open digital ecosystem,” adding that “this requires reinforced international partnerships and close collaboration with trusted partner countries.”9

On November 18, 2025, the French and German governments convened a Summit on European Digital Sovereignty. The summit identified several areas for building digital sovereignty, including AI, data, and public infrastructure, and launched a joint task force on European digital sovereignty to report in 2026.10 Its final declaration underscored the EU member states’ “shared ambition to strengthen Europe’s digital sovereignty in an open manner as a cornerstone of our economic resilience, social prosperity, competitiveness and security.”11

The European Commission, for its part, issued a Cloud Sovereignty Framework in September 2025 that identifies eight types of sovereignty-related objectives to be considered in the government procurement context. In a stab at precision, the framework encourages contracting authorities to assign each objective a sovereignty effective assurance level (SEAL). The results of that assessment should provide a mathematically derived sovereignty score.12 But as EU discussions on this topic progress, there are still key differences among the member states about the choice between strict autonomy or international partnerships, and whether the model should be based on exclusive EU control or on risk management.

European officials at the Summit on European Digital Sovereignty in Berlin, November 18, 2025. REUTERS/Nadja Wohlleben.
The EU’S Cloud Security Framework, published in October 2025, lays out eight “sovereignty objectives” for procurement authorities to score as they decide what cloud services and products to buy. Source: Cloud Security Framework, European Commission.

Europe’s missing Silicon Valley

While many non-European observers would say that the EU’s regulatory power already gives it significant influence domestically and externally, the EU’s sovereignty in the European digital arena is vulnerable at best. Despite its role as a regulatory superpower, Europe finds itself reliant on non-EU companies for many essential elements of the digital world. A European Parliament report estimates that “the EU relies on non-EU countries for over 80% of digital products, services, infrastructure, and intellectual property.”13 This perception of dependency is at the heart of the EU push for digital sovereignty.

The EU has failed to develop a tech sector with either the vibrancy of Silicon Valley or the growing capabilities of China’s industry. In particular, Europe has not seen the emergence of world-leading new companies based on digital technologies. Indeed, while the US industry has created six companies with a market capitalization of €1 trillion or more, the EU has created none.14 In 2021, three US cloud companies supplied 65 percent of the EU cloud market, while EU-headquartered companies had less than 16 percent.15 As a consequence, European consumers and businesses must rely on non-EU companies—mostly US and some Chinese enterprises—for basic digital services. Initially, this largely applied to software, social media, search engines, and a wide array of shopping services. More recently, the importance of cloud, encryption, and AI, along with the prospective emergence of super-fast quantum computing, has made Europeans realize that this dependence on others has significant and potentially long-lasting effects on their own industries and economies, including those far beyond the tech sector. 

Despite its role as a regulatory superpower, Europe finds itself reliant on non-EU companies for many essential elements of the digital world.

Of course, a few European companies are exceptions to these trends. Nokia and Ericsson were already leaders in the cables and fiber optics that are key to connectivity. They became even stronger in the market as concerns rose about the security of Chinese components. The Dutch company ASML has been a leader in the machines required to make the semiconductors that guide and manage so much of the digital world. SAP is the world’s largest vendor of enterprise resource planning software. But these European companies are not in the same league as their US equivalents in terms of market capitalization. For example, ASML has a market capitalization of $376 billion, while Nvidia is at $4.3 trillion and Microsoft is at $3.8 trillion.16

One consequence of Europe’s struggle in the digital marketplace has been the emergence of an EU-wide debate on competitiveness, as represented most prominently by the reports by former Italian Prime Minister Enrico Letta and former head of the European Central Bank Mario Draghi.17 Draghi specifically underlined the importance of Europe’s failure to develop an innovative tech sector by noting the increasing productivity gap between the EU and the United States, with European labor productivity falling to 80 percent of US productivity. He concluded that this was mainly due to “Europe’s failure to capitalise on the first digital revolution led by the internet—both in terms of generating new tech companies and diffusing digital tech into the economy.”18

The competitiveness debate has also sought to identify the causes of Europe’s lack of digital champions. Europe has a vibrant startup community, as demonstrated by the growing role of venture capital.19 But many of these innovative enterprises end up moving to the United States or elsewhere, while others fail to commercialize entirely. The most popular rationale for this failure to scale—cited by US and European analysts, including Draghi—is overregulation.20 Other suggested reasons include a chronic lack of indigenous capital, overly strict bankruptcy laws, and a culture that fears failure.21 Whatever the reason, Europe’s inability to provide the resources and capabilities for its innovative companies to become continental champions, let alone world leaders, means it must rely on companies from elsewhere.

US Ambassador to the EU Andrew Puzder discusses disparities between major companies founded in the United States and the EU at the 2025 Transatlantic Forum on GeoEconomics, in Brussels, on September 30, 2025. Nicolas Lobet, PRYZM photography.
European Commission President Ursula von der Leyen holds former head of the European Central Bank Mario Draghi’s report on EU competitiveness at a September 2024 press conference in Brussels. Draghi’s report concluded that Europe failed to capitalize on the emergence of the internet to increase productivity. REUTERS/Yves Herman.

This was already the case in 2018, when the GDPR—the first major piece of EU digital legislation—came into force. During the next five years of von der Leyen’s first term as commission president, the EU passed several other pieces of digital legislation, most notably the DSA, DMA, and AIA. These measures made progress in harmonizing diverse member-state laws, both existing and anticipated. But while EU leaders saw this body of legislation as protecting their citizens from the excesses of data collection and illegal social media content, many outside the EU, especially in the US tech community, viewed these laws as overly burdensome at best and discriminatory at worst. Some EU policymakers, such as Member of the European Parliament (MEP) Andreas Schwab, early on were open about their desire to counter the dominance of US firms.22 Others, however, saw Europe as offering a positive alternative to the lightly regulated environment tech companies faced elsewhere. EU rules inevitably had the most impact on US companies, which provided the overwhelming majority of digital services in the EU market. Chinese companies also came to feel the impact of EU regulations as their market share grew over time, especially in shopping and social media.

Throughout this period of intense legislative activity, there were clear voices calling for greater digital sovereignty in Europe. The body of legislation passed in the first von der Leyen commission can certainly be viewed as an effort to place limits on the US companies that dominate Europe’s digital space—and as a way for Europe to regain some control, or sovereignty, over that market. But as competitiveness emerged as a top EU priority in 2023, the discussion about digital sovereignty became part of a much broader discussion about innovation and economic security.

Geopolitics and the rise of tech sovereignty

The earliest indication of a geopolitical element to EU digital sovereignty came during the first Trump administration, when the United States protested the use of Huawei components in European digital networks. Reluctantly at first, Europeans came to understand the risk of a Chinese capability to disrupt those networks and developed the EU Toolbox for 5G Security, a list of best practices released in January 2020. The toolbox identified states and state-backed actors as the most serious threats. It also set out criteria for identifying trusted versus untrusted vendors, including closeness to a foreign government, lack of democratic accountability in that government, lack of a data protection agreement with the EU, and ability of the third country to exercise pressure on the EU.23

The toolbox was the first real effort to identify foreign companies and governments that might threaten Europe’s digital sovereignty and those that might not. There was clearly a focus on China and Chinese companies, as demonstrated by the criteria for vendors. But it should be noted that the toolbox is primarily voluntary guidance developed by the member states for themselves, with progress tracked by regular EU Commission reporting.

In 2019, the EU identified China as both an economic competitor and a “systemic rival,” but initially with little consequence, especially in terms of economic relations.24 Over the next few years, the EU would increasingly focus on China and the dangers posed by its investments in the European economy, especially in critical European infrastructure. By March 2023, when von der Leyen called for de-risking Europe from China,25 commission officials had identified a number of EU dependencies on China—including in critical raw materials, solar panels, and batteries—that had the power to disrupt European industry.26 In June 2023, the commission reported that it considered Huawei and ZTE “materially higher risks” than other fifth-generation (5G) suppliers.27

The EU also initiated a few measures to address those vulnerabilities: heightened screening of inward foreign investment, primarily at the member-state level; enactment of the European Chips Act, providing funding for advanced semiconductor manufacturing in Europe; adoption of the Critical Raw Materials Act, which established goals for EU production of key materials; and passage of the Net Zero Industry Act, which sought to build EU manufacturing capacity in clean technologies such as solar, batteries, and hydrogen. While these measures were not aimed only at China, concerns about that country’s ambitious global plans were a main motivation. Moreover, they had the effect of broadening the initially limited discussion of digital sovereignty beyond the realm of digital governance to include both digital and green technologies, resulting in a broader focus on technological sovereignty.

This European debate regarding the geopolitical dimensions of sovereignty—both digital and tech—intensified significantly following the Russian invasion of Ukraine in February 2022. Along with a focus on territorial security, as seen in the increased defense spending of most EU member states, the EU realized that it needed to address other vulnerabilities. Most urgently, the invasion led to a swift and drastic shift in Europe’s energy supply, as Russia went from providing 45 percent of Europe’s oil and gas in 2021 to 19 percent in 2024.28 But the digital arena was also vulnerable: Russian cyberattacks and apparent sabotage against undersea cables demonstrated the dangers facing Europe’s digital infrastructure, while Russian-origin disinformation flooded European social media.

Perhaps the most important consequence of the Russian invasion, however, was the realization that Europe was vulnerable and that preserving its sovereignty—digital and otherwise—would require concrete actions. Many of the green technology initiatives mentioned above were still in the legislative process when the invasion began but moved to enactment by mid-2023 as the commission’s term began to close and as Europeans became even more conscious of those vulnerabilities. Competitiveness, resilience, and sovereignty became linked together in the concept of economic security as the EU sought to reduce its external dependencies, especially on Russia and China.

By the end of 2024, the tech sovereignty impulse in Europe had become a key policy priority, as demonstrated by the appointment of Henna Virkkunen to the new position of European Commission executive vice president for tech sovereignty, security, and democracy. But before the second von der Leyen commission could get its program under way—or make progress in implementing the Draghi report—Trump’s reelection as US president pushed the impulse toward European digital sovereignty into hyperdrive.

Trump actions spur renewed calls for greater independence

European suspicions about US intentions and capabilities in the digital world have existed since 2013, when Edward Snowden revealed the extent of US National Security Agency interception of Europeans’ communications. Nevertheless, the United States and EU enjoyed relatively open trade in digital services. The advent of the second Trump administration, however, has energized the transatlantic debate over digital sovereignty. While Trump’s focus during the 2024 campaign was on the EU’s trade in goods surplus with the United States, once back in office he frequently criticized the EU’s digital regulations as a whole, despite the US surplus in services trade driven by the success of US tech companies.

Only a month after Trump’s January 2025 inauguration, the White House issued a memorandum on “Defending American Companies and Innovators from Overseas Extortion and Unfair Fines and Penalties,” calling for tariffs and other responses in cases “where a foreign government, through its tax or regulatory structure, imposes a fine, penalty, tax, or other burden that is discriminatory, disproportionate, or designed to transfer significant funds or intellectual property.”29 The memo specifically highlighted “regulations imposed on United States companies by foreign governments that could inhibit the growth or intended operation of United States companies.”30 It also called for the US trade representative to determine whether to renew Section 301 investigations of several digital service taxes (DSTs), including those adopted in France, Austria, Italy, and Spain. The fact sheet accompanying the memo made clear that the target was the European Union and specifically “regulations that dictate how American companies interact with consumers in the European Union, like the Digital Markets Act and the Digital Services Act, will face scrutiny from the Administration.”31

Such an aggressive approach brought the issue of digital sovereignty to the fore, as it seemed to disregard the EU’s right to regulate its own market. As the United States and EU pursued a trade agreement, there were conflicting reports as to whether the DSA and DMA (as well as other EU regulations) were on the negotiating table.32 In the end, the joint statement published on August 21, 2025, did not mention either regulation or the DSTs adopted by several EU member states.

But the joint statement was hardly the last word. On August 25, Trump posted on Truth Social: “As the President of the United States, I will stand up to Countries that attack our incredible American Tech Companies. Digital Taxes, Digital Services Legislation, and Digital Markets Regulations are all designed to harm, or discriminate against, American Technology.”33 Meanwhile von der Leyen, in her September 2025 State of the Union speech, defended the trade deal but also stated: “Whether on environmental or digital regulation, we set our own standards. We set our own regulations. Europe will always decide for itself.”34

The Trump administration has continued criticizing EU digital regulation. For example, on December 16, US Trade Representative Jamieson Greer posted on X (formerly Twitter) that the EU had “persisted in a continuing course of discriminatory and harassing lawsuits, taxes, fines, and directives against U.S. service providers,” and suggested that the United States would retaliate.35 It would be relatively easy for the administration to renew the Section 301 investigations of DSTs. The US government might also look for a mechanism to counter the impact of the DSA and DMA, especially if US companies are fined significantly under those laws. On April 23, 2025, the European Commission fined Apple and Meta €500 million and €200 million, respectively, for noncompliance with the DMA.36 In September, Google was fined €2.95 billion for “distorting competition in the advertising technology industry,” although this case was pursued under the European Commission’s long-time competition authorities rather than under the DMA.37

The commission is also investigating X as well as Meta’s Facebook and Instagram for alleged violations of the DSA, along with separate probes of the Chinese firms AliExpress, Temu, and Tiktok, and several European-based online pornography platforms. On December 5, 2025, the Commission fined X €120 million under the DSA for issues related to its blue checkmarks and advertising repository.38 Beyond these specific cases, the growing criticism of Europe from the US executive branch and parts of Congress, which claim it is censoring “free speech,” is an indication that an influential segment of the Republican Party in the United States will continue to push for action against European efforts to moderate digital content. The EU has been a key target, as has the United Kingdom with its Online Safety Act.

US Commerce Secretary Howard Lutnick and US Trade Representative Jamieson Greer speak after a meeting with the EU Trade Ministers Council in Brussels on November 24, 2025. Lutnick suggested that the EU “reconsider” some digital regulations if the bloc wanted the United States to reduce tariffs on EU steel and aluminum. REUTERS/Piroschka van de Wouw.

At the same time, the European Commission has embarked on a process of simplifying some regulations as part of an effort to make the EU economy more competitive. A digital omnibus—a legislative package designed to amend several regulations across a sector simultaneously—was presented on November 19, 2025.39 As with other commission proposals for simplifying regulations, the digital omnibus focuses on reducing requirements for small and medium-sized enterprises (SMEs), along with streamlining reporting in cases of cybersecurity incidents. It also proposes delaying implementation of AIA requirements for high-risk systems until relevant guidance has been issued and calls for “targeted amendments” to the GDPR to boost innovation, including that related to AI training.40 While simplification is likely to reduce the regulatory burden on tech companies in Europe—including large US companies—it has not yet addressed issues related to digital sovereignty.

Apart from potential revisions to existing legislation, the commission plans to move forward on two tracks. First, the second von der Leyen commission anticipates deploying more financial resources to support research on emerging technologies such as AI and quantum. Early in 2025, von der Leyen announced InvestAI, an initiative to raise €200 billion in investment capital.41 The EU also plans, through the 2025 EU Startup and ScaleUp Strategy, to support startups in their search for the funding that will allow them to grow.42 While these funds should be viewed with some caution—it is unclear whether sufficient private funds will join this public-private effort—they demonstrate the EU’s commitment to building its own capabilities.

Second, the commission has made clear that it will continue to pursue new rules governing activities and companies in the digital arena. The Financial Data Access (FiDA) regulation, now in the final stage of negotiations, is intended to allow greater sharing of financial data among financial institutions in order to develop new digital financial products for consumers. European legacy banks have launched an effort to exclude those companies designated as gatekeepers under the Digital Markets Act from participation in FiDA; this effort will primarily affect US tech companies.43

The EU Cloud and AI Development Act (CADA) will attempt to address the EU’s shortcomings in cloud and AI capacity by encouraging the permitting of new data centers and other infrastructure, and by providing greater computational capacity and resources to startups, especially those focused on AI. But it is also expected to establish EU-wide eligibility requirements for cloud service providers, along with harmonized procurement processes, in ways that could restrict participation by non-EU companies. It is not clear yet whether CADA will address concerns through risk-based assurance models or ownership restrictions. It has reportedly been delayed until the first quarter of 2026 as the commission considers the concept of European effective control as a way of supporting EU digital sovereignty.44

The Digital Fairness Act, expected to be introduced in mid-2026, will be the EU’s flagship legislation for business-to-consumer relations and will address protection of minors online, transparent online pricing, the abuses of manipulative and addictive design, and marketing by influencers—all of which are likely to be of significant interest to US platforms. Other initiatives expected to be launched in the next eighteen months include the ICT Supply Chain Toolbox, the Quantum Europe Strategy, and the Digital Networks Act. Finally, the European Data Union Strategy, released on November 19 along with the digital omnibus, establishes the ambition of “safeguarding the EU’s data sovereignty through a strategic international data policy.”45 It aims to do this by “making fair conditions for data access and cross-border transfer . . . protecting sensitive EU non-personal data . . . and deepening cooperation with trusted partners.”46 While a strategy is not a legislative document, we can expect that it will help guide EU policy on international data flows.

The European Parliament is also active in the digital sovereignty debate. MEP Axel Voss, one of the parliament’s leaders on these issues, wrote in an October 2025 post on LinkedIn: “We need immediate decisions to regain a digitally competitive and sovereign EU. Eurostack, deregulation, venture capital, chips, energy, access to quality data and a flourishing environment for Start Ups and creators are crucial for our sovereignty.47 He proposes a number of measures, from digital special economic zones to using only EU programs within EU institutions to integrating “buy and deploy European tech” in public procurement.48

These initiatives will undoubtedly continue to have an impact on the transatlantic relationship, as they will affect the major actors in the market, most of them American. Even with the best of intentions—and no ambition to exclude those companies—EU adoption and implementation of such rules will likely raise questions about the openness of its future market and the participation of non-EU firms.

The next section explores how the United States and EU have wrestled with the competing pressures of sovereignty and open markets, as presented by a set of key issues relating to government access to data.

Snowden’s relevations and the ‘kill switch

More than a decade has passed since the Snowden revelations, but the topic continues to shadow transatlantic digital relations. Many in Europe hailed Snowden as a hero for revealing Europe’s vulnerability to US signals intelligence, and the European Parliament invited him to appear and speak at a plenary meeting. The Obama administration, which charged Snowden under the Espionage Act, objected vehemently to the invitation and, in the end, Snowden addressed the parliament only by video link.49 Now, however, US domestic sentiment regarding Snowden’s actions has begun to shift, at least in Republican circles, as several of Trump’s advisers have called for him to be pardoned.50

Snowden’s disclosures started a chain of legal proceedings in Europe that generated substantial uncertainty among companies about the legality of their indispensable transfers of personal data to the United States. The Court of Justice of the European Union (CJEU) twice invalidated EU-US international transfer arrangements, judging them insufficient to protect Europeans’ fundamental rights. In 2015, the court struck down the EU-US Safe Harbor Framework, and a successor arrangement, the Privacy Shield, met the same fate in 2020.51 Meta, the object of the litigation both times, took the issue seriously enough that it publicly conceded to US securities regulators that it might need to withdraw Facebook and Instagram from Europe if it could not legally transfer data to the United States.52

A third arrangement, the EU-US Data Privacy Framework (DPF), concluded in 2023, put significant additional safeguards in place for Europeans’ personal data when they are transferred to the United States. It has stabilized the situation, at least for the time being. On September 3, 2025, the EU General Court rejected a challenge to the DPF brought by Philippe Latombe, a French parliamentarian.53 The case tested the sufficiency of US legal reforms made to overcome the CJEU’s 2020 judgment on the Privacy Shield. The court rejected claims that a redress mechanism created by the agreement lacked independence within the US legal system. It also validated the sufficiency of US safeguards relating to the collection of bulk data for intelligence purposes. Latombe has appealed the General Court verdict to the Court of Justice, however, so a definitive verdict on the fate of DPF has yet to be issued.54

The European privacy advocacy organization None of Your Business (NOYB)—headed by well-known Austrian privacy activist Max Schrems, who brought the 2015 and 2020 CJEU cases—reacted with disbelief to the Latombe ruling. Schrems drew attention to Trump administration actions against the independence of the US Privacy and Civil Liberties Oversight Board (PCLOB) and the Federal Trade Commission (FTC). He also said that he is mulling bringing a second challenge to the DPF in EU courts.55

US cloud service providers, including Amazon Web Services and Microsoft, have responded to European unease over data transfers to the United States by introducing service features that allow enterprise customers to store certain types of data exclusively on servers located on the continent.56 Offering to localize data in this fashion can reassure European customers concerned about the long arm of US government’s potential access to their data.

However, the Trump administration exacerbated European anxiety over data flows to and from the United States by briefly cutting off Ukraine from US intelligence sharing in early 2025.57 The specter of a US government kill switch—in the form of an order to US cloud providers to stop commercial data transfers to Europe—has spurred further efforts by US cloud providers to reassure their European customers. Brad Smith, Microsoft’s vice chair and president, went so far as to issue a public statement in April that, “In the unlikely event we are ever ordered by any government anywhere in the world to suspend or cease cloud operations in Europe, we are committing that Microsoft will promptly and vigorously contest such a measure using all legal avenues available, including by pursuing litigation in court.”58

In the unlikely event we are ever ordered by any government anywhere in the world to suspend or cease cloud operations in Europe, we are committing that Microsoft will promptly and vigorously contest such a measure using all legal avenues available, including by pursuing litigation in court.

Brad Smith, “Microsoft Announces New European Digital Commitments,” Microsoft, April 30, 2025, https://blogs.microsoft.com/on-the-issues/2025/04/30/european-digital-commitments.

In response, some European companies have spied a business opportunity. For example, the German company Ecosia and its French counterpart Qwant announced their intention to build a European web index called European Search Perspective (ESP) to compete with Google’s search engine.59 Ecosia’s chief executive officer (CEO) cited concern about the political winds blowing in the United States: “With the US election turning out as it has, I think there is an increased fear that the future US president will do things that we as Europeans don’t like very much . . . We, as a European community, just need to make sure that nobody can blackmail us.” He also emphasized Europe’s current dependence on Google’s services: “If the US turned off access to search results tomorrow, we would have to go back to phone books.”60

The European dream of regaining data sovereignty by generating companies that can compete with the US cloud giants has a long history of failure. Our 2022 report chronicled the ambitious Franco-German effort to develop GAIA-X, a federated data and cloud ecosystem.61 In the years since, the vision of an interoperable network of trusted European cloud providers has had limited success. Its major output is a series of standards, specifications, and labels for European cloud providers, rather than a transformation of the commercial landscape.62

Draghi’s 2024 report on the single market effectively conceded defeat in this area of endeavor. “It is too late for the EU to . . . develop systematic challengers to the major US cloud providers,” Draghi wrote.63 Nonetheless, European anxiety over the possibility, however small, that dominant US platform services could withdraw from the continent, be blocked from serving it by the US government, or be a mechanism for channeling EU data to the US government, will continue to power a push for European sovereign alternatives.

A second continuing impetus is an awareness in Europe—thanks to Snowden—that the dominance of US digital services in Europe offers US intelligence agencies a strategic advantage. The Biden administration even boasted of this during the 2023 congressional debate to reauthorize Section 702 of the Foreign Intelligence Surveillance Act (FISA), a principal authority for collecting intelligence information on non-Americans. The pervasiveness of US digital service providers worldwide, the administration noted, allows US intelligence agencies to “leverage this national advantage to collect foreign intelligence information . . . in order to protect America from its adversaries.”64

US intelligence collection in Europe is not the only challenge to data sovereignty that the EU sees emanating from the United States. Another is the Clarifying Lawful Overseas Use of Data Act (CLOUD Act), a 2018 US law. This statute confirmed that US law enforcement can unilaterally order cloud service providers with a presence in the United States to turn over personal data they host on servers in Europe and other foreign locations for criminal investigations and prosecutions. Although several EU countries, including Belgium, give their law enforcement authorities similar extraterritorial criminal evidentiary powers, this part of the CLOUD Act is seen in Europe as singularly intrusive. When EU legislators call for companies to be immune to foreign law, they are often referring to the CLOUD Act.

However, the CLOUD Act also contains a conciliatory dimension. Part II of the act authorizes the US Department of Justice to negotiate binding international agreements under which criminal investigators and prosecutors can obtain foreign-located electronic evidence directly from providers. Because CLOUD Act agreements are consensual, they do not violate a foreign state’s judicial sovereignty by commanding that a legal measure be taken on its territory. Instead, they remove legal obstacles that companies otherwise face in voluntarily assisting foreign law enforcement. This new type of international agreement can substantially reduce reliance on mutual legal assistance treaties (MLATs), which can be too slow and cumbersome for obtaining e-evidence in fast-moving investigations.

The United States has concluded CLOUD Act agreements with the United Kingdom (UK) and Australia, and negotiations are under way with Canada, all of which are members of the Five Eyes intelligence collective.65 The UK agreement, the first to be concluded, has had a positive effect for that country’s law enforcement agencies.66 According to the US Department of Justice, UK agencies have already made more than twenty thousand direct requests to companies holding electronic evidence in the United States, including many for real-time interception of communications.67 The results “provided UK Law Enforcement and Intelligence Agencies with critical data to tackle the most serious crimes facing UK citizens including terrorism; child sexual exploitation; drug trafficking; and organised crime,” a UK government minister said in late 2023.68

Prosecutors from EU member states have looked across the channel jealously as their UK counterparts have made use of this powerful new investigative tool. In 2019, the EU authorized negotiation of an e-evidence agreement with the United States.69 Talks began in earnest after the EU finalized its controversial counterpart to the CLOUD Act, the 2023 E-Evidence Regulation.70 Progress has been slow and painstaking. In June 2024, senior EU and US home affairs and justice officials issued an optimistic joint statement welcoming “further progress” in the negotiations and looking “forward to advancing and completing” them.71

Source: US Department of Justice

The Trump administration has paused EU-US negotiations without explanation. It might have concluded that CLOUD Act agreements operate overwhelmingly to the advantage of foreign partners—the inevitable consequence of most relevant data being housed on servers located in the United States. As the Trump administration has demonstrated in trade negotiations with foreign countries, it is singularly focused on agreements that it can present as bringing more benefits for the United States. However, such a narrow focus overlooks other benefits of CLOUD Act agreements—sparing cloud providers conflicts of law, deterring data localization measures, and reducing the burden on the mutual legal assistance process.

The EU-US Data Privacy Framework and an e-evidence agreement would neutralize much of the political tension that has prevailed in these realms for more than a decade.

In mid-2025, the UK government added an element of controversy to the use of CLOUD agreements by allegedly serving a request to Apple that it globally disable security features on its products.72 If the UK successfully required Apple to remove security from a product (for example, by building in a backdoor to data that would otherwise be end-to-end encrypted), it could then use the CLOUD Act agreement to request the now-vulnerable data directly from the company. Apple challenged the request in a UK administrative court proceeding and issued a public statement warning customers about the measure’s impact.73 In addition, the White House and Congress sharply criticized the reported UK measure.74 In August, the UK government withdrew its demand for access to Apple US customers’ encrypted data, effectively conceding to the US objection.75 It recently confirmed that the order had been reissued to apply only to UK users.76 The US government could well demand that any EU e-evidence agreement include a similar commitment safeguarding US persons’ data from surveillance by member states’ authorities.

A US-EU e-evidence agreement would be an important advance in calming Europe’s sovereign sensitivities about how US law enforcement authorities collect foreign-located evidence, just as the Data Privacy Framework has at least temporarily allayed Europe’s concerns about US national security agencies’ collection practices. Taken together, the two agreements would neutralize much of the political tension that has prevailed in these realms for more than a decade.

The US u-turn on data flows

After decades of the United States propounding unrestricted international commercial data flows—and bemoaning Europe’s privacy impediments to them—the Biden administration made a dramatic course correction in late 2023.77 Through parallel legislation (the Protecting Americans from Foreign Adversary Controlled Applications Act) and executive action, it imposed controls on certain categories of data exports to China, Russia, and other “foreign adversaries” citing national security reasons.78 Subsequently, the Department of Justice issued a final rule and guidance to companies on compliance and enforcement.79 Both the legislation and regulatory actions were spurred by reports that data brokers were collecting publicly available bulk data on US persons and selling them to foreign governments, which could enable them to—among other things—track the location of US military personnel.80

In addition to enacting domestic measures to limit certain international commercial data flows, the United States reversed course internationally. In the fall of 2023, the Office of the US Trade Representative withdrew its proposal to include in the Joint Statement Initiative on Electronic Commerce (JSI)—a World Trade Organization negotiation—a guarantee of the free flow of data across borders.81 The final text of the JSI, announced in July 2024, not only lacks such an obligation but allows parties essentially unlimited scope to restrict data flows for data protection reasons, precisely as the EU had sought.82 Even with these changes, the United States declined to join the JSI because it regarded the agreement’s national security exception as insufficiently flexible, a move that some European Commission officials found puzzling.83

In contrast to the United States—and despite its long history of controlling data exports through the GDPR—the EU has moved slowly to evaluate the risks of data transfers to authoritarian states such as China and Russia. In 2021, the European Data Protection Board commissioned an outside report from academics that confirmed both countries’ governments have access to individuals’ personal information without commensurate rule-of-law protections, but it took no further action.84 Even Russia’s full-scale invasion of Ukraine has not served to entirely staunch the flow of European data to Russia. The Finnish and Dutch data protection authorities investigated data transfers by Yango, a subsidiary of the Russian search engine Yandex, but have not yet imposed restrictions.85

The data dynamics are a microcosm of Europe’s larger dilemma with China—deep commercial dependency, but also a recognition that a degree of sovereign control is needed.

The past year, however, has seen a gradual shift in European regulators’ thinking regarding data transfers to China. In May 2025, the Irish Data Protection Commission (DPC) fined TikTok €530 million after discovering it was transferring data to China without requisite data protection safeguards.86 In July, the DPC broadened its TikTok inquiry into whether the Chinese government could access such data when they are stored in China.87 The Finnish data protection authority began a separate investigation into possible Chinese government access to health data that a Finnish university had shared with a Chinese genetic analysis company.88

Even Schrems, who has long challenged European data transfers to the United States, has turned his attention to China. Early in 2025, he filed complaints with European data protection authorities against six major Chinese consumer companies, including Shein, Temu, and WeChat, alleging government access to Europeans’ personal data by an “authoritarian surveillance state.89

Recent moves by European data protection authorities to question whether China’s government has impermissible access to Europeans’ personal information mirror the rise in geopolitical tensions between Brussels and Beijing. Ireland’s inquiry into TikTok data transfers, for example, can be read as asserting European data sovereignty against a geopolitical rival. The data dynamics are, in effect, a microcosm of Europe’s larger dilemma with China—deep commercial dependency, but also a recognition that a degree of sovereign control is needed.

A single European data market

Brussels has recently expanded its laws promoting the secondary use of data for commercial, research, and government purposes, in hopes that these innovative legal measures will give homegrown companies a much-needed advantage in competing with data-rich foreign tech giants. However, the transfer of such data to non-EU companies has raised concerns about potentially protectionist restrictions. The Data Governance Act, the Data Act, and the European Health Data Space regulation—all enacted during the first von der Leyen commission—seek to stimulate a market for the secondary use of European data for commercial purposes.90 These measures are based on the recognition that data collected by—and locked within—governmental or commercial organizations can have societal and economic benefits if made available for reuse by other entities.

The 2022 Data Governance Act grew out of a post-pandemic recognition of the potential for reuse of government-held data. It facilitates reuse by the private sector, for both commercial and non-commercial purposes, of government-held data (G2B), including data originally collected by public health, environmental, and transport authorities. Then Commissioner Thierry Breton hailed it as a step toward “an open yet sovereign European Single Market for data.”91

The Data Governance Act was followed a year later by the even more ambitious Data Act, which concentrated on expanding business-to-business sharing of non-personal data, such as the industrial data generated by connected devices. The Data Act sought to ease legal issues that arise with reuse by third parties, such as intellectual property protection and trade secret rules. Both laws insisted upon additional safeguards for transferring data to companies in third countries, such as the United States, where that data could become subject to governmental access. The European Commission further envisaged a series of sector-specific European data spaces, each requiring separate legislation.92 They would cover sectors—from agriculture to energy to transportation—that generate large amounts of industrial data ripe for reuse. The European Health Data Space regulation is the first of this series to be enacted.

At the start of the current commission mandate, von der Leyen’s mission letter to Virkkunen instructed her to deepen focus on the reuse of data. She was asked to “present a European Data Union Strategy drawing on existing data rules to ensure a simplified, clear and coherent legal framework for businesses and administrations to share data seamlessly and at scale, while respecting high privacy and security standards.”93 The commission duly launched a public consultation process, articulating as its aim “expanding the availability and use of data to support AI development.”94 Published on November 19, 2025, the Data Union Strategy seeks to safeguard the EU’s data sovereignty by ensuring fair conditions for cross border flows of non-personal data; “linking EU data ecosystems with those of like-minded partners;” and “boosting the EU voice in global data governance.”95 This is intended to build a comprehensive legal regime for secondary data access that will enable European industry to catch up with the US tech giants that already enjoy access to vast pools of proprietary data.

EU content moderation and free speech

One of the EU’s proudest recent legislative accomplishments is the 2023 Digital Services Act, a sprawling and complex framework regulating online platforms’ accountability for illegal content, including illegal hate speech.96 It imposes the most onerous requirements on very large online platforms, half of which are US companies. The Trump administration and the Republican-led Congress have sharply criticized the DSA, viewing it as a tool for the suppression of right-wing populist political speech.97 On the contrary, the EU views certain DSA provisions, such as transparency tools and safeguards against arbitrary content moderation, as intended to protect free speech.

Trump singled out the DSA for criticism in the February 2025 official memorandum on preventing the “Unfair Exploitation of American Innovation,” while the Republican chair of the Federal Communications Commission called it “incompatible with both our free speech tradition in America and the commitments that these technology companies have made to a diversity of opinions.”98 The US State Department began a diplomatic campaign, alleging, “In Europe, thousands are being convicted for the crime of criticizing their own governments.”99 A leaked August 2025 cable to European posts directed US diplomats to advocate for a narrowing of the DSA’s definition of illegal content, among other ambitions. The European Commission firmly pushed back, describing the censorship allegations as “completely unfounded” and insisting that its digital legislation “will not be changed.”100

The Republican majority on the House of Representatives Judiciary Committee also weighed in with a strongly worded staff report describing the DSA as an “anti-speech, Big Brother law.”101

The report identified a handful of examples of how the act could function to restrict speech extraterritorially. For example, in an August 2024 letter, then Commissioner Breton warned Elon Musk’s X platform that the effects of a campaign interview it hosted with Trump could spill over into the EU and spur commission retaliatory measures under the DSA.102 The committee also cited a request to X by the French national police that the platform remove a post originating from a US-based account suggesting France’s immigration and citizenship policies were to blame for a 2023 terrorist attack a Syrian refugee committed in that country.103

Reform UK party leader Nigel Farage before a House Judiciary Committee hearing entitled “Europe’s threats to American speech and innovation” in Washington, DC, September 3, 2025. REUTERS/Nathan Howard.

The chairman of the US FTC launched a further salvo in August, warning US companies that their very compliance with the EU’s DSA, or with the UK’s similar Online Services Act or its surveillance authorities, could constitute a violation of the FTC Act, which prohibits unfair or deceptive commercial acts or practices. FTC Chairman Andrew N. Ferguson suggested, “It might be an unfair practice to subject American consumers to censorship by a foreign power by applying foreign legal requirements, demands, or expected demands to consumers outside of that foreign jurisdiction.”104

This transatlantic dispute over the DSA and similar content moderation laws reflects differing US and European historical traditions on speech regulation.105 The US Supreme Court has identified only speech creating a “clear and present danger” of inciting violence or other illegal conduct as suitable for restriction. Many European judiciaries, informed by their countries’ twentieth century histories of hate speech, take a more cautious view. For example, Germany bans speech glorifying or denying the Holocaust, while Denmark makes it illegal to burn the Quran. The DSA is the EU’s attempt to ensure that platforms remove content deemed illegal, both offline and online, but the act’s lack of definitions leaves a door open to abuse.

On December 23, 2025, the Trump administration raised the stakes in its free speech campaign against European content moderation laws. Secretary of State Marco Rubio issued determinations under the Immigration and Nationality Act barring from entry into the United States five Europeans associated with content moderation.106 The headliner was Thierry Breton, an architect of the DSA; the others hail from European non-governmental organizations that track hate speech and disinformation on the internet. The European Commission quickly issued a statement that it “strongly condemns” the US actions, reiterating its “sovereign right to regulate economic activity in line with our democratic values.”107 As the Trump administration continues its ideological campaign against the DSA, the transatlantic dispute over free speech seems bound to escalate.

Cybersecurity and cloud services

In 2022, the European Union Agency for Cybersecurity (ENISA) began an effort to harmonize member-state cybersecurity requirements for government data processing contracts. The European Commission averred that cloud services were a “strategic dependency” on a handful of large providers headquartered in the United States.108 Several EU member states, led by France, argued for including sovereignty requirements in the envisaged EU Cybersecurity Scheme (EUCS).

A leaked 2023 ENISA draft proposed that the EU impose sovereignty requirements similar to those in France’s domestic security certification and labeling program, SecNumCloud, for contracts involving the most sensitive government data. SecNumCloud has an announced goal that, in order to obtain a trust certificate, cloud service providers must be “immune to any extra-EU regulation.”109 ENISA proposed incorporating this requirement into EU law as well, adding restrictions on foreign ownership and insisting on localization of cloud services operations and data within the EU.

EU member states divided over whether to adopt such cybersecurity requirements, which could have the effect of disqualifying large foreign cloud service providers from sensitive government data processing contracts. In addition, some European companies, especially in the financial sector, argued that the foreign providers offered greater cybersecurity as well as a superior technical product.110 The Office of the US Trade Representative formally questioned whether the potential EUCS restrictions were consistent with the EU’s obligations under the World Trade Organization’s Government Procurement Agreement (GPA).111

In 2024, the Belgian EU presidency put forward a compromise proposal that discarded the foreign ownership restrictions in favor of data labeling and localization requirements.112 French authorities and technology companies expressed dismay at the prospect of EU-level cybersecurity certification rules weaker than France’s own.113 ENISA has yet to issue the final implementing measure, and this debate could well reemerge in the context of the anticipated CADA.

Looking ahead: Transatlantic tension will persist

The European debate over digital sovereignty—now firmly linked to the wider debate over technological sovereignty—is likely to be a continuing point of tension in the US-EU relationship. For many years, this has been a rhetorical exercise with few real consequences for non-EU firms, especially US companies. But the shift in geopolitics and the increasing drive to support EU industries to build a more competitive economy have led many European policymakers to conclude that now is the time to act. Moreover, the geopolitics are not just about Russia’s aggression or China’s export domination. They are also about the shifts and inconsistencies in US policy that have made many in Europe believe that it must now begin to fend for itself, in terms of both defense and the economy. 

As a result, the debate over digital sovereignty has moved from a discussion of whether there should be limits on non-EU companies to a discussion of how many restrictions there will be, and of what type and in what sectors of the economy. That discussion is likely to be pursued through several key legislative initiatives planned for late 2025 and 2026. CADA is already expected to identify requirements—including sovereign requirements—for cloud services.

The geopolitics are not just about Russia’s aggression or China’s export domination. They are also about the shifts and inconsistencies in US policy that have made many in Europe believe that it must now begin to fend for itself.

Perhaps most relevant, the public procurement directives are already under internal review, with a proposal for revision expected from the commission in 2026.114 Because much of the debate is about who can sell which products and services to whom (including to governments), procurement policy will be a key instrument in imposing sovereign requirements. EU and member-state procurement rules currently privilege price as the key selection criteria but, in the Net Zero Industry Act and other new measures, other considerations have been introduced into the procurement calculation.

As the EU pursues these initiatives, it will face a dilemma: To what degree does sovereignty require autarky? Or does the EU require partnerships, despite the risk of dependencies, because of the current lack of key capabilities? Some in Europe have argued that the right way forward is to develop end-to-end EU capabilities in the form of a Eurostack.115 From fiber-optic networks and computing hardware to software development and cybersecurity capabilities, all would be provided by EU companies.116 Others have pointed to the difficulties with this, asking whether the lack of EU-owned capabilities in cloud, AI, search, and other key functions would doom such an effort to be inferior and thus push Europe farther behind in the race to innovate essential digital technologies for the future. They also fear that European companies will not be able to compete internationally if they are cushioned by sovereign requirements.117 Some see no contradiction between sovereignty and being open to non-EU firms; indeed, they see access to the most innovative global companies as essential, especially given Europe’s competitiveness challenge.118 For others, the key element is timing. The EU tech sector currently lags in innovation but, with proper support and time, it should be fully capable of growing world-leading firms and technologies.119 Indeed, the EU’s International Digital Strategy emphasizes the importance of partners in boosting EU competitiveness and innovation, and the EU’s ambitions in global governance for data can hardly be accomplished without cooperative partners.120

But in all these versions of digital sovereignty, as well as in the larger arena of tech sovereignty, there is a central question: who owns the companies involved, and does it matter if they are not EU firms as long as they abide by EU laws and regulations? The recent negotiations over an EU-wide cloud certification system stalled on exactly this point (see the above discussion of EUCS). The Toolbox for 5G Cybersecurity put forward the concept of a “high-risk supplier” to warn against non-EU companies that were insufficiently independent of their home governments. While this was aimed at Chinese companies—especially Huawei—concerns have more recently focused on the United States and its companies.

The EU’s concerns are not only about the dominant position of US platforms in the European digital market, but also the potential actions of the US government—especially the Trump administration. The administration’s inconsistency on Ukraine, highlighted by its threats in July 2025 to cease sending weapons and other military supplies to Ukraine (reversed shortly after), alarmed many in Europe.121 Reports that the Trump administration threatened to block Ukraine’s access to the vital communications network Starlink during negotiations over critical minerals also raised European concerns.122 While these instances were primarily about defense, not the digital arena, they have created a heightened sense of insecurity in Europe. Coupled with the experience of the trade negotiations, they put into question the reliability of the United States as a partner in any undertaking.

In this environment, the EU will need to make choices about how best to ensure it has sufficient sovereignty over its digital market. Will the answer be found in more restrictions on non-EU companies, or with a more open arrangement that also boosts European economic growth and competitiveness?

Seven recommendations for Brussels and Washington

Given the economic stakes involved for both parties, the EU should engage the United States as it moves forward, and should keep the following guidelines in mind.

Competitiveness is key to innovation and economic success.

Throughout the coming debates over sovereign requirements, the EU must balance the need for security and for its own industrial and digital capabilities with the efficiencies and productivity required for a globally competitive economy. Settling for a more expensive and less capable product or service because it is European owned is not the way to grow the economy. There are times when it is necessary, but these instances should be rare and well considered, not routine.123

Heated rhetoric on either side does not help the economy.

As the EU moves forward with legislation, both Washington and Brussels should seek to lower the temperature. While some US executive orders and statements from top officials have seemed to decry any EU regulation that impedes US companies, the reality is that Europe has the right to regulate as it sees fit in its own market, as does the United States. At the same time, European threats of broad sovereign restrictions do not encourage needed investment. It should not be forgotten that the US-EU trade and investment relationship is the largest such partnership in the world, worth around $1.5 trillion in goods and services trade in 2024, and with mutual investment worth several times that.124 As both parties establish regulatory or investment requirements intended to boost domestic capabilities and add resilience to their economies, there will inevitably be tensions and misunderstandings. Creating barriers to trade and investment is sometimes necessary in limited circumstances, but careful consultations can ameliorate their impact.

A proposal that the trusted circle of cybersecurity providers be based on NATO membership might be appropriate.

As the discussion of data policy demonstrates, the transatlantic economy is not just about products and services, but also the data generated by them. Sharing those data—and being able to use them to generate revenues—is key to success in the digital economy. Of course, those transferring and using data must comply with local laws, including the GDPR. But the US and EU regulatory regimes collide at times, offering inconsistent or even conflicting requirements. Negotiated arrangements, such as the US-EU Data Privacy Framework, can overcome those differences and provide a stable context for business. A US–EU agreement on law enforcement access to data likewise could provide the protections and access both parties need. Similarly, an agreement that facilitates transfers of non-personal data might be useful in response to the Data Act and Data Union Strategy. Now is the time to make sure the United States and EU are developing compatible regimes.

Ringfencing can be a valuable strategy, as can trusted vendors.

Not all suppliers and customers are equal. Arrangements among allies and partners can lessen risks while preserving as much of the open, prosperous economy as possible, even in sensitive sectors. It makes no sense for Europeans to focus more on the transfer of data to the United States than to Russia or China. Using criteria such as those in the EU Toolbox for 5G Cybersecurity to identify foreign companies that can partner in key sectors will provide clarity and ease transactions. Similarly, a proposal floated in the EUCS negotiations that the trusted circle of cybersecurity providers be based on NATO membership might be appropriate. The Group of Seven (G7) could also offer a starting point for developing a set of compatible, interacting regulatory regimes in the digital economy, as it has done to some degree through its discussion of data free flow with trust and the AI principles and code of conduct.125

Certain sectors of the economy are more sensitive than others.

Digital sovereignty requirements should not be imposed on broad swaths of the economy. There are two main reasons for such requirements: national security and creating an indigenous capability in those areas where national economic resiliency is required. Policymakers should carefully identify the areas of the economy where these two reasons apply. Cybersecurity for essential government operations and protecting critical infrastructure are good examples. Management of more prosaic, but still sensitive government data—including where they are stored and who has access—might not need such stringent requirements. Because digital elements—data, cloud, software, and increasingly AI—exist across the economy, it might be more helpful to think about specific functions and make a risk-based assessment of the consequences of failure. Sovereign requirements should be limited to those areas in which a failure or breach will have consequences across society and the economy.

The type of sovereign requirement can vary with the economic sector and even particular conditions.

Among European policymakers, the sovereign requirements currently under discussion can be divided into two types: those that require a supplier to adhere to specific rules and those that involve restrictions relating to the ownership of the company supplying a particular service or product. The first might involve data localization or restricting access to data or use of a particular technology, such as AI. The second, which has been applied in the French SecNumCloud, is far more restrictive and affects the ability of any US-based company to provide the service in question. In some cases, an ownership restriction might exclude companies with the best capabilities from providing the service, and could even expose those using the service to more risk. Thus, ownership restrictions are unlikely to be worthwhile except in rare cases. In the United States, these exist in areas of defense contracting, in which companies dealing with US classified material must set up a US company with US governance and employees. But most government digital contracts, both in the United States and in Europe, are not defense related and would not require such far-reaching ownership rules.

Instead, for those functions in which a breach or disruption would cause significant harm, creating a category of trusted vendors might be appropriate. This could apply to sensitive government functions, as well as to critical infrastructure provided by private-sector enterprises. A system based on trusted vendors could balance the desire to boost local providers while also securing access to top-quality services from non-EU companies. The EU might consider whether there are lessons to be learned from the US government’s FedRAMP system, which certifies companies (including non-US companies) to provide cloud services to different government customers. Companies need to meet criteria that become more restrictive and complex through the three levels of certification (low, moderate, and high).126 While FedRAMP applies across most of the US government, individual agencies have the ability to impose their own requirements, allowing national security and intelligence agencies to impose further restrictions on those involved in classified functions. Despite these exceptions, FedRAMP’s graduated approach—matching certification level to sensitivity of the data—is much more tailored than some European proposals in matching certification requirements to the risk level of the cloud service required.127

Sovereign requirements should be implemented in a consistent manner, including at the member-state level.

One of the persistent challenges of EU policy is ensuring that implementation is the same throughout the union. Both the Draghi and Letta reports cited differences in member-state requirements for businesses (or implementation of those requirements) as a key factor slowing EU competitiveness. The US trade representative has cited as trade barriers numerous instances of different requirements among EU member states, meaning that companies must follow multiple sets of rules even within the single market.128 The European Commission recognized this problem when it decided that, under the DSA, very large online platforms (VLOPs) should be regulated at the EU level, not by member-state authorities. As the EU develops sovereign requirements in the digital sphere, it should be alert to efforts by member states to toughen criteria in ways that add unwarranted restrictions.

While the EU certainly has the right to decide on its own digital sovereignty requirements, those measures will undoubtedly affect access of non-EU companies to the market as well as the capabilities that are accessible to the EU and its member states. There will be costs for the EU, especially as it tries to build a more competitive economy. For that reason, any restrictions should be focused on those circumstances in which risks are high and security is necessary. This exercise should not be about denying access to non-EU companies, but instead about building a secure digital environment and resilient European capabilities. The EU should engage with its partners—not only the United States, but also Japan, South Korea, the UK, and others—to ensure that the fewest possible frictions arise. This will be a test for the transatlantic relationship, but one that can lead to greater cooperation rather than continued angst. 

About the authors

Acknowledgements

The authors would like to thank James Batchik, Emma Nix, and Jack Muldoon for their tireless support on the report’s editing, research, and data visualization.

Related content

Explore the program

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    See, for example: “Von der Leyen Puts Digital Sovereignty at the Heart of EU’s 2025 Agenda,” Council of European Informatics Societies, September 16, 2025, https://cepis.org/von-der-leyen-puts-digital-sovereignty-at-the-heart-of-eus-2025-agenda/.
2    See the earlier work of the authors: Frances G. Burwell and Kenneth Propp, “The European Union and the Search for Digital Sovereignty: Building ‘Fortress Europe’ or Preparing for a New World?”Atlantic Council, June 2020, https://www.atlanticcouncil.org/wp-content/uploads/2020/06/The-European-Union-and-the-Search-for-Digital-Sovereignty-Building-Fortress-Europe-or-Preparing-for-a-New-World.pdf; Frances Burwell and Kenneth Propp, “Digital Sovereignty in Practice: The EU’s Push to Shape the New Global Economy,” Atlantic Council, November 2, 2022, https://www.atlanticcouncil.org/in-depth-research-reports/report/digital-sovereignty-in-practice-the-eus-push-to-shape-the-new-global-economy/.
3    Donald J. Trump, Truth Social post, August 25, 2025, https://truthsocial.com/@realDonaldTrump/posts/115092243259973570; Elena Giordano, “EU Resists Trump: Tech Regulation Is Our ‘Sovereign Right,” Politico,August 26, 2025, https://www.politico.eu/article/eu-resists-trump-tech-regulation-is-our-sovereign-right/.
4    “Lutnick Talks EU Tech Rules, Nvidia H200 Chips, SCOTUS Tariff,” Bloomberg, November 24, 2025, https://www.bloomberg.com/news/videos/2025-11-24/lutnick-talks-eu-tech-rules-nvidia-h200-chips-tariffs-video.
5    “European Council Meeting (23 October 2025) Conclusions,” European Council, October 23, 2025, https://www.consilium.europa.eu/media/d2nhnqso/20251023-european-council-conclusions-en.pdf.
6    Sarah Knafo, “Report on European Technological Sovereignty and Digital Infrastructure,” European Parliament, Committee on Industry, Research and Energy, June 11, 2025, https://www.europarl.europa.eu/doceo/document/A-10-2025-0107_EN.html.
7    Cristina Caffarra, et al., “Deploying the Eurostack: What’s Needed Now,” Eurostack Initiative, May 19, 2025, https://eurostack.eu/wp-content/uploads/2025/08/eurostack-white-paper-final-19-05-25-3.pdf.
8    Kenneth Propp, “Talking Past Each Other: Why the US-EU Dispute over ‘Free Speech’ Is Set to Escalate,” Atlantic Council, August 15, 2025, https://www.atlanticcouncil.org/blogs/new-atlanticist/us-eu-dispute-over-free-speech-is-set-to-escalate/.
9    “European Council Meeting (23 October 2025) Conclusions.”
10    “Summit on European Digital Sovereignty Delivers Landmark Commitments for a More Competitive and Sovereign Europe,” Élysée, November 18, 2025, https://www.elysee.fr/en/emmanuel-macron/2025/11/18/summit-on-european-digital-sovereignty-delivers-landmark-commitments-for-a-more-competitive-and-sovereign-europe.
11    “Declaration for European Digital Sovereignty,” Council of the European Union, December 5, 2025, https://data.consilium.europa.eu/doc/document/ST-15781-2025-INIT/en/pdf.
13    Knafo, “Report on European Technological Sovereignty and Digital Infrastructure.”
14    Mario Draghi, “The Future of European Competitiveness,” European Commission, September 9, 2024, https://commission.europa.eu/topics/eu-competitiveness/draghi-report_en.
15    Ibid.
16    “Largest Tech Companies by Market Cap,” CompaniesMarketCap, last visited September 27, 2025, https://companiesmarketcap.com/tech/largest-tech-companies-by-market-cap/.
17    Enrico Letta, “Much More than a Market,” European Council, April 2024, https://www.consilium.europa.eu/media/ny3j24sm/much-more-than-a-market-report-by-enrico-letta.pdf.
18    Draghi, “The Future of European Competitiveness.
19    Ivan Levingston, “European Start-up Valuations Boom on Investor Frenzy,” Financial Times, September 5, 2025, https://www.ft.com/content/5cd37cea-87e7-4648-b85b-f77091dd4558.
20    Draghi, “The Future of European Competitiveness.
21    Ramsha Jahangir, “What’s Behind Europe’s Push to ‘Simplify’ Tech Regulation?” Tech Policy Press, April 24, 2025, https://www.techpolicy.press/whats-behind-europes-push-to-simplify-tech-regulation/.
22    Javier Espinosa, “EU Should Focus on Top 5 Tech Companies, Says Leading MEP,” Financial Times, May 31, 2021, https://www.ft.com/content/49f3d7f2-30d5-4336-87ad-eea0ee0ecc7b.
23    “Cybersecurity of 5G Networks: EU Toolbox of Risk Mitigation Measures,” European Commission, January 23, 2020, https://digital-strategy.ec.europa.eu/en/library/cybersecurity-5g-networks-eu-toolbox-risk-mitigating-measures.
24    “EU–China—A Strategic Outlook,” European Commission and European External Action Service, March 12, 2019, https://commission.europa.eu/system/files/2019-03/communication-eu-china-a-strategic-outlook.pdf.
25    “Speech by President von der Leyen on EU-China Relations to the Mercator Institute for China Studies and the European Policy Centre,” European Commission,March 29, 2023, https://ec.europa.eu/commission/presscorner/detail/en/speech_23_2063.
26    “Strategic Dependencies and Capacities,” European Commission, May 5, 2021, https://commission.europa.eu/system/files/2021-05/swd-strategic-dependencies-capacities_en.pdf.
27    “Commission Announces Next Steps on Cybersecurity of 5G Networks in Complement to Latest Progress Report by Member States,” European Commission, press release, June 14, 2023, https://ec.europa.eu/commission/presscorner/detail/en/ip_23_3309.
28    “Roadmap Towards Ending Russian Energy Imports,” European Commission, May 12, 2025, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52025DC0440R(01).
29    “Defending American Companies and Innovators from Overseas Extortion and Unfair Fines and Penalties,” White House, February 21, 2025, https://www.whitehouse.gov/presidential-actions/2025/02/defending-american-companies-and-innovators-from-overseas-extortion-and-unfair-fines-and-penalties/.
30    Ibid.
31    “Fact Sheet: President Donald J. Trump Issues Directive to Prevent the Unfair Exploitation of American Innovation,” White House,February 21, 2025, https://www.whitehouse.gov/fact-sheets/2025/02/fact-sheet-president-donald-j-trump-issues-directive-to-prevent-the-unfair-exploitation-of-american-innovation.
32    Alice Hancock, Paola Tamma, and James Politi, “EU Push to Protect Digital Rules Holds Up Trade Statement with US,” Financial Times, August 17, 2025. https://www.ft.com/content/3f67b6ca-7259-4612-8e51-12b497128552.
33    Truth Social, August 25, 2025.
34    “2025 State of the Union Address by President von der Leyen,” European Commission, September 9, 2025, https://ec.europa.eu/commission/presscorner/detail/ov/SPEECH_25_2053.
35    U.S. Trade Representative, X post, December 16, 2025, https://x.com/USTradeRep/status/2000990028835508258.
36    “Commission Finds Apple and Meta in Breach of the Digital Markets Act,” European Commission, press release, April 23, 2025, https://digital-strategy.ec.europa.eu/en/news/commission-finds-apple-and-meta-breach-digital-markets-act.
37    “Commission Fines Google €2.95 Billion over Abusive Practices in Online Advertising Technology,” European Commission, press release, September 4, 2025, https://ec.europa.eu/commission/presscorner/detail/en/ip_25_1992.
38    “Commission fines X €120 million under the Digital Services Act,” European Commission, press release, December 5, 2025, https://digital-strategy.ec.europa.eu/en/news/commission-fines-x-eu120-million-under-digital-services-act.
39    Mark MacCarthy and Kenneth Propp, “The European Union Changes Course on Digital Legislation,” Lawfare, December 15, 2025, https://www.lawfaremedia.org/article/the-european-union-changes-course-on-digital-legislation.
40    “Simpler EU Digital Rules and New Digital Wallets to Save Billions for Businesses and Boost Innovation,” European Commission, press release, November 19, 2025, https://ec.europa.eu/commission/presscorner/detail/en/ip_25_2718.
41    “EU Launches InvestAI Initiative to Mobilise €200 Billion of Investment in Artificial Intelligence,” European Commission, press release, February 10, 2025, https://ec.europa.eu/commission/presscorner/detail/en/ip_25_467.
42    “Commission Launches Ambitious Strategy to Make Europe a Startup and Scaleup Powerhouse,” European Commission, press release, May 27, 2025, https://ec.europa.eu/commission/presscorner/detail/en/ip_25_1350.
43    Barbara Moens and Paola Tamma, “EU to Block Big Tech from New Financial Sharing Data System,” Financial Times, September 21, 2025, https://www.ft.com/content/6596876f-c831-482c-878c-78c1499ef543.
44    Luca Bertuzzi, “‘Effective control’ concept for cloud sovereignty eyed by EU Commission,” MLex, September 4, 2025, https://www.mlex.com/mlex/articles/2384011/-effective-control-concept-for-cloud-sovereignty-eyed-by-eu-commission?trk=public_post_comment-text.
45    “European Data Union Strategy,” European Commission,November 19, 2025, 18–20, https://digital-strategy.ec.europa.eu/en/policies/data-union.
46    Ibid.
47    Axel Voss, “Regaining Europe’s Digital Sovereignty: Ten Immediate Actions for 2025,”EPP Group at the European Parliament, October 7, 2025, https://www.axel-voss-europa.de/wp-content/uploads/2025/10/AVoss-10-Steps-Digital-Sovereignty.pdf.
48    Ibid.
49    Peter Finn and Sari Horwitz, “US Charges Snowden with Espionage,” Washington Post, June 21, 2013, https://www.washingtonpost.com/world/national-security/us-charges-snowden-with-espionage/2013/06/21/507497d8-dab1-11e2-a016-92547bf094cc_story.html; Dave Keating, “European Parliament to Hear Snowden testimony,” Politico, January 9, 2014, https://www.politico.eu/article/european-parliament-to-hear-snowden-testimony/.
50    Michael Scherer, “Trump Advisers Renew Push for Pardon of Edward Snowden,” Washington Post, December 4, 2024, https://www.washingtonpost.com/politics/2024/12/04/trump-pardon-edward-snowden-gaetz/.
51    Schrems v. Data Protection Commissioner, CASE C-362/14 (Court of Justice of the EU 2015), https://curia.europa.eu/juris/document/document.jsf?text=&docid=169195&pageIndex=0&doclang=en&mode=lst&dir=&occ=first&part=1&cid=2522200; Data Protection Commissioner v. Facebook Ireland & Schrems, CASE C-311/18 (Court of Justice of the EU 2020), https://curia.europa.eu/juris/document/document.jsf?text=&docid=228677&pageIndex=0&doclang=EN&mode=lst&dir=&occ=first&part=1&cid=4010715.
52    “Meta Platforms, Inc. Annual Report Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1933 for the Fiscal Year Ended on December 31, 2022,” US Securities and Exchange Commission, 2022, https://www.sec.gov/Archives/edgar/data/1326801/000132680123000013/meta-20221231.htm.
53    “Data Protection: The General Court Dismisses an Action for Annulment of the New Framework for the Transfer of Personal Data between the European Union and the United States,” Court of Justice of the European Union, press release, September 3, 2025, https://curia.europa.eu/jcms/upload/docs/application/pdf/2025-09/cp250106en.pdf.
54    Claudie Moreau and Théophane Hartmann, “Latombe to Appeal EU-US Data Transfer Court Challenge,” Euractiv, October 29, 2025, https://www.euractiv.com/news/exclusive-latombe-to-appeal-eu-us-data-transfer-court-challenge/.
55    “EU-US Data Transfers: First Reaction on ‘Latombe’ Case,” Noyb, September 3, 2025, https://noyb.eu/en/eu-us-data-transfers-first-reaction-latombe-case.
56    Matt Garman and Max Peterson, “AWS Digital Sovereignty Pledge: Announcing a New, Independent Sovereign Cloud in Europe,” AWS Security Blog, October 24, 2023, https://aws.amazon.com/blogs/security/aws-digital-sovereignty-pledge-announcing-a-new-independent-sovereign-cloud-in-europe/; Julie Brill and Erin Chapple, “Microsoft Announces the Phased Rollout of the EU Data Boundary for the Microsoft Cloud Begins January 1, 2023,” Microsoft EU Policy Blog, December 15, 2022, https://blogs.microsoft.com/eupolicy/2022/12/15/eu-data-boundary-cloud-rollout/.
57    Emily Benson, Max Bergmann, and Federico Steinberg, “The Transatlantic Tech Clash: Will Europe ‘De-Risk’ from the United States?” Center for Strategic and International Studies, May 2, 2025, https://www.csis.org/analysis/transatlantic-tech-clash-will-europe-de-risk-united-states.
58    Brad Smith, “Microsoft Announces New European Digital Commitments,” Microsoft, April 30, 2025, https://blogs.microsoft.com/on-the-issues/2025/04/30/european-digital-commitments.
59    Alex Matthews, “Can Europe Build Itself a Rival to Google?” Deutsche Welle, December 9, 2024, https://www.dw.com/en/european-search-engines-ecosia-and-qwant-to-challenge-google/a-70898027.
60    Ibid.
61    Burwell and Propp, “Digital Sovereignty in Practice.”
62    Mathieu Pollet, “Anatomy of a Franco-German Tech Misfire,” Politico, November 17, 2025, https://www.politico.eu/article/anatomy-franco-german-tech-misfire-american-dependence/.
63    Draghi, “The Future of European Competitiveness,” 34.
64    “President’s Intelligence Advisory Board (PIAB) and Intelligence Oversight Board (IOB) Review of FISA Section 702 and Recommendations for Reauthorization,” White House, July 2023, 3, https://int.nyt.com/data/documenttools/presidents-intelligence-advisory-board-and-intelligence-oversight-board-review-of-fisa-section-702-and-recommendations-for-reauthorization/4d2d3218303fc702/full.pdf.
65    “Landmark U.S.-UK Data Access Agreement Enters into Force,” US Department of Justice, press release, October 3, 2022, https://www.justice.gov/archives/opa/pr/landmark-us-uk-data-access-agreement-enters-force; “United States and Australia Enter CLOUD Act Agreement to Facilitate Investigations of Serious Crime,” US Department of Justice, press release, December 15, 2021, https://www.justice.gov/archives/opa/pr/united-states-and-australia-enter-cloud-act-agreement-facilitate-investigations-serious-crime; “United States and Canada Welcome Negotiations of a CLOUD Act Agreement,” US Department of Justice, press release, March 22, 2022, https://www.justice.gov/archives/opa/pr/united-states-and-canada-welcome-negotiations-cloud-act-agreement.
66    Robert Deedman and Kenneth Propp, “The U.K.-US Data Access Agreement,” Lawfare, June 20, 2025, https://www.lawfaremedia.org/article/the-u.k.-u.s.-data-access-agreement.
67    “Report Concerning the Attorney General’s Renewed Determination that the United Kingdom of Great Britain and Northern Ireland, and the Agreement between the Government of the United States of America and the Government of the United Kingdom of Great Britain and Northern Ireland on Access to Electronic Data for the Purpose of Countering Serious Crime, Satisfy the Requirements of 18 USC. § 2523(B),” US Department of Justice, November 2024, https://www.documentcloud.org/documents/25551978-doj-report-to-congress-on-us-uk-cloud-act-agreement/.
68    Tom Tugendhat, “UK-US Data Access Agreement: First Year of Use,” UK Parliament, December 19, 2023, https://questions-statements.parliament.uk/written-statements/detail/2023-12-19/hcws152?source=email.
69    “Recommendation for a Council Decision Authorizing the Opening of Negotiations in View of an Agreement between the European Union and the United States of America on Cross-Border Access to Electronic Evidence for Judicial Cooperation in Criminal Matters,” European Commission, February 5, 2019, https://eur-lex.europa.eu/resource.html?uri=cellar:b1826bff-2939-11e9-8d04-01aa75ed71a1.0001.02/DOC_1&format=PDF.
70    “Council Adopts EU Laws on Better Access to Electronic Evidence,” Council of the European Union, press release, June 27, 2023, https://www.consilium.europa.eu/en/press/press-releases/2023/06/27/council-adopts-eu-laws-on-better-access-to-electronic-evidence/.
71    “Joint Press Release Following the EU-US Ministerial on Justice and Home Affairs, 21 June 2024 (Brussels),” US Department of Homeland Security, June 28, 2024, https://www.dhs.gov/archive/news/2024/06/28/joint-press-release-following-eu-us-ministerial-justice-and-home-affairs-21-june.
72    Richard Salgado and Kenneth Propp, “Patching the U.K.’s Zero-Day Security Exploit With the US-U.K. CLOUD Act Agreement,” Lawfare, July 31, 2025, https://www.lawfaremedia.org/article/patching-the-u.k.-s-zero-day-security-exploit-with-the-u.s.-u.k.-cloud-act-agreement.
73    Zoe Kleinman, “UK Demands Access to Apple Users’ Encrypted Data,” BBC, February 7, 2025, https://www.bbc.com/news/articles/c20g288yldko; “Apple Can No Longer Offer Advanced Data Protection the United Kingdom to New Users,” Apple, September 23, 2025, https://support.apple.com/en-gb/122234.
74    Deedman and Propp, “The U.K.-US Data Access Agreement.”
75    Annabelle Timsit and Joseph Menn, “U.K. Drops ‘Back Door’ Demand for Apple User Data, US Intel Chief Says,” Washington Post, August 19, 2025, https://www.washingtonpost.com/technology/2025/08/19/uk-apple-backdoor-data-privacy-gabbard.
77    Kenneth Propp, “Transatlantic Digital Trade Protections: From TTIP to ‘Policy Suicide?’” Lawfare, February 16, 2024, https://www.lawfaremedia.org/article/transatlantic-digital-trade-protections-from-ttip-to-policy-suicide.
78    “Protecting Americans from Foreign Adversary Controlled Applications Act,” in emergency supplemental appropriations, Pub. L. No. 118–50, 118th Cong. (2024), https://www.congress.gov/bill/118th-congress/house-bill/7520/text; “Executive Order on Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern,” White House, February 28, 2024, https://bidenwhitehouse.archives.gov/briefing-room/presidential-actions/2024/02/28/executive-order-on-preventing-access-to-americans-bulk-sensitive-personal-data-and-united-states-government-related-data-by-countries-of-concern/.
79    “Fact Sheet: Justice Department Issues Final Rule to Address Urgent National Security Risks Posed by Access to USU.S. Sensitive Personal and Government-Related Data from Countries of Concern and Covered Persons,” US Department of Justice, December 27, 2024, https://www.justice.gov/archives/opa/media/1382526/dl; “Data Security Program: Compliance Guide,” US Department of Justice, April 11, 2025, https://www.justice.gov/opa/media/1396356/dl.
80    Justin Sherman, et al., “Data Brokers and the Sale of Data on US Military Personnel: Risks to Privacy, Safety, and National Security,” Duke Sanford Tech Policy Program, November 2023, https://techpolicy.sanford.duke.edu/data-brokers-and-the-sale-of-data-on-us-military-personnel/.
81    Propp, “Transatlantic Digital Trade Protections.”
82    “Joint Statement Initiative on Electronic Commerce,” World Trade Organization, July 26, 2024, https://docs.wto.org/dol2fe/Pages/SS/directdoc.aspx?filename=q:/INF/ECOM/87.pdf&Open=True.
83    Kenneth Propp, “Who’s a National Security Risk? The Changing Transatlantic Geopolitics of Data Transfers,” Atlantic Council, May 29, 2024, https://www.atlanticcouncil.org/wp-content/uploads/2024/05/Whos-a-National-Security-Risk-The-Changing-Transatlantic-Geopolitics-of-Data-Transfers_Final.pdf.
84    Government Access to Data in Third Countries: Final Report,” Milieu Consulting, November 2021, https://www.edpb.europa.eu/system/files/2022-01/legalstudy_on_government_access_0.pdf.
85    “The Data Protection Ombudsman’s Decision Does Not Address the Legality of Data Transfers to Russia—the Matter Remains under Investigation,” Office of the Data Protection Ombudsman, September 27, 2023, https://tietosuoja.fi/en/-/the-data-protection-ombudsman-s-decision-does-not-address-the-legality-of-data-transfers-to-russia-the-matter-remains-under-investigation#:~:text=The%20Office%20of%20the%20Data%20Protection%20Ombudsman%27s%20decision,Protection%.
86    “Irish Data Protection Commission Fines TikTok €530 Million and Orders Corrective Measures Following Inquiry into Transfers of EEA User Data to China,” Data Protection Commission of Ireland, May 2, 2025, https://www.dataprotection.ie/en/news-media/latest-news/irish-data-protection-commission-fines-tiktok-eu530-million-and-orders-corrective-measures-following.
87    “DPC Announces Inquiry into TikTok Technology Limited’s Transfers of EEA Users’ Personal Data to Servers Located in China,” Data Protection Commission of Ireland, July 10, 2025, https://www.dataprotection.ie/en/news-media/press-releases/dpc-announces-inquiry-tiktok-technology-limiteds-transfers-eea-users-personal-data-servers-located.
88    Kristof Van Quathem and Anna Sophia Oberschelp de Meneses, “Finnish Supervisory Authority Investigates Health Data Transfers to China,” Covington, March 19, 2025, https://www.insideprivacy.com/cross-border-transfers/finnish-supervisory-authority-investigates-health-data-transfers-to-china/.
89    “TikTok, AliExpress, SHEIN & Co Surrender Europeans’ Data to Authoritarian China,” Noyb, January 16, 2025, https://noyb.eu/en/tiktok-aliexpress-shein-co-surrender-europeans-data-authoritarian-china.
90    “Regulation (EU) 2022/868 of the European Parliament and of the Council of 30 May 2022 on European Data Governance and Amending Regulation (EU) 2018/1724 (Data Governance Act),” Official Journal of the European Union, May 30, 2022, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32022R0868; “Regulation (EU) 2023/2854 of the European Parliament and of the Council of 13 December 2023 on Harmonised Rules on Fair Access to and Use of Data and Amending Regulation (EU) 2017/2394 and Directive (EU) 2020/1828 (Data Act),” Official Journal of the European Union, December 13, 2023, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L_202302854; “Regulation (EU) 2025/327 of the European Parliament and of the Council of 11 February 2025 on the European Health Data Space and Amending Directive 2011/24/EU and Regulation (EU) 2024/2847,” Official Journal of the European Union, February 11, 2025, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L_202500327.
91    “Commission Proposes Measures to Boost Data Sharing and Support European Data Spaces,” European Commission, press release, November 24, 2020, https://ec.europa.eu/commission/presscorner/detail/en/ip_20_2102.
92    “Common European Data Spaces,” European Commission, October 27, 2025, https://digital-strategy.ec.europa.eu/en/policies/data-spaces.
93    “Mission Letter: Henna Virkkunen, Executive Vice-President-Designate for Tech Sovereignty, Security and Democracy,” European Commission, September 17, 2024, https://commission.europa.eu/document/download/3b537594-9264-4249-a912-5b102b7b49a3_en?filename=Mission%20letter%20-%20VIRKKUNEN.pdf.
94    “Public Consultation on the Use of Data to Develop the Future of AI: The European Data Union Strategy,” European Data, June 25, 2025, https://data.europa.eu/en/news-events/news/public-consultation-use-data-develop-future-ai-european-data-union-strategy.
95    “Communication from the Commission to the European Parliament and the Council: Data Union Strategy: Unlocking Data for AI,” European Commission, November 19, 2025. https://digital-strategy.ec.europa.eu/en/policies/data-union.
96    “Regulation (EU) 2022/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market for Digital Services and Amending Directive 2000/31/EC (Digital Services Act),” Official Journal of the European Union, October 27, 2022, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32022R2065.
97    Jeanna Smialek and Adam Satariano, “Something Else for Europe and the US to Disagree About: ‘Free Speech,’” New York Times, April 4, 2025, https://www.nytimes.com/2025/04/04/world/europe/european-union-free-speech-x-facebook-elon-musk.html.
98    “Fact Sheet: President Donald J. Trump Issues Directive to Prevent the Unfair Exploitation of American Innovation”; Supantha Mukherjee, “US FCC Chair Says EU Digital Services Act Is Threat to Free Speech,” Reuters, March 3, 2025, https://www.reuters.com/technology/eu-content-law-incompatible-with-us-free-speech-tradition-says-fccs-carr-2025-03-03/.
99    Department of State (@StateDept), “In Europe, thousands are being convicted for the crime of criticizing their own governments. This Orwellian message won’t fool the United States. Censorship is not freedom,” X post, July 22, 2025, https://x.com/statedept/status/1947755665520304253.
100    Humeyra Pamuk, “Rubio Orders US Diplomats to Launch Lobbying Blitz against Europe’s Tech Law,” Reuters, August 7, 2025, https://www.reuters.com/sustainability/society-equity/rubio-orders-us-diplomats-launch-lobbying-blitz-against-europes-tech-law-2025-08-07.
101    “The Foreign Censorship Threat: How the European Union’s Digital Services Act Compels Global Censorship and Infringes on American Free Speech,” Committee on the Judiciary of the US House of Representatives, July 25, 2025, https://judiciary.house.gov/sites/evo-subsites/republicans-judiciary.house.gov/files/2025-07/DSA_Report%26Appendix%2807.25.25%29.pdf.
102    Mark Scott, “EU Takes Shot at Musk over Trump Interview—and Misses,” Politico, August 13, 2024, https://www.politico.eu/article/eu-elon-musk-donald-trump-interview-thierry-breton-letter-social-media/.
103    “The Foreign Censorship Threat.”
104    “Model Letter sent to Tech Companies from Chairman Andrew N. Ferguson,” US Federal Trade Commission, August 21, 2025, https://www.ftc.gov/system/files/ftc_gov/pdf/ftc-unfair-security-letter-ferguson.pdf.
105    Propp, “Talking Past Each Other.”
106    “Announcement of Actions to Combat the Global Censorship-Industrial Complex,” US Department of State, press release, December 23, 2025, https://www.state.gov/releases/office-of-the-spokesperson/2025/12/announcement-of-actions-to-combat-the-global-censorship-industrial-complex/.
107    “Statement by the European Commission on the U.S. Decision to impose travel restrictions on certain EU individuals,” European Commission, press release, December 23, 2025,  https://ec.europa.eu/commission/presscorner/detail/en/statement_25_3160.
108    “EU Strategic Dependencies and Capacities: Second Stage of In-Depth Reviews,” European Commission, February 22, 2022, https://www.wec-italia.org/wp-content/uploads/2022/02/STRATEGIC-DEPENDENCIES-2022.pdf.
109    “Doctrine ‘Cloud au Centre’ sur l’Usage de l’Informatique en Nuage au Sein de l’État,” Government of the Republic of France, July 5, 2021, https://www.transformation.gouv.fr/files/presse/Circulaire-n6282-SG-5072021-doctrineuutilisation-informatique-en-nuage-Etat.pdf.
110    Laura Kabelka, “Sovereignty Requirements Remain in Cloud Certification Scheme Despite Backlash,” Euractiv, July 16, 2022, https://www.euractiv.com/news/sovereignty-requirements-remain-in-cloud-certification-scheme-despite-backlash.
111    “2024 National Trade Estimate Report on Foreign Trade Barriers,” Office of the US Trade Representative, March 2024, https://ustr.gov/sites/default/files/2024%20NTE%20Report_1.pdf.
112    Floris Hulshoff Pol, “EU Drops Sovereignty Rules for US Cloud Providers,” Techzine, April 4, 2024, https://www.techzine.eu/news/privacy-compliance/118401/eu-drops-sovereignty-rules-for-u-s-cloud-providers/.
113    Reynald Fléchaux, “EUCS, la Certification Cloud Européenne qui Menace de Désarmer SecNumCloud,” CIO, September 12, 2024, https://www.cio-online.com/actualites/lire-eucs-la-certification-cloud-europeenne-qui-menace-de-desarmer-secnumcloud-15856.html.
114    Francesco Nicoli, “Mapping the Road Ahead for EU Public Procurement Reform,” Bruegel, March 21, 2025, https://www.bruegel.org/first-glance/mapping-road-ahead-eu-public-procurement-reform.
115    Théophane Hartmann, “European Industry Big Win: Germany, France Both Support Sovereign EU-Based Tech Infrastructure,” Euractiv, April 10, 2025, https://www.euractiv.com/news/european-industry-big-win-germany-france-both-support-sovereign-eu-based-tech-infrastructure/.
116    Michal Kobosko, “A European Recipe for Tech Sovereignty,” Parliament, July 30, 2025, https://www.theparliamentmagazine.eu/news/article/oped-a-european-recipe-for-tech-sovereignty.
117    For a detailed discussion of the challenges facing Eurostack and the more exclusionary version of EU digital sovereignty, see: Zach Meyers, Can the EU Reconcile Digital Sovereignty and Economic Competitiveness? Centre on Regulation in Europe, September 2025, https://cerre.eu/wp-content/uploads/2025/09/CERRE_Issue-Paper_EU-Competitiveness_Can-the-EU-reconcile-digital-sovereignty-and-economic-competitiveness.pdf.
118    “Clearing the Cloud,” Implement Consulting Group in collaboration with Google,November 2025, https://cms.implementconsultinggroup.com/media/uploads/articles/2025/European-digital-sovereignty/2025-Clearing-the-cloud.pdf.
119    See, for example: “Open Letter: European Industry Calls for Strong Commitment to Sovereign Digital Infrastructure, Euro-Stack, March 14, 2025, https://euro-stackletter.eu/wp-content/uploads/2025/03/EuroStack_Initiative_Letter_14-March-.pdf. The letter, signed by numerous European companies, argues for increased support to European industry to build a Eurostack, while not restricting access by non-EU companies.
120    “Joint Communication on an International Digital Strategy for the EU,”European Commission and EU High Representative for Foreign and Security Policy, June 5, 2025, https://digital-strategy.ec.europa.eu/en/library/joint-communication-international-digital-strategy-eu.
121    Amy Mackinnon, Jamie Dettmer, and Paul McLeary, “Europe Scrambles to Aid Ukraine after US Intelligence Cutoff,” Politico, March 8, 2025, https://www.politico.com/news/2025/03/08/europe-scrambles-to-aid-ukraine-after-us-intelligence-cutoff-00219678.
122    Andrea Shalal and Joey Roulette, “US Could Cut Ukraine’s Access to Starlink Internet Services over Minerals, Say Sources,” Reuters, February 22, 2025, https://www.reuters.com/business/us-could-cut-ukraines-access-starlink-internet-services-over-minerals-say-2025-02-22/.
123    For a discussion of the relationship between digital sovereignty and competitiveness, see: Christian Klein, “The Boss of SAP on Europe’s Botched Approach to Digital Sovereignty: It’s Time to Prioritise Code over Concrete,” Economist, August 25, 2025, https://www.economist.com/by-invitation/2025/08/25/the-boss-of-sap-on-europes-botched-approach-to-digital-sovereignty
124    “European Union,” Office of the United States Trade Representative, last visited December 11, 2025, https://ustr.gov/countries-regions/europe-middle-east/europe/european-union.
125    “G7 Roadmap for Cooperation on Data Free Flow with Trust,” Group of Seven, 2021, https://assets.publishing.service.gov.uk/media/609cf5e18fa8f56a3c162a43/Annex_2__Roadmap_for_cooperation_on_Data_Free_Flow_with_Trust.pdf;“G7 Leaders’ Statement on the Hiroshima AI Process,” Group of Seven,October 30, 2023, https://digital-strategy.ec.europa.eu/en/library/g7-leaders-statement-hiroshima-ai-process.
126    For details on the FedRAMP program, see: “FedRAMP Provides a Standardized, Reusable Approach to Security Assessment and Authorization for Cloud Service Offerings,” FedRAMP, last visited December 11, 2025, https://www.fedramp.gov.
127    For a discussion of the differences between FedRAMP and EUCS, see: Kenneth Propp, “Oceans Apart: The EU and US Cybersecurity Certification Standards for Cloud Services,” Cross Border Data Forum, June 27, 2023, https://www.crossborderdataforum.org/wp-content/uploads/2023/07/Oceans-Apart-The-EU-and-US-Cybersecurity-Certification-Standards-for-Cloud-Services.pdf.
128    “2025 National Trade Estimate Report on Foreign Trade Barriers,” Office of the US Trade Representative, 2025, https://ustr.gov/sites/default/files/files/Press/Reports/2025NTE.pdf.

The post Digital sovereignty: Europe’s declaration of independence? appeared first on Atlantic Council.

]]>
Transatlantic cooperation on protecting minors online https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/transatlantic-cooperation-on-protecting-minors-online/ Wed, 14 Jan 2026 05:00:00 +0000 https://www.atlanticcouncil.org/?p=897128 There is widespread agreement among US and EU officials on the need to protect children online. US-EU dialogue on areas of commonality could facilitate a more efficient rollout of services and technologies to protect users.

The post Transatlantic cooperation on protecting minors online appeared first on Atlantic Council.

]]>

Bottom lines up front

  • While US and EU policies differ in their approaches to the regulation of the internet, recent policy roundtables made clear that there is agreement on the need to protect children online.
  • Areas of commonality include the use of primary legislation, an emphasis on platform design rather than censoring content, and the need to balance protection of children with other fundamental rights.
  • Further dialogue between the United States and the EU on these questions could help facilitate faster and more efficient rollout of services and technologies to protect users.

Executive summary

While US and European Union (EU) policies differ in their approaches to online safety and the regulation of the internet, there is agreement about the need to protect children online. That is one high-level takeaway from a recent round of US-EU dialogue hosted by the Centre on Regulation in Europe (CERRE) and the Atlantic Council.

Such dialogue helps to identify common policy approaches for the protection of minors and common approaches to enforcing rules. Ultimately, it can also help facilitate faster and more efficient rollout of technologies to protect users. Dialogue will also help global platforms develop services to comply with rules and expectations on both sides of the Atlantic.

At the recent roundtable hosted by CERRE and the Atlantic Council, the synergies and differences in regulatory approaches and philosophies on both sides of the Atlantic centred on four themes. For each theme, some common threads seemed ripe for further discussion and cooperation.

  • New legislation and approaches to enforcement: In terms of the overall governance landscape, legislation has a key role to play in Europe and in the United States, where long-standing federal rules have been supported by an increasing number of state laws.The bulk of legislation in the EU—such as the Digital Services Act (DSA)—is adopted at the EU level, while some member states are adopting supplementary rules. In the United States, most legislation is now being adopted at the state level. Public enforcement by regulators plays a big role in the EU and the United Kingdom (UK). In the United States, state attorneys general are taking action to enforce rules, with powers similar to those of regulators in Europe. More alignment and cooperation on enforcement would be beneficial. Private enforcement through courts is also possible but, while this is already widespread in the United States, it is just emerging in Europe.
  • The harms from which children should be protected: On both sides of the Atlantic, there is a large degree of alignment on the harms from which children need to be protected. A strong commonality is that rules in Europe and the US both require compliance by design to avoid particularly harmful conduct, such as unwanted contact by unknown adults. Other common design elements include data minimization, which is a central component of the European Commission’s guidelines on protecting minors under Article 28 of the DSA and in the UK Office of Communication’s (Ofcom) age-appropriate design code and guidance under the Online Safety Act (OSA).
  • Balancing rights: To balance the protection of fundamental rights (in particular, privacy and freedom of expression) against the need to protect children, there is widespread agreement that everyone—not just children—deserves protections online. The EU, UK, and United States are all cautious about dictating which content is acceptable online and are instead converging on approaches that require platforms to use processes and systems to ensure safety by design. Ensuring the protection of fundamental rights is a common concern and, ultimately, a matter of balance, including at the enforcement level.
  • Age verification: Current debates about banning access to social media and about age verification are critical in Europe and in the United States, both in general and in relation to certain types of platforms (particularly those that host pornographic content). There is no agreement on a single type of technology that should be used, but there are prototypes and guidance on the high-level principles that the technologies should reflect. There are similar discussions on both sides of the Atlantic about how to attribute responsibility for age assurance across the supply chain—i.e., where in the supply chain age verification should take place—and how the division of responsibilities between players in supply chains could work in practice.

Introduction

The EU has put in place important legal building blocks to protect children online. These include the DSA and the European Commission’s guidelines on Article 28 of the DSA, which require providers of platforms accessible to minors to “put in place appropriate and proportionate measures to ensure a high level of privacy, safety, and security of minors.”1 They also include the Audiovisual Media Services Directive (AVMSD), which contains rules to safeguard minors’ personal data and to protect children online, and the General Data Protection Regulation (GDPR), which provides rules on collection and processing of minors’ data. Other proposals yet to be finalized include the pending Digital Fairness Act (DFA) proposal and the Regulation on Child Sexual Abuse Material (CSAM).2 Member states retain certain powers to enact national laws to protect minors online.3

In the United States, the protection of minors online is an important consideration at both the federal and state levels. At the federal level, the Kids Online Safety Act (KOSA) proposal, the Children’s Online Privacy Protection Act (COPPA) and the COPPA 2.0 proposal all seek to address certain aspects of children’s safety online (in particular, privacy, advertising, and CSAM).4 At the state level, California’s Age-Appropriate Design Code (CAADCA) has been challenged in court on First Amendment grounds.5 Other states, including Nebraska and Vermont, have recently adopted similar codes that they hope will withstand First Amendment scrutiny.6 Utah has also recently enacted a law to protect content-creating minors from financial exploitation and privacy violations.7

News headlines focus on apparent differences between US and European policies, which are spiraling into growing transatlantic tension. However, there is a large degree of alignment on the need to protect children online while also safeguarding fundamental rights such as privacy and freedom of expression.

The overall governance landscape

The European and US approaches are fairly aligned on some governance aspects of regulating child protection online. Since the adoption of its rules for video sharing platforms in 2018, the EU has embraced a legislative path to protect minors online.8 This legislative framework was strengthened in 2022 with the adoption of the DSA. Both the video sharing platform rules and the DSA are largely principle based and rely on a form of collaboration with the industry,placing the onus on the platforms themselves to decide what constitutes an appropriate and proportionate level of protection for minors. The UK has also adopted a legislative path with the OSA and the detailed guidance produced by Ofcom.9 Like the DSA, the OSA adopts a risk-based approach, with the larger and riskier platforms subject to stricter measures. The UK regulator, Ofcom, has supplemented the legislation with detailed guidance.

The European Commission recently adopted guidelines to help online platforms understand and comply with their obligations under Article 28 of the DSA, including setting out a list of recommendations for platforms, but these are nonbinding. Safety by design is at the heart of the guidelines. The EU’s legislative approach focuses on ensuring platforms put in place systems and processes, while steering away from regulating the type of content that should be outlawed.

So far, the EU’s legislative framework has not led to a full harmonization of approaches to protect minors, and some member states have adopted more restrictive approaches. For example, France, Germany, Ireland, and Italy have adopted supplementary legislation to protect minors from harmful content such as online pornography.10

In the United States, the federal government has adopted legislation such as the COPPA to tackle some problematic areas such as the need to protect minors’ personal data.11 Despite heightened partisanship in Congress, leaders of both the Republican and Democratic Parties have expressed interest in supporting additional bipartisan legislation to protect children online.12 Although there is less appetite for federal legislation with binding obligations on platforms in terms of platform liability, there is appetite at the state level to embrace the legislative path, and safety by design is the cornerstone of many of these initiatives.13 That being said, the Kids Online Safety Act (a federal initiative) received the support of sixty co-sponsors at the federal level, which shows that this is an area with some bipartisan support. The EU and the United States are also converging on some important aspects: more obligations are placed on larger platforms; there is an emphasis on protection and safety by design; and there is no “one size fits all” solution.

There is broad consensus among experts that, irrespective of geopolitical tensions, there has never been so much space for alignment at the policy level between different jurisdictions—and between Europe and the United States in particular. This is partly because Europe (with the DSA at the EU level and the OSA in the UK) takes a systemic risk approach and does not focus on moderating individual pieces of content. That places responsibility on the platforms to have processes and systems in place to design safe spaces at the outset.

There are also similarities in public and private enforcement of norms. In the EU and the UK, regulators play an important role in making sure that industry complies with the DSA, the AVMSD, and the OSA. In the United States, even if new federal laws are adopted, the creation of a dedicated federal regulator to publicly enforce the legislation is unlikely, though existing agencies such as the US Federal Trade Commission already have a remit over some of these issues. At the state level, attorneys general are empowered to enforce COPPA via civil actions despite it being a federal law. State attorneys general have many enforcement tools at their disposal, including the power to undertake industry-wide investigations. These are broadly in line with the enforcement powers of national competent authorities and the European Commission under the DSA (and Ofcom under the OSA). On both sides of the Atlantic, private enforcement through courts is also set to play an important role, though, to date, it has been more common in the United States than in either the EU or UK.

Harms against which children should be protected

In the EU, the harms against which children should be protected are potentially very wide and are not specifically defined in the DSA, which refers only to protecting minors’ “privacy, safety and security.”14 Furthermore, member states are free to set their own rules provided they are in the line with EU legislation.

Some harms are outlawed at the EU level, such as the sharing of child sexual abuse material, dark patterns (i.e., deceptive techniques used by online platforms to manipulate users’ behavior), the processing of minors’ personal data without the consent of parents, and the sending of targeted advertising to children based on profiling.15 US policy initiatives at the state and federal levels also identify these harms as targets for regulation. The dissemination of child sexual abuse material, for example, is already a criminal offense.

A strong focus of legislation to protect minors on both sides of the Atlantic is to make sure that children cannot be contacted on platforms by unknown adults. At the state level (Vermont in particular) lawmakers frame these as safety bills to avoid framing them as content regulation, which could bring challenges on First Amendment grounds. These design architecture elements, such as default settings that prevent children being findable, are also central in the European Commission’s guidelines on Article 28 of the DSA in the UK Information Commissioner’s Office’s age-appropriate design code and in Ofcom guidance under the OSA.16

Data minimization (meaning only a minimum amount of data can be gathered and processed) is seen as critical to mitigating harms in general, because there is a strong correlation between collecting vast amounts of data about children’s behavior online and using the data to target minors with harmful content. Also, data minimization could lead to stronger protection for all users. While enforcing data minimization principles is a challenge, it can be done. In the UK, for example, Ofcom is required to work closely with the data protection authority. Operational coherence and cooperation between regulators are crucial in this area.

Balancing fundamental rights

The debate about balancing the need to protect children against the protection of certain fundamental rights (especially privacy, freedom of expression, and the rights of the child) is critical in the United States and in Europe. Initiatives in Europe and the United States tend to focus on tools and processes to protect minors, but steer away from regulating content on the platforms. Despite this, there is mounting debate regarding whether laws are creating a form of censorship or unlawfully constraining free speech, limiting users’ choices, or infringing on the rights of children. The question is wider than the need to protect children online, in the sense that some content can be inherently dangerous for some individuals whereas that same content might not be harmful for another person (minor or adult). This need to protect users from harmful (but legal) content is the most difficult to reconcile with the need to protect freedom of speech and the need for data minimization.

In the United States, the question is being argued in court. Some federal courts have ruled that laws requiring age verification are unconstitutional because they undermine the US Constitution’s First Amendment and threaten privacy rights.17 Age verification laws are being challenged by NetChoice (a coalition of tech companies) and by free speech coalitions. The Supreme Court recently ruled that the age verification law in Texas does not violate the First Amendment because it only requires proof of age to access content that is obscene to minors; it does not directly regulate adults’ speech.18 In both the EU and the United States, a considerable amount of policy work and research is being conducted on how to balance safety and privacy, especially in the context of age assurance requirements.19

At the EU level, the debate about balancing rights was not prominent while the DSA and the AVMSD were being adopted, probably because the rules were principles based and did not mention bans or age verification per se. Furthermore, the DSA contains safeguards to protect fundamental rights, such as giving users’ the right to challenge content moderation decisions (such as removals of posts, demotions of content, and account suspensions). The central article on the protection of minors in the DSA (Article 28) assumes that there cannot be safety for minors unless other rights, such as privacy, are protected as well.

Now that the DSA is being enforced, the protection of minors has become an enforcement priority for the European Commission, and some member states are calling for bans on children accessing social media platforms, some political parties are questioning the legislation and the push for age verification solutions on free speech grounds. This debate is particularly intense in the context of the regulation on the fight against CSAM, which the European Parliament and the Council of the EU are amending in an attempt to reduce the impacts of CSAM detection mechanisms on privacy, particularly in the context of end-to-end encryption.

The ultimate goal should be to protect everyone online, not just minors. This would avoid the need to put in place age assurance and age verification.

The debates on getting the balance right on the need to protect minors online and the need to protect some fundamental rights are crystallizing on age verification and on proposals for an outright ban on access to social media for children.

To date, there is no outright ban at the EU level on children accessing social media. Commission President Ursula von der Leyen had pledged to examine the questionwith the help of a panel of experts originally scheduled to be set up before the end of 2025.20 Some member states are also discussing the option of a social media ban for children.21 There is a strong call in the commission’s recently adopted guidelines under the DSA for certain platforms (such as adult content platforms) to prevent children from accessing them. Also, the Danish presidency of the EU and ministers from twenty-five member states recently adopted the Jutland Declaration, which welcomed “assessments” of a digital majority age.22 This assessment could help to determine the age at which minors should be allowed access to social media and other digital services—“giving them more time to enjoy life without an invasive online presence.”23 This question is also high on the agenda in the United States, with some states requiring social media to ban minors from accessing them (or requiring parental consent for a minor to have an account).24

On age verification, there is no mandatory technology at the EU level, but the EU guidelines on the protection of minors adopted under the DSA set out principles that age verification technology used by online platforms should meet.25 In particular, the systems should be based on the “double anonymity” principle. According to this principle, the platform knows the age of users without identifying them, whereas an external site—which carries out the age verification by issuing a token—does not know which site the user will visit. The EU is also about to launch an EU mini-wallet as a temporary solution, pending the adoption of national solutions.26 Some member states have also set requirements on age verification that are enforced by national regulators.

In the UK, the OSA has just entered into force, and the biggest and most popular adult platforms such as Pornhub must now deploy age checks for users based in the UK. Other platforms—including Bluesky, Discord, Reddit, and X—have also announced that they will deploy age assurance in the UK as a result of the act. This has led to a surge in virtual private network (VPN) downloads, which shows the importance of global alignment where possible.

In the United States, as noted above, state legislation imposing age verification is subject to frequent court challenges.27 As in Europe, there is little agreement among the states on the methods and tools to use when verifying the age of online users. Also, like in Europe, states seem to recognize that age assurance alone is not the solution.

On both sides of the Atlantic, the debates are similar in practice, including debates regarding how to attribute responsibility for age assurance across the supply chain (i.e., at what level age verification should take place, whether at the app store layer or by individual applications or websites). Questions about where verification happens raise additional questions about the extent to which other players in the chain can rely on this, or whether relying on a single point of verification could undermine safety by discouraging applications and websites from making their own assessments.

About the author

Michèle Ledger is a researcher at the Research Centre in Information, Law and Society (CRIDS) of the University of Namur where she also lectures on the regulatory aspects of online platforms at the postmaster degree course. She has been working for more than twenty years at Cullen International and leads the company’s Media regulatory intelligence service.

This issue brief benefits from the insights of discussants at an online roundtable on EU-US regulatory co-operation hosted jointly by CERRE and the Atlantic Council. However, the contents of this brief are attributable only to the author.

About CERRE

Providing high-quality studies and dissemination activities, the Centre on Regulation in Europe (CERRE) is a not-for-profit think tank. It promotes robust and consistent regulation in Europe’s network, digital industry, and service sectors. CERRE’s members are regulatory authorities and companies operating in these sectors, as well as universities.

CERRE’s added value is based on

  • its original, multidisciplinary, and cross-sector approach covering a variety of markets (e.g., energy, mobility, sustainability, technology, media, and telecommunications);
  • the widely acknowledged academic credentials and policy experience of its research team and associated staff members;
  • its scientific independence and impartiality; and
  • the direct relevance and timeliness of its contributions to the policy and regulatory development process impacting network industry players and the markets for their goods and services.

CERRE’s activities include contributions to the development of norms, standards, and policy recommendations related to the regulation of service providers, to the specification of market rules, and to improvements in the management of infrastructure in a changing political, economic, technological, and social environment. CERRE’s work also aims to clarify the respective roles of market operators, governments, and regulatory authorities, as well as contribute to the enhancement of those organizations’ expertise in addressing regulatory issues of relevance to their activities.

About the Atlantic Council

The Atlantic Council promotes constructive leadership and engagement in international affairs based on the Atlantic community’s central role in meeting global challenges. The council provides an essential forum for navigating the dramatic economic and political changes defining the twenty-first century by informing and galvanizing its uniquely influential network of global leaders. The Atlantic Council—through the papers it publishes, the ideas it generates, the future leaders it develops, and the communities it builds—shapes policy choices and strategies to create a more free, secure, and prosperous world.

The Atlantic Council’s Europe Center conducts research and uses real-time analysis to inform the actions and strategies of key transatlantic decision-makers in the face of great-power competition and a geopolitical rewiring of Europe. The center convenes US and European leaders to promote dialogue and make the case for the US-EU partnership as a key asset for the United States and Europe alike. The center’s Transatlantic Digital Marketplace Initiative seeks to foster greater US-EU understanding and collaboration on digital policy matters and makes recommendations for building cooperation and ameliorating differences in this fast-growing area of the transatlantic economy.

Related content

Explore the program

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    “Regulation (EU) 2022/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market for Digital Services and Amending Directive 2000/31/EC,” European Union, October 19, 2022, https://eur-lex.europa.eu/eli/reg/2022/2065/oj; “Communication from the Commission—Guidelines on Measures to Ensure a High Level of Privacy, Safety and Security for Minors Online, Pursuant to Article 28(4) of Regulation (EU) 2022/2065,” European Union, 2025, https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:C_202505519.
2    “Proposal for a Regulation of the European Parliament and of the Council Laying Down Rules to Prevent and Combat Child Sexual Abuse,” European Union, May 11, 2022, https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:52022PC0209; “Digital Fairness Act,” European Commission, last visited December 22, 2025, https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/14622-Digital-Fairness-Act_en.
3    Miriam Buiten, Michèle Ledger, and Christoph Busch, “DSA Implementation Forum: Protection of Minors,” Centre on Regulation in Europe, March 25, 2025, https://cerre.eu/publications/dsa-implementation-forum-protection-of-minors/.
4    A new version of the KOSA has been introduced in Congress with changes in an attempt to clarify that KOSA does not censor, limit, or remove content from the internet. “Blumenthal, Blackburn, Thune & Schumer Introduce the Kids Online Safety Act,” Office of Senator Richard Blumenthal, press release, May 14, 2025, https://www.blumenthal.senate.gov/newsroom/press/release/blumenthal-blackburn-thune-and-schumer-introduce-the-kids-online-safety-act; “Children’s Online Privacy Protection Rule,” Federal Trade Commission, April 22, 2025, https://www.federalregister.gov/documents/2025/04/22/2025-05904/childrens-online-privacy-protection-rule; “S.1418—Children and Teens’ Online Privacy Protection Act,” US Congress, July 27, 2023, https://www.congress.gov/bill/118th-congress/senate-bill/1418/text.
5    “AB-2273: The California Age-Appropriate Design Code Act,” California Legislative Information, November 18, 2022, https://leginfo.legislature.ca.gov/faces/billCompareClient.xhtml?bill_id=202120220AB2273&showamends=false; “NetChoice v. Rob Bonta, Attorney General of the State of California, D.C. No. 5:22-cv-08861- BLF,” US Court of Appeals for the Ninth Circuit, August 16, 2024, https://cdn.ca9.uscourts.gov/datastore/opinions/2024/08/16/23-2969.pdf.
6    For a comparison between both initiatives see: Bailey Sanchez, “Vermont and Nebraska: Diverging Experiments in State Age-Appropriate Design Codes,” Future of Privacy Forum, June 4, 2025, https://fpf.org/blog/vermont-and-nebraska-diverging-experiments-in-state-age-appropriate-design-codes.
7    “Child Actor Regulation,” State of Utah, 2025, https://le.utah.gov/Session/2025/bills/enrolled/HB0322.pdf.
8    “Directive (EU) 2018/1808 of the European Parliament and of the Council of 14 November 2018 Amending Directive 2010/13/EU on the Coordination of Certain Provisions Laid Down by Law, Regulation or Administrative Action in Member States Concerning the Provision of Audiovisual Media Services (Audiovisual Media Services Directive) in View of Changing Market Realities,” Article 28b, https://eur-lex.europa.eu/eli/dir/2018/1808/oj/eng.
9    “Online Safety Regulatory Documents and Guidance,” Ofcom, last updated December 15, 2025, https://www.ofcom.org.uk/online-safety/online-safety-regulatory-documents.
10    Michèle Ledger, “Protection of Minors: Age Assurance,” Centre on Regulation in Europe, March 2025, https://cerre.eu/wp-content/uploads/2025/03/CERRE-DSA-Forum-Age-Assurance.pdf.
11    “Part 312—Children’s Online Privacy Protection Rule (COPPA Rule),” Code of Federal Regulations, last updated April 22, 2025, https://www.ecfr.gov/current/title-16/chapter-I/subchapter-C/part-312.
12    “Chairmen Guthrie and Bilirakis Announce Legislative Hearing on Protecting Children and Teens Online,” Office of Energy and Commerce Chairman Brett Guthrie, press release, November 25, 2025, https://energycommerce.house.gov/posts/chairmen-guthrie-and-bilirakis-announce-legislative-hearing-on-protections-for-children-and-teens-online.
13    “Public Interest Privacy Center Releases Updated State Law Maps,” Public Interest Privacy Center, press release, May 29, 2025, https://publicinterestprivacy.org/state-law-maps.
14    “Article 71 Commitments—the Digital Services Act,” European Union, last visited January 3, 2025, https://www.eu-digital-services-act.com/Digital_Services_Act_Article_71.html.
15    The European Commission defines dark patterns as unfair commercial practices deployed through the structure, design, or functionalities of digital interfaces or system architecture that can influence consumers to take decisions they would not have taken otherwise. “Questions and Answers on the Digital Fairness Fitness Check,” European Commission, October 2, 2024, https://ec.europa.eu/commission/presscorner/detail/fi/qanda_24_4909.
16    “Age Appropriate Design: A Code of Practice for Online Services,” Information Commissioner’s Office, last visited December 22, 2025, https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/childrens-information/childrens-code-guidance-and-resources/age-appropriate-design-a-code-of-practice-for-online-services/.
17    Ibid.
18    Texas Legislature, Relating to the publication or distribution of sexual material harmful to minors on an Internet website; providing a civil penalty, HB 1181, Passed June 12, 2023, https://capitol.texas.gov/billlookup/History.aspx?LegSess=88R&Bill=HB1181; “Free Speech Coalition, Inc., et al. v. Paxton, Attorney General of Texas,” US Supreme Court, June 17, 2025, https://www.supremecourt.gov/opinions/24pdf/23-1122_3e04.pdf.
19    Stephen Balkam and Andrew Zack, “Balancing Safety and Privacy: A Proportionate Age Assurance Approach,” Family Online Safety Institute, October 10, 2025, https://fosi.org/policy/balancing-safety-and-privacy-a-proportionate-age-assurance-approach/.
20    “2025 State of the Union Address by President von der Leyen,” European Commission, September 9, 2025, https://ec.europa.eu/commission/presscorner/detail/ov/SPEECH_25_2053.
21    In particular, these states include Denmark, Greece, France, Spain, Italy, Ireland, and Poland.
22    “The Jutland Declaration: Shaping a Safe Online World for Minors,” Danish Presidency, Council of the European Union, October 10, 2025, https://www.digmin.dk/Media/638956829775203140/DIGMIN_The%20Jutland%20Declaration%20Shaping%20a%20Safe%20Online%20World%20for%20Minors%20101025.pdf.
23    Ibid., 2.
24    These states include Arkansas, Florida, Georgia, Ohio, and Utah.
25    These principles concern accuracy, reliability, robustness, privacy and data protection safeguards, and non-discrimination.
26    “Communication from the Commission.”
27    “Age Assurance & Age Verification Laws in the United States,” Centre for Information Policy Leadership, September 2024, https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/cipl_age_assurance_in_the_us_sept24.pdf.

The post Transatlantic cooperation on protecting minors online appeared first on Atlantic Council.

]]>
Singapore must shift from state-led expansion to productivity-led growth https://www.atlanticcouncil.org/in-depth-research-reports/report/singapore-must-shift-from-state-led-expansion-to-productivity-led-growth/ Fri, 09 Jan 2026 14:44:37 +0000 https://www.atlanticcouncil.org/?p=896983 Singapore’s GDP has tripled since the 1990s. Now the city-state needs a new social compact that matches its high-income status. Creating space for productivity, entrepreneurship, and open debate will decide whether Singapore’s prosperity benefits more Singaporeans—or becomes increasingly fragile.

The post Singapore must shift from state-led expansion to productivity-led growth appeared first on Atlantic Council.

]]>

Bottom lines up front

  • The “Singapore model” of a market economy under heavy government direction has led to strong headline numbers that obscure signs of significant stress.
  • High land and housing costs, extreme inequality, and a very low fertility rate suggest that everyday life feels precarious for many in one of the world’s richest cities.
  • Singapore needs a new playbook—otherwise the model may start to look more like a warning.

This is the fourth chapter in the Freedom and Prosperity Center’s 2026 Atlas. The Atlas analyzes the state of freedom and prosperity in ten countries. Drawing on our thirty-year dataset covering political, economic, and legal developments, this year’s Atlas is the evidence-based guide to better policy in 2026.

Evolution of freedom

Singapore’s post-independence development strategy was clear and, for a long time, well suited to the country’s advantages and constraints. A free port under British colonial rule since 1819, Singapore separated from Malaysia in 1965, which made continued outward orientation an existential necessity for the city-state’s survival. Developed-country trade liberalization encouraged offshore sourcing by multinationals, enabling Singapore’s government to build an export-oriented economy anchored in foreign direct investment. It prioritized manufacturing, later adding high-end services, and used targeted industrial policy to achieve its priorities. The strategy was reinforced by disciplined macroeconomic management, public investment in world-class infrastructure, and efficient public administration.

But what made the approach distinctive was not just openness to trade and investment—it was also the degree to which the state integrated regulatory, proprietorial, and allocative power. The government planned land use, owned most of the land base, channeled compulsory savings, and exercised strategic ownership through sovereign wealth funds and government-linked companies. This tight coupling of state and market produced order and speed and made full use of a global economic environment that favored openness. At the same time, however, it embedded government discretion at the center of daily life.

The economic engine was an extensive growth model, which expanded output by adding capital and labor to a fixed land base, rather than by sustained gains in total factor productivity. Singapore incentivized multinationals to produce in the country, scaled public investment, and—critically—liberalized foreign labor inflows to keep costs predictable. That choice made sense when the priority was to build a platform economy quickly. It is less convincing as a path to future prosperity. Heavy reliance on lower-wage foreign workers depresses incentives to automate, redesign jobs, and raise productivity. At the same time, large inflows of higher-skilled foreigners add to demand for scarce urban resources and amenities, especially housing, putting pressure on prices and widening social distance. Such social distance is seen where differences in income, opportunities, and daily living conditions deepen divides between groups. In such a system, the state can point to impressive aggregate outcomes while households at the lower end experience stagnant real wages and rising costs.


Households at the lower end experience stagnant real wages and rising costs.

Institutionally, Singapore has combined strong commercial rule of law and administrative capability with persistently narrow political competition. Elections are regular and cleanly administered, but contestation is constrained. The playing field is shaped by districting changes implemented shortly before each election; official campaign periods that last just nine days; and a long tradition of filing defamation actions against critics, including for statements made during the hustings. Mainstream media is not fully independent—there is substantive state ownership and oversight—and online speech is governed by broad statutes that give the executive sweeping, fast-acting powers. Passage of POFMA (Protection from Online Falsehoods and Manipulation Act) in 2019 and FICA (Foreign Interference [Countermeasures] Act) in 2021 was justified by the government as defenses against misinformation and foreign interference, but the measures have also generated uncertainty about what is out of bounds. In practice, the fear and reality of punishment lead risk-averse citizens and institutions to overcomply. The effect is anticipatory discipline, more than visible coercion, engendering a climate in which people self-censor and where policy debate narrows.

The legal environment reinforces this equilibrium. Singapore courts are efficient, free from corruption, and commercially reliable—central reasons investors locate there. But the same state that regulates also owns land, large companies, and the largest pools of domestic savings. Political appointments, the use of civil defamation in political contexts, and the fusion of political and administrative authority create ambiguity for anyone engaged in contentious public speech or organizing. For most commercial actors, rules are clear and enforcement swift; for citizens considering robust political contestation, the boundaries are less legible and the costs potentially high. That asymmetry lowers the expected return on civic initiative and removes information the state needs for timely course correction.

The tight state-economy nexus is particularly visible in land, housing, savings, and capital allocation. Because the government owns nearly all the land and leases public housing on 99-year terms, “market prices” are necessarily shaped by policy. The Central Provident Fund (CPF) holds employees’ mandatory savings (currently amounting to 37 percent of employee compensation) and links a very large share of it to housing purchases and other government-defined uses. The sovereign wealth funds Temasek and GIC intermediate large public assets and maintain strategic holdings in major enterprises, while government-linked companies dominate substantial portions of the corporate landscape. This architecture has delivered order, speed, and scale. It has also raised economy-wide prices, encouraged rent extraction through asset inflation, and tilted returns toward capital and land rather than labor. When the state is everywhere—as de facto landlord, employer, investor, banker, business partner, regulator, customer, supplier, and even competitor in the provision of goods and services beyond public goods—experimentation by private enterprise narrows, not by prohibition but by crowding out, and by the rational impulse to align with official priorities, especially when reliant on the state for incentives or sales.

These facts sit awkwardly with conventional measures of “economic freedom,” such as those produced by the Fraser Institute or Heritage Foundation, which reward contract enforcement, low tariffs, and investment openness, have historically placed Singapore at top positions in their indexes. The economic pillar of the Freedom Index, mainly based on these same external sources, consequently ranks Singapore as the eighth most economically free country among the 164 nations covered. Those measures capture real policy strengths, but rankings such as these cannot capture how a directed ecosystem works on the ground when the state chooses where investment is most desired, sets the volume and terms of labor inflows, prices land it largely controls, and deploys large public capital to back favored sectors. Under such conditions, entrepreneurship is not forbidden, but it is less central to the model than in economies where the state is smaller and competition wider. A rules-based marketplace can coexist with discretionary steering from above. The visible results—macro stability, fast approvals, coordination in areas the state prioritizes—are valuable. But hidden costs—muted productivity incentives, lower household consumption, and limited diffusion of capability—accrue slowly and become apparent only when the external environment turns unfriendly.

Some might argue that Singapore’s example indicates that political freedom is unnecessary for economic development. After gaining independence, the government justified expanded restrictions on labor, media, and freedom of association as necessary to ensure political stability and attract foreign direct investment (FDI). But these restrictions remain in place even as South Korea and Taiwan, formerly authoritarian regimes, showed that political liberalization and a more participatory system could reinforce and enhance, not undermine, stability as economies mature (see Figure 1). In Singapore, constraints on expression—including in academia—reduce the diversity and depth of policy discussions. When dissent is costly and information selectively released, the system hears less from those who see problems first: low-wage workers, squeezed middle-class families, independent researchers, and small firms facing rising costs. This is not an abstract normative concern but rather a practical handicap in a complex, rapidly changing economy.

Figure 1. Political liberalization did not slow economic growth in South Korea or Taiwan

Gross domestic product per capita (purchasing power parity-adjusted, in 2021 constant international dollars) was obtained from the IMF data portal. The Political Rights component has been extended back to 1980 using V-Dem data and the same methodology as in the Freedom and Prosperity Indexes.

Evolution of prosperity

Singapore’s achievements on headline income are undeniable. Gross domestic product per capita has tripled since 1990, placing the country among the richest in the world. The Prosperity Index also records the country’s high levels of life expectancy and educational attainment. Singapore joined the world’s most developed countries several decades ago. These are the peers with which it should be compared, not its lower-income regional neighbors, particularly since the Singapore model of growth is clearly distinct from that of other high-income nations. An extensive growth model powered by factor accumulation leaves characteristic fingerprints. Singapore runs large current-account surpluses (over 20 percent of GDP annually since 2005) and builds fiscal buffers (persistent large budget surpluses); public investment is high; private consumption is low by advanced-economy standards; and productivity growth has been episodic outside a few frontier activities. This is the logic by which the system operates: Singapore prioritizes external competitiveness, recycles surpluses into foreign assets, and leans on a managed exchange-rate regime to hold down imported inflation and to maintain credibility. The main questions behind the numbers are how broadly they translate to all social strata and whether the current model is sustainable in the long run.


When dissent is costly and information selectively released, the system hears less from those who see problems first: low-wage workers, squeezed middle-class families, independent researchers, and small firms facing rising costs.

The inequality component of the Prosperity Index gives a visual answer to the first question. Compared to the Nordic European countries, Singapore has a much higher level of income inequality (see Figure 2). Other distributional measures, such as an estimated 0.7 Gini coefficient in terms of wealth inequality, point to the same conclusion. What’s more, these numbers most likely underestimate the actual level of inequality in Singapore. Most OECD countries include all legal immigrants (permanent and temporary residents) when estimating inequality, but Singapore excludes non-permanent immigrants, though they account for 39 percent of the labor force and are concentrated at the lower end of the income distribution. The country’s official measures of inequality (a 2024 Gini coefficient of 0.435 before and 0.364 after taxes and transfers) also exclude non-labor income, more than half the total. The real inequality gap in Singapore, compared with other developed countries, is probably much wider than estimated, while Singaporeans’ share of national income has almost certainly shrunk since 2014, the last time this number was released. Socioeconomic inequality is a direct product of the Singapore model, which generates costs borne by households through higher local-currency prices, crowding out of small and medium enterprises, thin wage growth at the base, and a muted share of national income going to labor and citizens.

Figure 2. Income inequality is higher in Singapore than in Scandinavian countries

Labor-market design is central to these outcomes. Liberal foreign-worker inflows have long been used to match demand cycles, contain wage pressures, and deliver what has been referred to as “labor peace.” Over time, this has reduced the incentive for employers to automate or redesign low-productivity work. A dual structure persists. At one end, a sizeable segment of the economy depends on low-paying, physically demanding and risky jobs that do not lead to productivity ladders for residents. At the other end, inflows of professionals and executives meet genuine skills needs but also fuel demand for scarce urban resources and amenities, especially housing, raising costs and intensifying competition for positional goods and elite educational tracks. The structure widens the gap between those at the lower and upper ends of the economy without building domestic capability commensurate with the country’s income level.


The real inequality gap in Singapore, compared with other developed countries, is probably much wider than estimated
.

Housing and savings amplify the distributional effects. Singapore links a very large share of forced savings to Housing and Development Board (HDB) purchases on 99-year leases, with 76 percent of the population (down from 85 percent) housed in these government-run properties. When home values rise, owners enjoy wealth effects; when leases age and policy signals shift, uncertainty grows for households that cannot easily diversify. Land prices—set in a market the state effectively controls—ripple through business costs and wages. The expectation of continuing asset inflation encourages rent-seeking over entrepreneurship and leads families to shoulder significant leverage. A model that relies on rising asset prices to sustain consumption in a city of high living costs is one that exposes households to policy-driven valuation risk. It also depresses fertility (the 0.97 total fertility rate is among the world’s lowest) by increasing the cost of raising children in an expensive, dense, competitive urban environment.

Singapore’s 37 percent labor share of national income has been low relative to its peers, while gross operating surplus and property-related incomes loom large, at 54 percent. Government-linked firms and multinationals dominate many input and output markets, crowding out smaller domestic enterprises. Private consumption’s share of GDP (36 percent in 2024, down from 49 percent in 2001) is strikingly low for an advanced economy. These features set Singapore apart from the most prosperous and inclusive societies, where thicker wage floors, broader diffusion of capability, and less reliance on asset inflation anchor the social contract.

Education and health present a complex picture. Attainment is high and standardized test scores in math and science rank among the world’s best. But in a relentlessly competitive school system, there are concerns that heavy reliance on private tuition (70 percent of students) contributes to unequal educational outcomes and diminished social mobility by giving an advantage to those whose families can afford the extra expenditure. Additionally, translating education into broad-based opportunity is uneven since the economic structure does not generate enough high-productivity, middle-income jobs for residents outside elite tracks. Without stronger productivity growth at the firm level—driven by job redesign, automation, and diffusion of best practice—credentials do not guarantee commensurate wages. On the health front, a technocratic system achieves strong population outcomes (in terms of average life expectancy) at relatively low public cost, but it deliberately shifts financial risk to households through compulsory savings and copayments. In a city with high living costs and thin wage growth at the base, that risk burden is felt keenly even when headline indicators look strong.

Externalities are increasingly salient. Sustaining growth through population increases and construction intensifies congestion and environmental stress in a tropical, high-density city increasingly beset by climate change (high temperatures, frequent floods, rising sea level). Industry clusters that anchor the export platform—energy-intensive manufacturing, petrochemicals, aviation-related services, data centers—carry emissions and transition risks that will be costlier to manage as climate policy tightens globally. Meanwhile, the shift to attracting family offices and private wealth poses reputational and security risks—from money-laundering and accusations of “Singapore-washing” (intermediating funds through Singapore to disguise their origin or destination) to international criminal syndicates and scammers who use Singapore as a hub for their illicit activities. The result of this shift is to concentrate purchasing power in neighborhoods and assets where residents already feel priced out, with only modest spillovers to domestic capability building and financial-market depth.

When the cost of dissent is high and data releases are selective, independent journalists, researchers, and civic groups struggle to map distributional outcomes in real time. That deprives policymakers of useful feedback, early warnings, and good ideas from outside the official complex. It also erodes trust. Citizens are more likely to accept difficult adjustments when they believe the system listens to their concerns and shares risk fairly. Today, too much downside is borne by households, which face rising prices and policy-shaped asset risks while being told that government largesse through periodic non-entitlement transfers will cushion the blow. Such discretionary transfers—conditional, temporary, inadequate, and uncertain—are inferior to market wages that rise with productivity and distort political preferences by making the citizenry beholden to the governing party. 

The path forward

Singapore will not succeed in the next decade by doing more of what worked in the last half-century. The world has changed. Globalization is retrenching, the international tolerance for mercantilist policies is narrowing, and great-power rivalry is intensifying with increased willingness to use economic pressure to exact political concessions. Regional competitors—from China to Vietnam and Indonesia—combine improving infrastructure and skills with labor costs Singapore cannot match. Subsidy races in major economies are reshaping value chains and contesting investment decisions with tools Singapore cannot or should not emulate at scale. The uncertain impact of technological disruption by artificial intelligence makes investment decisions difficult and complicates long-term planning. In this environment, doubling down on a model optimized for inflows of foreign labor and capital will yield diminishing returns and increasing vulnerabilities, while wasting scarce resources.

The first imperative is to move decisively from extensive to intensive growth. That means closely linking firm survival to productivity improvement. A credible path would temper reliance on lower-wage foreign labor in ways that raise the payoff from automation, process innovation, and job redesign—especially in service sectors where productivity lags and resident employment is concentrated. It will close some firms and raise costs for others in the short run, but without this shift, wages at the base will remain thin and inequality will worsen, no matter how many transfers the government can deploy. Complementary reforms should ensure that inflows of higher-skilled foreigners are aligned with building domestic capability rather than simply satisfying short-term demand and bidding up urban resource costs.


The political-legal setting must evolve in tandem with the economy.

Second, the scale and use of surpluses and reserves should be revisited, especially as the sovereign wealth funds which invest reserves have underperformed. A stronger exchange rate and slower reserve accumulation would lower imported inflation and relieve cost-of-living pressures. A larger share of fiscal resources can be redirected from broad corporate inducements and opaque industrial bets toward social spending that reduces household risk without dulling work and investment incentives. None of this implies fiscal profligacy or acting imprudently. It reflects a recognition that the opportunity cost of very large buffers, in a rich and aging society, includes foregone domestic investment in human capital, diffusion of capability, and life-cycle security.

Third, land and housing policy must be reoriented to lower systemic costs and reduce dependence on asset inflation. More retirement savings should be decoupled from housing, the long-term treatment of aging leases clarified, and the state’s control of land used to dampen, not amplify, economy-wide price pressures. Greater transparency around land pricing and HDB cost structures would improve trust and policy effectiveness, and enable better planning of investment decisions by households and businesses. Lower land costs would cascade through wages and prices, reduce the attraction of rent-seeking, and shift capital toward productive enterprise. It would also promote family formation by lowering the cost and uncertainty associated with housing, childcare, and eldercare.

Fourth, the growth playbook should move from picking winners at scale to catalyzing broad-based experimentation by private actors. Singapore has spent heavily, over decades, on research parks and sectoral “bets” that delivered mixed results. In a world where value is increasingly created in ideas, services, and intangibles, the priority should be to lower entry barriers, democratize access to data and infrastructure, and crowd in private risk-taking outside state-linked incumbents. Public capital can be powerful when it is allocated with discipline: to back competitive markets, not sustained rents; to fund diffusion of capability, not trophy projects; and to hold itself accountable to transparent criteria and sunset clauses.

Fifth, the political-legal setting must evolve in tandem with the economy. Removing the conflation of government and ruling party interest with the public interest, strengthening checks and balances on the executive’s exercise of powers, normalizing robust debate, and making distributional data routinely available would lower the implicit tax on civic initiative and improve policy through better feedback. Complex societies govern better when they listen widely and when the rules are clear and contestable—as evidenced by other Asian countries that have shown that political liberalization can coexist with order and strengthen legitimacy. Confidence in performance should reduce, not increase, the state’s reliance on ambiguity and speed in controlling speech and association.


Building institutions that allow competition in markets and ideas and that trust and empower ordinary citizens … is the surest way to keep Singapore exceptional.

Geopolitics adds urgency. Singapore cannot count indefinitely on frictionless access to foreign capital, technology, and markets. Practices once tolerated may be penalized. If the country continues to rely primarily on incentive-led FDI and imported labor in a city with high costs and rising environmental constraints, it will confront sharper trade-offs: either slower growth with rising inequality and social tension, or continued growth with greater external exposure and domestic fragility. Neither is an optimal strategy for the future.

The better alternative is a new “social compact” that matches the high-income status Singapore has achieved. It would place productivity and diffusion of capability at the center of economic strategy; align immigration and industrial policy with those goals; share risk more fairly with households; and widen the channels through which citizens can speak, organize, and help solve problems. It would move society from discretionary benevolence toward institutionalized confidence that rules are predictable and fair. It would sustain high income without leaning on ever-rising asset prices, grow wages at the base faster than the cost of essentials, and ease the pressures that make everyday life feel precarious to many in one of the world’s richest cities.

Singapore possesses the administrative capacity, fiscal resources, and human talent to make this transition. The PAP government, which has ruled for 66 years, faces no short- or even medium-term threat to its overwhelming hegemony. It recognizes the external and domestic challenges the economy faces, expresses concern about social mobility and social cohesion amid a “foreign-local divide,” and is attempting to “listen more” (albeit through channels and processes it controls). The government has even acknowledged that the model that got the country to where it is today is not the model that will take it further, because the world will not arrange itself to suit the old playbook. What it has not done is change the playbook. Instead, it is ratcheting up growth acceleration by placing bigger bets on “industries of the future” while holding on to established ones as a hub for “leading global firms.” Recognizing that “not everything will succeed,” the government argues that “if just one or two do, they can transform our economy and carry Singapore to the next level.” It is not moving toward political and intellectual liberalization, insisting instead that maintaining “social harmony”—given economic openness, racial and religious diversity, divisive social media and geopolitical tensions—requires holding fast to the tight rules of the past.

If Singapore changes its playbook, its freedom profile will become less lopsided—still strong on commercial rule of law and execution but balanced by more open contestation and clearer legal protections for speech. Its prosperity will be more inclusive and sustainable. Without the change, the headline numbers may stay impressive for a while, but the trade-offs will sharpen, and the miracle will appear less as a model to emulate and more as a cautionary warning. In the long run, a city-state’s greatest asset is the capability and confidence of its people. Building institutions that allow competition in markets and ideas and that trust and empower ordinary citizens, rather than domestic and foreign elites, is the surest way to keep Singapore exceptional.

about the author

Linda Y.C. Lim, professor emerita of corporate strategy and international business at the Stephen M. Ross School of Business, University of Michigan, has studied the Singapore economy for 50 years, and published other research on international trade and investment, women in the labor force, and overseas Chinese business in Southeast Asia. She co-edits AcademiaSG, an academic blog promoting scholarship “of/for/by Singapore.” 

Explore the data

The Indexes rank 164 countries around the world. Use our site to explore thirty years of data, compare countries and regions, and examine the subindexes and indicators that comprise our Indexes.

Stay Updated

Get the Freedom and Prosperity Center’s latest reports, research, and events.

Stay connected

Read all editions

2026 Atlas: Freedom and Prosperity Around the World

Against a global backdrop of uncertainty, fragmentation, and shifting priorities, we invited leading economists and scholars to dive deep into the state of freedom and prosperity in ten countries around the world. Drawing on our thirty-year dataset covering political, economic, and legal developments, this year’s Atlas is the evidence-based guide to better policy in 2026.

2025 Atlas: Freedom and Prosperity Around the World

Twenty leading economists, scholars, and diplomats analyze the state of freedom and prosperity in eighteen countries around the world, looking back not only on a consequential year but across twenty-nine years of data on markets, rights, and the rule of law.

2024 Atlas: Freedom and Prosperity Around the World

Twenty leading economists and government officials from eighteen countries contributed to this comprehensive volume, which serves as a roadmap for navigating the complexities of contemporary governance. 

Explore the program

The Freedom and Prosperity Center aims to increase the prosperity of the poor and marginalized in developing countries and to explore the nature of the relationship between freedom and prosperity in both developing and developed nations.

The post Singapore must shift from state-led expansion to productivity-led growth appeared first on Atlantic Council.

]]>
The evolution of Latvia’s defense and security policy in resilience building https://www.atlanticcouncil.org/in-depth-research-reports/report/the-evolution-of-latvias-defense-and-security-policy-in-resilience-building/ Fri, 02 Jan 2026 21:35:29 +0000 https://www.atlanticcouncil.org/?p=895832 Latvia has embraced a broader concept of national resilience encompassing not only military strength but also the resilience of its society, the continuity of government and essential services during crises, the protection of critical infrastructure, and the cultivation of psychological defense among its populace.

The post The evolution of Latvia’s defense and security policy in resilience building appeared first on Atlantic Council.

]]>

Table of contents

Executive summary

Latvia has significantly evolved its defense and security policy, focusing on national resilience as a cornerstone of its statehood, as analyzed in LVARes: The Evolution of Latvia’s Defense and Security Policy in Resilience Building, a project of the Centre for East European Policy Studies and the Atlantic Council. This transformation is anchored in Latvia’s Comprehensive National Defense (CND) framework, a whole-of-society strategy that integrates civilian, military, and private-sector efforts to deter aggression and manage crises. Key to this approach are legal underpinnings from evolving state defense concepts and amendments to foundational laws like the National Security Law.

Pillars of this resilience include ensuring the continuity of essential services and critical infrastructure, with a shift from mere asset protection to guaranteeing operational functionality through public-private partnerships and an enhanced role for municipalities. Regular exercises like Namejs and Pilskalns test these preparations.

To counter hybrid threats, Latvia formally recognizes the information space as a defense domain, implementing multilayered strategies that combine government-led strategic communications, support for independent media, civil-society engagement against disinformation, and international cooperation, notably through hosting the NATO Strategic Communications Center of Excellence. Societal resilience is further boosted by public-preparedness campaigns like “72 Hours: What to do in case of a crisis,” media literacy programs, and integrating national defense education, including psychological defense and nonviolent civil resistance, into curricula.

Significant reforms are modernizing Latvia’s crisis management, with the planned National Crisis Management Center (CMC) under the prime minister, centralizing coordination and decision-making. Civil-protection measures are strengthening as well, with new legislation for public shelters and updates to the State Civil Protection Plan.

International cooperation is indispensable, with NATO providing collective defense, the EU offering funding and policy coordination, and robust bilateral ties with the United States and regional cooperation with Baltic and Nordic partners. The LVARes project itself exemplifies Latvia’s proactive international engagement in studying national capabilities, raising awareness, and sharing best practices.

Challenges persist, including resource constraints, interagency coordination complexities, evolving threats, and the need to bolster societal cohesion. Future imperatives involve fully operationalizing the CMC, implementing the shelter program, sustained investment in capabilities, and deeper public engagement in CND. Strategic recommendations for policymakers emphasize CMC effectiveness, civil-protection investments, public-private partnerships, psychological resilience, volunteer engagement, and integrating nonviolent resistance. For international partners, continued support for Latvian capability development, amplifying LVARes findings, facilitating resilience benchmarking, and supporting cross-border exercises are crucial. Through these efforts, Latvia fortifies its security and contributes valuable lessons to the Euro-Atlantic community.

Introduction

The contemporary security environment is characterized by an array of complex and interconnected threats. These range from the potential for conventional military aggression to the more pervasive and persistent challenges of hybrid warfare, sophisticated information operations, and malicious cyber activities. Russia’s aggressive foreign policy and its full-scale war against Ukraine have significantly amplified these threats, underscoring the vulnerability of states in the region and the urgent need for robust national preparedness. Latvia’s position as a frontline state of both the North Atlantic Treaty Organization (NATO) and the European Union (EU), sharing a direct border with the Russian Federation, has inherently shaped its national security posture and necessitated a continuous adaptation of its defense strategies, pushing for an essential shift in Latvia’s defense thinking.

The traditional focus on military defense, while still fundamental, is increasingly understood as insufficient on its own. Consequently, Latvia has progressively embraced a broader concept of national resilience encompassing not only military strength but also the resilience of its society, the continuity of government and essential services during crises, the protection of critical infrastructure, and the cultivation of psychological defense among its populace. This evolution reflects a growing understanding that national security in the twenty-first century is a whole-of-society endeavor.

Latvia’s pursuit of national resilience is not confined to a single strategy but is realized through a multifaceted approach that addresses various dimensions of security. These include ensuring the operational continuity of essential services and the resilience of critical infrastructure, actively countering hybrid threats in the information and cyber domains, fostering broad societal resilience through public preparedness and education, and acknowledging the potential role of nonviolent civil resistance. The aim of this report is to systematically analyze the evolution in Latvia’s defense and security policy, particularly its implementation of a comprehensive national defense framework, and to share the insights and lessons learned with allies, partners, and the broader public to enhance collective security in the Euro-Atlantic region.

A comprehensive approach to defense and resilience

Latvia’s approach to national defense has undergone a significant evolution, moving from a primary focus on conventional military capabilities and professional military service orientation toward a more encompassing strategy known as Comprehensive National Defense (CND). Adopted in 2018, the CND system is designed to ensure security and crisis preparedness across all sectors of the state and society, thereby enhancing Latvia’s overall deterrence posture and its resilience against armed conflicts or a wide spectrum of potential crises. The overarching aims of CND are the following:

  • Preparing the Latvian population to actively participate in the defense of their country. 
  • Facilitating efficient and effective crisis management at the national level. 
  • Ensuring the continuity and support of critical state functions, including government operations, energy supply, healthcare, and logistics, even under duress. 

A fundamental and defining characteristic of Latvia’s CND is its “whole-of-society” approach, which recognizes that national defense and resilience are not the sole responsibility of the armed forces or government ministries but require the active involvement and cooperation of every element of society. This comprehensive vision entails the systematic integration of municipalities, the owners and managers of both public and private critical infrastructure (spanning sectors such as energy, communications, finance, and healthcare), nongovernmental organizations, the broader business community, and individual citizens into national defense planning and preparedness efforts. 

A significant emphasis within this approach is placed on building and nurturing mutual trust and robust partnerships between public authorities at all levels and private-sector entities. These collaborative efforts are seen as essential for creating a networked civil and military defense system where each component is prepared and able to work in sync. The success of the CND model hinges on the ability to overcome traditional challenges and foster a shared sense of responsibility for national security.

The whole-of-society approach is further strengthened through the way the CND is managed and its legal basis, both of which are designed as a multitiered framework to ensure a whole-of-government and -societal approach to national resilience. The management structure (detailed in Annex 1) integrates political leadership, ministerial responsibilities, operational agencies, local governments, and societal actors to prepare for and respond effectively to a diverse spectrum of threats, ranging from military aggression to civil emergencies. Whereas the framework of strategic concepts, national plans, legal acts, and supporting regulations (a detailed list provided in Annex 2) ensure that CND is not merely a theoretical construct but a systematically planned and implemented national effort. Strategic concepts like the National Security Concept and the State Defense Concept, both approved by the parliament, articulate Latvia’s high-level strategic assessments, goals, and priorities in response to the evolving security environment, providing the overarching vision and direction for the development of the CND.

This approach also aligns with the direction set by NATO at its 2016 Warsaw Summit, where the Alliance adopted seven baseline requirements for national resilience. For the first time, NATO established clear conditions that member states’ civilian institutions must meet to support Article 4 and 5 military operations. These requirements include: continuity of government and critical services; resilient energy, food, and water supplies; the ability to manage uncontrolled population movements; resilient civil communication and transportation systems; and the capacity to handle mass casualties. In this regard, Latvia’s CND system goes beyond these NATO requirements by also incorporating societal resilience and the involvement of the private sector in defense operations and other aspects.

Alongside NATO’s framework, relevant EU-level initiatives provide significant complementary support for resilience. These include the EU’s crisis-management framework, particularly its Civil Protection Mechanism, and the Military Mobility initiative, which supports development of civilian infrastructure to facilitate the rapid movement of military forces across Europe. These efforts directly reinforce both NATO and national resilience objectives, providing practical tools and funding to enhance collective defense.

Beyond multilateral alliances, Latvia cultivates strong bilateral partnerships and engages actively in regional cooperation formats to enhance its security and resilience. The 2020 State Defense Concept emphasizes the strong military cooperation between Latvia and the United States, highlighting the long-standing and highly valued partnership between the Latvian National Armed Forces and the Michigan National Guard. The United States is widely regarded as a major strategic partner for Latvia’s security and independence.

The three Baltic states also work closely together to develop their collective security and defense capabilities. This cooperation includes joint efforts to strengthen their external borders, deepen collaboration in civil protection and crisis management, combat disinformation through shared intelligence and strategies, and enhance overall societal resilience. Joint military exercises are also a regular feature of this trilateral cooperation.

Nordic-Baltic cooperation provides another layer of security collaboration. Latvia’s comprehensive defense approach shares many similarities with the strategies adopted by Nordic countries, facilitating mutual learning and coordinated efforts. The Nordic and Baltic countries have also demonstrated solidarity through joint statements and coordinated actions, for example, in reaffirming their support for Ukraine.

Latvia’s multifaceted international engagement—spanning NATO, the EU, key bilateral relationships such as with the United States, and intensive regional cooperation—is not merely about receiving security assistance or aligning with external frameworks. It increasingly reflects a strategy of proactive contribution. As a frontline state that has rapidly developed its resilience concepts and capabilities in response to direct and evolving threats, Latvia is well-positioned to share valuable expertise and lessons learned.

Key pillars of Latvian resilience

Since the adoption of CND, Latvia has pursued a comprehensive approach to defense based on an understanding that every element of the government and population plays a part in creating a networked civil and military defense system—and recent lessons from Ukraine’s resistance to Russian aggression have further reinforced this understanding. This approach grew out of necessity: Latvia, a small country with limited strategic depth, neighbors Russia, a large, aggressive military power that has attacked countries in its so-called near abroad. Latvia’s approach, like those of its fellow Nordic-Baltic countries, is built on a straightforward idea that the country’s civil and military defense systems can achieve a greater deterrence and defense impact if they collaborate and if each part is prepared. Meanwhile, Latvia’s pursuit of national resilience is not confined to a single strategy but is realized through a multifaceted approach that addresses various dimensions of security. 

While the CND concept encompasses eight dimensions, ranging from military development to psychological resilience, our report examines it through four perspectives: military, civil, societal, and governmental resilience. This approach allows for a cohesive, strategic evaluation of the dimensions of readiness without sacrificing the scope of the original concept.

Military resilience

Latvia’s military resilience is a central aspect of its national defense, resting on the fundamental pillars of domestic responsibility for developing its own capabilities and a robust collective defense provided by its allies.

Lessons learned from Russia’s aggression in Ukraine since 2014 have driven initiatives to ensure that Latvian institutions and society can respond effectively to any unconventional or hybrid threat scenarios. Changes to the National Security Law have empowered the National Armed Forces (NAF), from the lowest level up, with the authority to respond to any military threat, conventional or unconventional, even without immediate orders from the political leadership. The law explicitly states that armed resistance may not be prohibited in times of war or occupation and affirms that every citizen has the right to take up arms to resist an aggressor. This legal framework solidifies the principle of total defense, ensuring that the entire nation is prepared and authorized to contribute to the defense of the country.

To maintain this posture, Latvia has steadily increased its defense budget. By 2018, Latvia had met the NATO defense spending goal of 2 percent of gross domestic product (GDP), which has significantly contributed to the development of military capabilities, including within the National Guard. Military resolve is evident in the budget’s rapid growth, which is projected to reach approximately 3.65 percent of GDP in 2025, with announcements indicating a further increase to 5 percent by 2026. This funding is crucial for keeping military modernization on track through the strategic procurement of advanced weapon systems. Since Russia’s full-scale invasion of Ukraine in 2022, Latvia has significantly increased investment in conventional war-fighting capabilities to enhance its deterrence posture. The commitment to acquiring advanced systems—such as High Mobility Artillery Rocket System (HIMARS) launchers, IRIS-T air defense systems, and coastal defense missiles—sends a vital message that the country is serious about bolstering its defense. National resilience also necessitates forging a cohesive fighting force from diverse sources of manpower. Latvia is proactively addressing manpower challenges, most notably through the reintroduction of mandatory conscription in the form of the State Defense Service (SDS). Introduced in 2023, the SDS aims to increase recruitment and build a larger, well-trained reserve force. This policy of eleven-month mandatory service has shown early signs of success. Latvia plans to enlist four thousand new recruits annually by 2028 and, notably, 40 percent of the 2024 intake opted for professional careers after their mandatory service. Current military plans envision 31,000 troops by 2029, complemented by an equally large reserve contingent thereafter. However, this rapid expansion presents significant challenges. The primary obstacles include a lack of sufficient modern training infrastructure to accommodate the larger number of recruits, a shortage of qualified instructors to lead the training, and the immense organizational task of building a functional reserve system that can effectively manage and retrain thousands of new reservists annually after their active service ends. Successfully overcoming these hurdles is critical to ensuring the SDS translates into a genuine increase in combat-ready forces.

Comprehensive defense exercise “Nameis 2024,” National Armed Forces of Latvia, https://www.flickr.com/photos/latvijas_armija/54023090223/in/album-72177720320603776.

Advanced capabilities and increased manpower are only effective if they are maintained at a high state of readiness. This is achieved through a rigorous schedule of military exercises designed to test plans and ensure interoperability. The flagship event is the annual Comprehensive Defense Exercise “Namejs,” which tests the armed forces in joint operations at every level.

These exercises are crucial for more than just military units, serving as the primary mechanism for implementing the whole-of-society defense concept in practice. During Namejs, the NAF systematically drills its cooperation with the civilian sector. This includes collaborating with municipalities and state-owned companies to support military mobility and countermobility efforts, and working with private-sector entrepreneurs on resource mobilization. Similarly, through this whole-of-society approach, Latvia has demonstrated both ingenuity and cooperation. It is exemplified by efforts to formalize the roles of civilian groups in national defense, such as the involvement of hunters in the national defense system—a patriotic and armed segment of society that can be integrated with the National Guard and tasked with support assignments. As comprehensive defense evolves into a societal reality, it demonstrates credible national will, complicates adversary planning, and builds the societal backbone needed to withstand pressure and deter aggression, including hybrid attacks from Russia.

Civil resilience

Civil resilience in Latvia focuses on the comprehensive preparedness of its civilian structures and population, encompassing robust civil-defense planning across all government levels, from national ministries to local municipalities. This emphasis recognizes the critical role of municipalities in fostering a society-wide culture of preparedness and resilience.

Russia’s aggression against Ukraine beginning in 2014 and 2022 deeply reverberated across Latvian society, creating significant momentum for action. The latter created public demand that pushed local governments beyond mere declaratory contingency plans to proactively explain preparedness strategies to their constituents. Latvia has adopted the necessary legislative basis that mandates that Latvian municipalities ensure the continuity of essential services during crises or war, therefore actively participating in developing a society-wide culture of preparedness and resilience.

Pilskalns Exercises

The Pilskalns exercises stress-test the developed defense and crisis management plans, enhance knowledge, and inform participants about potential challenges during a military crisis at the municipal level. These exercises provide the opportunity to engage national and local institutions and the National Armed Forces to test their ability to communicate, mobilize resources, and manage evacuation in the event of a crisis.

This is primarily achieved through civil-defense plans, which are now mandatory for all municipalities. Developed in close cooperation with the National Armed Forces, these plans must be exercised at least annually. A prime example of this is the Pilskalns series of tactical exercises. While all municipalities are now mandated to develop such plans, some have been more proactive. For instance, Jelgava, Latvia’s fourth-largest city, established a municipal operation information center in 2011, preceding many other local governments. In peacetime, this center functions as a municipal hotline for damaged infrastructure, but in a crisis, it transforms into the municipal early warning system.

Another key aspect of civil resilience involves ensuring the continuity of essential services and protecting critical infrastructure. Latvia has strategically shifted its crisis-management thinking from solely focusing on infrastructure protection to prioritizing the uninterrupted delivery of essential services and functions. While this shift presents additional planning challenges, it stems from the understanding that critical infrastructure cannot operate in isolation from broader national defense factors; it is rendered ineffective without skilled personnel, operational processes, and supporting services vital for its functioning. Businesses are consequently required to develop robust continuity plans.

Latvian Mobile Telephone

Latvian Mobile Telephone (LMT) is one of the first companies in Latvia to establish its own National Guard subdivision, underscoring its role as a critical infrastructure provider. LMT is responsible for maintaining national connectivity, even in times of war, and actively develops innovative solutions for military use. Composed of the company’s own employees, the subdivision’s primary mission is to strengthen the security and defense of LMT’s critical infrastructure and essential services, defending against attacks aimed at destabilizing the country by targeting its critical infrastructure.

The Ministry of Defense (MoD) and the NAF retain a central role in comprehensive defense planning. This reflects both the fundamental need to integrate military and civilian planning factors closely within comprehensive defense systems and the traditionally high level of societal trust in the National Armed Forces. Consequently, even private industry’s preparedness plans are drafted in close cooperation with both the relevant sectoral ministry and the MoD. This collaborative approach ensures that the government is aware of civilian-sector resources, can provide expertise and experience, and can monitor how these plans integrate into the broader national resilience system and warfighting plans. Furthermore, industrial actors participate in joint exercises with their specific sectoral ministry and the MoD at least once every four years. An innovative development is the creation of specific National Guard units staffed by personnel from critical infrastructure entities, whose primary role is to defend critical infrastructure objects in case of military contingencies.

Latvian electricity company Sadales tīkls undergoing National Guard Training. Ministry of Defense of Latvia, https://www.sargs.lv/lv/latvija/2022-10-27/sadales-tikls-veido-zemessardzes-apaksvienibu-ar-merki-aizsargat-uznemuma.

The ability to ensure the flow of money for goods and services constitutes another critical service. Societal upheavals, crises, and wars often disrupt peacetime payment systems, as demonstrated by Ukraine’s experience. To address this, the Bank of Latvia (which is analogous to the US Federal Reserve) is developing crisis payment solutions, both cash and noncash, for a society with a high adoption rate for noncash transactions. For example, the Bank of Latvia is collaborating with major commercial banks to develop approved offline solutions, ensuring individuals can use their bank cards for basic necessities even if bank communications are down. Similarly, during a crisis or war, banks are required to maintain a predefined network of ATMs, with at least one ATM per municipal center, and have developed a map of critical ATMs that would operate in case of crisis.

Latvia also has proactively sought to improve the integrity of its communications systems. This involves ensuring that critical data—including sensitive healthcare, defense, security, and economic data—remains within Latvian territory and that critical information technology systems continue to function without interruption even if the connection to the global internet is disrupted. To achieve this, the government now mandates that national and municipal institutions, companies, and owners/managers of critical IT infrastructure prioritize using a single national internet exchange point, GLV-IX, a statewide and state-operated local internet ecosystem, for their data flows if the outer perimeter of electronic communications is compromised.

Finally, Latvia has actively addressed two common challenges in building preparedness: improving the communication of preparedness requirements and funding resilience efforts. Many national governments struggle with effectively communicating military crisis and war preparedness expectations to municipalities and private industries. While both disseminating information and issuing legislation are important, these efforts must be augmented by activities that encourage thoughtful planning, accurate understanding of requirements, and knowledge development. Indeed, Latvian municipalities have sometimes voiced concerns about insufficient resources for civil preparedness, arguing it should be a national responsibility. Similarly, even large, well-funded hospitals struggle to meet the three-month supply requirement for medicine and supplies, while smaller hospitals lack adequate funding altogether.

Latvia has sought to address these questions through legislative changes, clarifying responsibilities and tasks, and mandating regular exercises. Over time, continuous cooperation and the mandatory requirement of yearly exercises are expected to foster a better understanding of the overall defense system, individual roles within it, and mutual expectations among all parties involved. Regular exercise schedules significantly benefit Latvia’s preparedness across sectors by stress testing developed plans, building knowledge, and informing participants about potential organizational challenges during a military crisis or war. For example, the yearly state-wide comprehensive defense exercises Namejs involve municipalities, allied forces, and local companies playing out different scenarios alongside the National Armed Forces. On a local level, Pilskalns exercises, in use since 2020, test municipalities’ planning and practical response capabilities under wartime scenarios, involving national and local institutions, the NAF, and local companies. These exercises are crucial for stress testing plans, identifying gaps, and building practical experience among all involved parties. Ultimately, however, private enterprises are expected to fund their own preparedness planning and implementation activities.

Societal resilience

Societal resilience in Latvia is built on the principle that national security is a shared responsibility that extends to every citizen, empowering individuals with the practical knowledge and tools needed to withstand a crisis. The government has fostered a “culture of readiness” through regular information campaigns and hands-on materials that include tips to spot false information.

The most visible example of this is Latvia’s 72-hour preparedness guide,” a practical tool aimed at bolstering individual and, by extension, societal resilience. This campaign advises citizens on how to be self-sufficient for the first seventy-two hours of a crisis, a critical period before state emergency services may be able to provide widespread assistance. The booklet provides practical guidance on reliable information sources, identifying and countering disinformation, essential supplies to stock like water and food, preparing an emergency kit, and developing a family crisis action plan. This proactive approach is rooted in both general emergency-management principles and Latvia’s specific geopolitical and historical context. It not only promotes self-sufficiency that reduces the immediate burden on state resources, but also empowers citizens with concrete actions they can take, which reduces feelings of helplessness and fosters a sense of control and readiness. Public preparedness campaigns like this booklet encourage citizens to volunteer and self-organize, which are foundational elements for any form of collective resistance. The State Fire and Rescue Service (VUGD) plays a vital role in this public preparedness effort by actively informing the population on safety measures. To significantly enhance these capabilities, Latvia fully implemented a national cell broadcast system in early 2025. This modern alert system allows the VUGD to instantly send critical warnings directly to all mobile phones within a specific geographic area during an emergency, functioning without requiring users to install an application. This technology provides an immediate and widespread communication layer, complementing existing tools like sirens and the “112 Latvija” mobile application, which is also promoted by the VUGD as a key resource for emergency information.

Youth Guard

The Latvian Youth Guard (Jaunsardze) is Latvia’s largest state-sponsored youth movement, operating under the Ministry of Defence to provide education in national defense. Its primary mission is to foster patriotism, civic consciousness, leadership skills, and physical fitness among young people aged ten to twenty-one. By providing voluntary training in military basics, first aid, and survival skills, the Jaunsardze strengthens the nation’s will to defend itself, serving as a vital component of Latvia’s comprehensive state defense system and a primary pathway for future service.

This culture of readiness is reinforced through long-term educational investments designed to foster an informed, critical, and defense-aware society. The national defense education program in schools aims to instill patriotism, civic responsibility, and basic preparedness skills, fostering an understanding among young people of their role in national defense. Media literacy training is a central component, being built into both school curricula and community programs.

These practical and educational efforts are underpinned by a broader national defense strategy that formally acknowledges psychological defense and nonviolent civil resistance as crucial components of CND. A noteworthy aspect of Latvia’s posture is the formal integration of nonviolent civil

resistance, where the 2020 State Defense Concept explicitly includes “nonviolent civil resistance against occupation forces” as a component of the societal dimension of “total defense.” This signifies a preparedness to resist aggression through a wide spectrum of means, not limited to armed conflict. This is, in large part, a direct response to Russia’s information manipulation and its treatment of the information space as a critical front. Securing an open media space and bolstering psychological resilience against manipulation is now a paramount security goal, involving the cultivation of critical thinking skills to withstand attempts to sow discord.  

To defend this front, Latvia employs a multilayered approach. The state has bolstered strategic communication resources, with a dedicated unit under the State Chancellery that coordinates messaging and works to disarm foreign malign information activities. Quality journalism is supported by funding and policy, and authorities have banned most of the Russian propaganda channels. In 2021, Latvia became the first Baltic state to prosecute individuals for willfully spreading dangerous falsehoods as per the criminal law, though there have been few convictions due to legal ambiguity in Article 231 around the definition of “fake news.” This state-led approach is complemented by a vibrant ecosystem of nongovernmental organizations, academics, and volunteers—such as the Baltic elves”—who actively debunk falsehoods. Investigative journalists, fact-checkers, and initiatives like the Baltic Centre for Media Excellence also work to expose disinformation and promote high standards in journalism.

At the community level, these principles are put into practice through societal and municipality-led initiatives. Continuing work started in the previous year, the Riga municipality has organized a cycle of seven practical civil-defense seminars across various city neighborhoods. During the workshops, residents learn about specific risks in their area, such as nearby high-risk objects and evacuation routes, as identified by the Riga city municipality. They also receive practical training on how to: adapt a basement into a safe shelter; properly assemble a seventy-two-hour emergency bag; and build mental resilience with psychological self-help techniques.

To address the wider Russian threat to Western society, Latvia is sharing what it is learning with its allies and partners. It hosts NATO’s Strategic Communications Center of Excellence, and it works with allies and partners to combat malign influence. Examples of this kind of cooperation are IREX (International Research and Exchanges Board), which conducts media training in the Baltic area, and the Atlantic Council’s Digital Forensic Research Lab, which investigates disinformation and debunks narratives, educates media consumers, and has had staff based in Latvia since 2017.

Governmental resilience

Governmental resilience is the central pillar that ensures the state can continue to lead and function during a crisis, providing the necessary command, control, and coordination within the CND system. This is achieved through a robust legal framework, a clear institutional hierarchy, contingency and crisis-response planning, and a commitment to testing these plans through regular exercises to guarantee the continuity of government.

The crisis-management system of Latvia is multilayered. The State Civil Protection Plan clearly outlines the responsibilities and leading roles of all state institutions in case of state-level contingencies. The system is designed to be flexible; for example, the Ministry of Health has the leading role and responsibility for management of pandemics, as was the case with COVID-19, with all institutions (including the armed forces) supporting these efforts. Meanwhile, in the case of a military threat or war, civilian institutions have the role of supporting the armed forces and ensuring continuity of governance and essential services. At the practical level, the system envisions the establishment of the Civil Protection Operational Management Centre (abbreviated in Latvian as CAOVC), that is formed in case of state-level contingencies, including war. It would be led by the Ministry of the Interior and composed of delegated experts from across the government, tasking it with coordinating interinstitutional response, compiling a comprehensive situational picture, and providing support to the NAF.

This role is to be complemented by municipal-level responsibility through the establishment of municipal civil-protection commissions that are obliged to plan and execute response activities on a regional level, as well as coordinate with state-level efforts.

The “Kristaps” series involves the Cabinet of Ministers in simulating strategic decision-making, as well as NATO Crisis Management Exercises (CMX), while the operational comprehensive defense exercise Namejs includes tests of civil-military cooperation, the practical implementation of civil defense plans, and the coordination functions of the planned CAOVC.

Latvia’s current push to improve its crisis-management system and governmental resilience is a direct response to lessons learned from a series of major crises. The COVID-19 pandemic served as a stark, real-world test of cross-sectoral crisis management, exposing significant shortcomings in interministerial coordination, public communication, and the ability to manage state material reserves effectively. The 2021 hybrid attack and instrumentalization of migration organized by Belarus on the EU’s eastern border tested the state’s ability to coordinate a response between interior, defense, and foreign policy bodies under “gray zone” threat conditions that are, as another Atlantic Council report put it, diffuse and hard to attribute. Most significantly, Russia’s full-scale invasion of Ukraine since 2022 has provided an invaluable, albeit grim, case study in the requirements of modern national defense. It underscored the absolute necessity of a resilient government able to overcome the massive scale of civil-defense challenges and pervasive hybrid threats. These events collectively created a clear need for reevaluation and reform of the crisis-management system in Latvia, highlighting systemic challenges in achieving effective horizontal coordination across ministries.

To resolve these issues, Latvia is establishing a new centralized National Crisis Management Center (CMC). The concept for the CMC, approved by the government in early 2025, represents the keystone of the nation’s reformed resilience architecture. Its creation is a direct answer to the lessons learned from past crises, designed to provide the professional, permanent, and agile coordination that was previously lacking. Operating under the direct authority of the prime minister, the CMC is designed to provide a single, empowered hub for analysis, planning, and, crucially, to improve coordination in crisis management between key state institutions, especially in complex threat scenarios, and provide support to decision-makers and political leadership.

The core functions of the CMC will include: continuous monitoring of the situation and information gathering; identifying potential risks and threats; conducting analysis of information and data to assess these risks and threats; strategic planning and coordination of operational planning; coordinating the planning, logistics, and recovery of state-level civilian crisis-management resources, including state material reserves; and coordinating crisis-communication efforts. Meanwhile, in the specific context of a military crisis, the CMC will be responsible for coordinating the civilian sector’s response and ensuring seamless cooperation with the military sector.

In essence, this new structure, continuously validated through planning and exercises, aims to ensure the leadership and effective whole-of-government coordination deemed essential for navigating these complex security challenges.

Challenges and future imperatives for resilience

Latvia has been systematically working to integrate all societal elements into its national defense posture, particularly since 2014. This ongoing effort, while showing significant progress, presents a range of challenges and necessitates clear future developments to ensure sustained and enhanced security in a complex geopolitical landscape.

Latvia’s commendable strides in building a comprehensive national resilience model are met with several persistent and evolving challenges; therefore, for the continued evolution and strengthening of Latvian resilience it is crucial to address them in a timely manner:

  1. Building and maintaining robust military defense capabilities. Maintaining momentum in military modernization programs and ensuring the capacity to sustain combat operations beyond an initial phase are crucial for credible deterrence and defense. This includes addressing the timeline for military buildup in relation to potential Russian force reconstitution. While Latvia’s defense spending is projected to reach 3.45 percent of GDP in 2025, with ambitions for 5 percent by 2026, efficient allocation across diverse needs—from military modernization to civil protection and societal programs—remains a complex undertaking. This financial strain also impacts critical infrastructure operators and municipalities tasked with new preparedness responsibilities. Therefore, continued investment in critical military capabilities, including air defense, coastal defense systems (like Naval Strike Missile systems), and long-range precision fires (HIMARS) should be pursued.
  2. Expanding the National Armed Forces. Planned expansions of the NAF and the full implementation of the State Defense Service face manpower constraints, requiring substantial investment in training infrastructure, qualified instructors, and innovative recruitment policies. The current reserve system also requires significant overhaul. Latvia should continue the expansion of the NAF, overhaul the reserve system to effectively integrate SDS graduates, and implement both dedicated reservist training and early military education. Ensuring adequate infrastructure, qualified instructors, and innovative policies for recruitment and training is crucial.
  3. Developing targeted strategies for critical areas. The development of industry-specific expertise for business and service continuity, particularly for critical infrastructure, can be a bottleneck. Cultivation of a deeper culture of shared responsibility with the private sector through targeted incentives, joint training programs, and secure information-sharing platforms should be continued. Additionally, mechanisms for improving intermunicipal coordination and resource sharing can alleviate the burden or strain associated with this issue. Latvia should also move beyond awareness campaigns to foster active participation, skill building, and a sense of ownership among the citizenry. Relatively low levels of public trust in certain state institutions can potentially hinder the full engagement of society in defense and resilience efforts. Actively integrating civilian agencies, businesses, and citizens into national resilience and defense planning through practical taskings and drills could help resolve this challenge. A primary challenge is also extending the intensity of preparedness from military threat scenarios to encompass nonmilitary crises across all civilian institutions. Intermunicipal coordination, particularly in resource sharing, needs strengthening. Consistent funding for new municipal responsibilities in civil defense is also a point of discussion, which the municipalities have on previous occasions cited as one of the reasons for their inability to build up civil defense capacities.
  4. Interagency coordination and centralized leadership. Ensuring seamless collaboration and clear, consistent communication of preparedness requirements across all sectors and among numerous actors remains a continuous task. Latvia faces persistent interagency coordination complexities. While the spirit of comprehensive national defense promotes collaboration, the practicalities of aligning different ministries, agencies, and even different levels of government can be challenging. Each entity has its own priorities, budgets, and institutional cultures. The MoD, while a key actor, cannot guarantee or ensure the engagement and resource commitments of other ministries. Effective comprehensive national defense requires a process led by a centralized authority with the power to direct and synchronize efforts across government—ideally the prime minister’s office or a dedicated high-level body. This is especially true for distributing tasks effectively among ministries and bodies of equivalent hierarchical power. Therefore, the establishment of the new Crisis Management Center is a promising development that could further leadership in the implementation of comprehensive national defense and serve as a central actor for confronting crisis situations. However, its mandate, authority, and resourcing will be critical. It must be empowered to not just coordinate but also to direct and enforce; it also must avoid becoming yet another silo and instead act as a true hub for national crisis response and comprehensive national defense implementation. The assurance that the CMC is rapidly and effectively staffed, resourced, and empowered to coordinate across all government levels, municipalities, and the private sector is paramount. The CMC should also be tasked with leading institutionalized, regular, complex cross-sectoral crisis-management exercises. Engaging all nongovernmental organizations and local media more consistently in preparedness exercises and overcoming local political inertia are both ongoing efforts. Effective Comprehensive National Defense coordination across ministries, especially in horizontal tasking, presents difficulties. 
  5. Countering evolving threats in the information landscape. Democratic countries like Latvia must counter influence within political, ethical, moral, and legal constraints, while adversaries often operate without such limits, giving them an advantage in proactive narrative projection. Latvia must continuously adapt its resilience strategies to counter new and evolving hybrid threats, sophisticated disinformation techniques, and novel cyberattack methods. Sustaining and enhancing programs to equip the population to withstand long-term information influence operations and maintain morale during crises is crucial. Further exploration and integration of nonviolent resistance concepts into national defense training and public guidance could promote the adaptability of resilience in this area. Latvia’s main approach to countering malign activities in the information space has been blocking narratives rather than proactively projecting its own strategic messages. A shift in policy is also needed from primarily blocking disinformation to more proactive narrative projection by developing and disseminating national strategic narratives that reinforce democratic values and societal cohesion. Expanding media literacy and critical thinking education is still an option; so, too, is allocating more support to independent and local media. Collaboration with allies on resilience benchmarking particularly for critical services, countering hybrid threats, and protecting critical infrastructure could bring about collective benefits in resilience building. 
  6. Reviewing the conceptual framework of national defense. Latvia has made impressive progress in defining and implementing the CND concept. However, we believe that the evolution of its conceptual framework must continue to better adhere to the complexities of real-life challenges and diverse crisis situations. As time passes, a review of the initially laid out core principles is needed. A primary concern is preventing comprehensive national defense from becoming a catch-all concept. While its all-encompassing nature is a strength there is risk that its boundaries are too wide and therefore its core purpose can become diluted, leading to a diffusion of effort and resources. For instance, if every societal issue is framed as a comprehensive national defense matter, prioritization becomes difficult and the focus on core security and defense preparedness could be lost. Future work should aim to refine the operational scope of the comprehensive national defense, ensuring it remains a focused and effective framework while clearly delineating its relationship with broader societal well-being initiatives. We need to clearly define what falls within comprehensive national defense and what is supportive but distinct to maintain its strategic integrity. 
  7. Deepening societal engagement and cohesion. Latvia should continue its efforts to make its comprehensive defense concept a nationwide reality not just a government policy on paper. As comprehensive defense evolves into a social reality, it demonstrates credible national will, complicates adversary planning, and builds the societal backbone needed to withstand pressure and deter aggression, including hybrid attacks from Russia. Although we have seen great examples of civil engagement from businesses in actively pursuing their role in the defense system, challenges remain with broad-based individual and community-level engagement. Latvia, for various historical and societal reasons, doesn’t always exhibit the strong deeply embedded community culture seen in some other nations. This can make reaching individuals and fostering grassroots resilience initiatives more challenging. Simply put, many individuals may not yet fully internalize their role or feel connected to a local preparedness network. Achieving genuine societal cohesion and developing the resilience of individuals within their respective communities must become a more pronounced strategic goal. This requires more than just information campaigns. It means investing in local leadership development, supporting community-based organizations, designing exercises that actively involve ordinary citizens in practical ways, and perhaps leveraging existing structures like schools, cultural centers, or even hobby groups to build networks of mutual support and preparedness. The aim should be to empower individuals and communities to self-mobilize for constructive action in crisis rather than relying solely on top-down directives.
  8. Continued advocacy for enhanced support from NATO, the EU, the United States, and regional allies for Latvia’s capability development, military modernization, joint exercises, and resilience projects is crucial, as is maximizing the prepositioning of allied military equipment and stocks. The current strategic window, while Russian forces are degraded by the war in Ukraine, should be used to rapidly build up defense capacity and societal resilience, secure continued US commitment, generate a greater NATO forward presence, deepen regional integration, and refine reinforcement mechanisms. Other regional resilience priorities include transitioning the Baltic defense line from a concept to a concrete reality with fortified positions, leveraging natural terrain, and ensuring forces train to fight effectively from these prepared positions.

Editors: Armands Astukevičs, Elīna Vrobļevska.

Contributors: Mārcis Balodis, Hans Binnendijk, Marta Kepe, Beniamino Irdi.

Annex 1: Management structure

A. Strategy and policy level

President of Latvia and National Security Council (NSC): The president, as NAF supreme commander, chairs the NSC. The NSC, comprising top state officials and security heads, advises and coordinates on national security and defense, and offers recommendations to the Saeima (see below) and Cabinet.

Saeima (Parliament): Enacts national security, defense, and civil-protection laws; approves key strategic concepts (National Security Concept, State Defense Concept); and provides parliamentary oversight.

Key committees:

  • National Security Committee: Prepares national security policy documents for Saeima approval.
    • Defense, Internal Affairs and Corruption Prevention Committee: Oversees relevant ministries, legislation, and budgets.
    • Comprehensive National Defense Subcommittee: Monitors government implementation of Comprehensive National Defense (CND) elements within the National Security and State Defense Concepts.
    • Other committees: May address specific CND implementation aspects as needed.

Cabinet of Ministers (CoM): The highest executive body, implementing national CND policy, approving strategic plans and regulations, allocating resources, and directing ministries.

Key bodies:

  • Crisis Management Centre (CMC): Concept approval in early 2025; planned to be fully operational when legislation has been passed. Envisioned as the central, national crisis-management coordinator (monitoring, analysis, strategic planning. Its potential role in leading overall CND coordination is under active discussion.
    • Ministerial-Level Working Group for CND: Chaired by prime minister or lead minister. Ensures political alignment and high-level interministerial CND strategy coordination.

B. Planning and coordination level

State Secretary-Level Working Group for Comprehensive Defense (CND): Chaired by MoD state secretary. Coordinates CND plan development, harmonization, and monitoring across ministries at the senior-civil-servant level, translating Cabinet decisions into actionable plans.

Ministry of Defense (MoD): Lead institution for the State Defense Concept/Plan and CND concept development; responsible for military defense, NAF development, and civil-military cooperation planning.

Ministry of Interior (MoI): Lead institution for public order, internal security, and the State Civil Protection Plan; oversees the State Fire and Rescue Service (VUGD), State Police, and Border Guard; coordinates the Civil Defense Operational Management Centre.

Line ministries (e.g., health, transport, economy): Develop and implement sector-specific resilience plans and CND measures, ensuring continuity of essential services and participating in relevant working groups and exercises.

Bank of Latvia: Ensures financial-sector resilience, including payment systems and cash circulation, in cooperation with commercial banks.

C. Implementation and operations (state level):  

National Armed Forces Headquarters (NAF HQ): The NAF’s highest military headquarters and main operational command and control entity under the chief of defense; manages NAF operations, plans/executes joint operations (peacetime, crisis, war), and coordinates with civil authorities such as the Operational Control Centre of Civil Protection.

Operational Control Centre of Civil Protection: A state-level coordination body for major crises or military threats; integrates multiagency expert groups and works closely with NAF HQ to coordinate civil-military efforts.

State Fire and Rescue Service (VUGD): Primary state agency for firefighting, rescue operations, and practical civil-protection measures; implements elements of the State Civil Protection Plan.

Other key state agencies and services (e.g., Emergency Medical Service, State Police, Border Guard): Implement crisis response and resilience measures according to their mandates and plans, participating in exercises and interagency coordination.

Municipal and private-sector actors:

Civil Defense Commissions (thirty-seven at municipal level): Develop and implement local civil defense plans; coordinate local resources and crisis response (including public notification, evacuation, basic services, shelters); cooperate with regional NAF units and state services.

Private sector/critical infrastructure operators: Develop and implement business continuity plans for essential service resilience; cooperate with state and municipal authorities; may be involved in resource mobilization.  


Annex 2: Framework of concepts, plans, laws, and regulations

Project editors

Armands Astukevičs is a researcher at the Center for East European Policy Studies in Riga, Latvia. Currently, he is working on his doctoral dissertation on authoritarian regime resilience. He has a master’s degree in political science from University of Latvia. Astukevičs’ previous work experience includes policy analysis and planning in the Latvian Ministry of Defense, where he focused on crisis management and comprehensive national defense issues. His current research interests relate to topics on the defense and security policy of the Baltic states, national resilience and resistance to hybrid threats, and analysis of Russia’s foreign policy processes.

Elīna Vrobļevska is a researcher and deputy director at the Center for East European Policy Studies in Riga, Latvia. She has a doctoral degree in international relations from Rīga Stradiņš University, with her thesis on “Russia’s foreign policy identity ideas and their manifestation in foreign policy (2012–2022).” Vroblevska serves as a lecturer and researcher at the Faculty of Social Sciences, Rīga Stradiņš University. Her research interests include the analysis of Russia’s foreign policy narratives and their impact on political processes, the study of Russia’s foreign policy and the security challenges it poses, as well as the examination of Russia’s activities in the information space.

Contributing authors

Mārcis Balodis is a researcher and a member of the board of the Center for East European Policy Studies. His primary research focuses on Russia’s foreing and security policy as well as Russia’s use of hybrid warfare.

Hans Binnendijk is a distinguished fellow with the Atlantic Council’s Transatlantic Security Initiative, part of the Scowcroft Center for Strategy and Security.

Marta Kepe is a nonresident senior fellow with the Atlantic Council’s Transatlantic Security Initiative within the Scowcroft Center for Strategy and Security. She is also a senior defense analyst at RAND, a nonprofit, nonpartisan research organization.

Beniamino Irdi is a nonresident senior fellow with the Atlantic Council’s Transatlantic Security Initiative within the Scowcroft Center for Strategy and Security. He is also the head of strategic and international affairs at Deloitte Legal Italy and founder and CEO of HighGround, a political risk consulting firm.

Related content

Explore the program

The Transatlantic Security Initiative aims to reinforce the strong and resilient transatlantic relationship that is prepared to deter and defend, succeed in strategic competition, and harness emerging capabilities to address future threats and opportunities.

The post The evolution of Latvia’s defense and security policy in resilience building appeared first on Atlantic Council.

]]>
Prioritizing Canada’s investment in Arctic infrastructure https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/prioritizing-canadas-investment-in-arctic-infrastructure/ Tue, 23 Dec 2025 20:16:33 +0000 https://www.atlanticcouncil.org/?p=896228 Canada’s new budget promises a “generational investment” in infrastructure, with a significant amount earmarked for Arctic dual-use infrastructure—improving Canada’s military presence in the north, accessing untapped critical mineral reserves, and offering new economic opportunities. But this is only the beginning of the region’s infrastructure needs.

The post Prioritizing Canada’s investment in Arctic infrastructure appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Canada’s new budget promises a “generational investment” in infrastructure, with significant funding earmarked for Arctic dual-use infrastructure.
  • These funds advance multiple goals set by the new government: improving its military presence in the north, accessing untapped critical mineral reserves, and offering new economic opportunities to Arctic communities.
  • Translating this funding into tangible projects and incorporating Canada’s climate goals into their development will be critical.

The Canadian government is making a “generational investment” in its infrastructure—including pipelines, ports, and roadways. Prime Minister Mark Carney’s first federal budget, unveiled in early November 2025, establishes Canada’s long-term prosperity as a driver for this investment and enables the new government to approach linked global challenges from a place of strength. Canada’s budget process differs from the US budget process, producing a more concrete plan with less room for deviation once the budget is set. The Canadian government budget outlines actual revenue and the government’s expenditure plans. Indeed, infrastructure investments combine two priorities in the current threat landscape: economic ambition and military necessity. To achieve the stated goals of doubling Canadian exports to non-US markets over the next decade and meeting the new defense spending pledge to which NATO allies committed at the Hague summit, Canada’s new budget begins a major effort to have infrastructure catch up to ambition.

Nowhere is this more apparent than in Canada’s Arctic, where infrastructure investment has sorely lagged. Canada’s vast and remote north is a challenging environment for building infrastructure. It is costly to build and to maintain, with prohibitively high initial costs and the “tyranny of distance” often deterring investment. Amid growing international interest in the Arctic, including pressure from the United States, Canada’s north can no longer be ignored, especially as Carney’s new nation-building agenda pushes for investment in infrastructure. Investing in Canada’s northern infrastructure addresses multiple necessities: It bolsters Canada’s military footprint in the Arctic; it contributes to NATO commitments on defense spending, particularly toward the goal of 1.5 percent of gross domestic product (GDP) spent on infrastructure; it strengthens the economic opportunities available to communities in the region; and it improves access to critical minerals.  

The Canadian Arctic is facing a profound period of transformation. It is warming nearly four times faster than the rest of the globe, dramatically impacting attempts to build infrastructure in the region. Permafrost thaw, less sea ice, and rising sea levels are all challenges facing Canada’s north. Ultimately, this reality needs to be central to the development of infrastructure projects in the region. Canada seeks to become a “clean energy superpower” by supporting the development of low-emission energy projects such as nuclear reactors and low-carbon liquefied natural gas. The government is pushing for the development of carbon capture and storage technologies, as well as enhanced methane regulations. It is also affirming its commitment to the industrial carbon tax. The new federal budget’s approval by parliament was only possible with support from the Green Party. The environment must remain central to Carney’s plans for economic and infrastructure expansion in order to maintain support for his minority government.

One highlight of the new budget is the Arctic Infrastructure Fund. The government is proposing C$1 billion over four years for Transport Canada to invest in “major transportation projects in the north,” including “airports, seaports, all-season roads, and highways.” These infrastructure investments have both civilian and military uses. The Mackenzie Valley Highway is a prime example of the challenges facing major infrastructure projects in the region. The all-weather highway extension is designed to connect remote communities in the Northwest Territories. While this project’s origins date back to the 1960s, it is still several years from breaking ground. The Mackenzie Valley Highway alone is projected to cost C$1.65 billion, with the majority of the cost covered by the federal government. In this context, C$1 billion over four years—while an admirable start—is simply not enough to make a significant difference. To address infrastructure needs in Canada’s north, and to transform its portion of the Arctic so it is no longer the “soft underbelly” of the North American Arctic, this funding must be only the beginning of the Canadian government’s investments. As Carney’s large-scale projects continue to unfold, the Canadian Arctic will require more resources to meet civil and military infrastructure needs and effectively project power into the north.

In late 2025, the Atlantic Council’s Transatlantic Security Initiative hosted a workshop with government officials, academic experts, and participants from the public and private sectors of Canada, the United States, and Europe. The insights gathered from these conversations helped inform this issue brief, which assesses challenges, recommendations, and opportunities for Canada’s infrastructure in the Arctic.

Recommendations for the Department of National Defence and Canadian Armed Forces

Incorporate sustainability and climate security in Arctic infrastructure planning

Many of the Canadian government’s plans for infrastructure in the Arctic are dual use in nature, with the goal of increasing its military footprint in the region. Increased military or infrastructure presence in Canada’s north will invariably have environmental ramifications. Air- and sea-based military activities can generate excessive noise levels and air pollution, while military exercises can result in soil compaction and the destruction of vegetation. As Canada grows its infrastructure footprint in the north, it will need to include countermeasures to offset this damage—such as creating specific operational zones to protect ecosystems or paying to mitigate harm done to the environment. 

Despite these challenges, Canada has extensive resources at its disposal, such as NATO’s new Climate Change and Security Centre of Excellence (CCASCOE), headquartered in Montreal. This center can coordinate best practices, act as a standard-setting body, and provide guidance for allies and partners to operate sustainably in the region. Drawing on lessons from the European Arctic and adapting them for the North American Arctic is one area in which this center of excellence can benefit dual-use infrastructure projects.

Another reason to ensure infrastructure in the Canadian Arctic meets environmental standards is to support Canada’s new Climate Competitiveness Strategy. By linking climate sustainability to economic growth, the Canadian government is building a competitive advantage at a time when other Group of Seven (G7) countries and the European Union are walking back pledges to meet green targets.

Include local communities’ expertise and experiences in infrastructure development

As investments in Canada’s Arctic infrastructure increase, environmental considerations are being taken into account—and the experiences and expertise of those living in Canada’s northernmost regions must also be integrated into planning. Indigenous and local communities are on the forefront of the challenges facing the region, from sinking roads and runways to access to healthcare. Calls to work with Indigenous and First Nation communities are integrated throughout the budget.

Starting in 2025–2026, the government is allocating C$40 million over two years to Indigenous Services Canada through the Strategic Partnerships Initiative “to support Indigenous capacity building and consultation on nation-building projects,” some of which will be in the Canadian Arctic. The Arctic Infrastructure Fund, with its C$1 billion over four years, is specifically tasked with advancing Indigenous economic reconciliation. The budget highlights that “dual-use infrastructure investments in the north will reliably meet both military and local needs, and the government recognizes that Inuit, First Nations, and other communities are best placed to identify community needs.” Spending on infrastructure in Canada’s north has military, economic, and local resilience factors. Ensuring local and Indigenous perspectives are integrated into all stages of infrastructure development—from the planning stages to design, groundbreaking, and finalization of projects—will be key to ensuring the investments successfully meet the needs of both the military and the local community. Investing in roadways, ports, and railways in the Arctic, in close alignment with the local community, will amplify whole-of-society resilience in ways not yet realized.

Recognize critical minerals’ potential as a driver of infrastructure development in the region.

The Canadian government’s decision to increase investment in infrastructure and its northern territories can be partially understood by the global race for rare earth materials heating up. At the G7 meeting in Alberta, the prime minister introduced the Critical Minerals Production Alliance—a Canadian-led initiative that leverages trusted international partnerships to enhance critical mineral supply chains for collective defense and advanced technology.

Canada is one of the top five producers of ten critical minerals, and minerals account for 5 percent of Canada’s nominal GDP. Its northern regions are home to significant deposits of iron ore, gold, diamonds, and rare earth elements. The Mary River Mine on Baffin Island is one of the world’s northernmost reserves of high-grade iron ore, producing millions of tons annually. Similarly, the Hope Bay and Meliadine gold mines contribute substantially to Canada’s mineral output. These resources are critical for economic development and for national security.

Another major priority identified in the new budget is the Port of Churchill Plus. A series of projects will upgrade the Port of Churchill—Canada’s only Arctic-region deepwater port for more than 106,000 miles of coastline—and expand trade corridors with an all-weather road, an upgraded rail line, a new energy corridor, and marine icebreaking capacity. The goal is for the Port of Churchill to become a major four-season and dual-use gateway for the region. Expanded export capacity in the north through Hudson Bay will contribute to increased and diversified trade with Europe and other partners, while more strongly linking Churchill to the rest of Canada.

While this push for access to critical minerals makes sense from an economic perspective, it has several notable roadblocks to overcome. First is the lack of processing and refinement capabilities in Canada, and in the West more broadly. China has exerted a global chokehold over rare earth materials globally, partly due to its technical expertise in the processing stage. Western companies have struggled to compete with China over environmental and regulatory concerns, which leads to the second point: Extraction of critical minerals has an environmental tradeoff. Canada’s economic expansionism and green ambitions will eventually collide—likely in the critical minerals space. In the ever-shifting global market for critical minerals, Canada cannot prioritize short-term economic gain over long-term environmental consequences.

As always, one of the core challenges facing infrastructure projects in Canada’s north lies in sustaining this momentum in the long term. The narrow passage of this budget by parliament demonstrates the challenges of minority government rule. Improving affordability for average Canadians was the main refrain of those who voted against the new budget—a challenge that will not go away in the short term. In the long term, Carney must break the chronic habit of previous governments promising on defense spending without following through. The budget also highlights upcoming sacrifices—C$60 billion in total spending cuts in the next five years—including a 10 percent cut to the public sector (amounting to roughly forty thousand jobs). Although the C$1 billion in funding through the Arctic Infrastructure Fund is a strong step forward, it will need considerably more funding to meet Canada’s ambitions in the region and must be supported by action.

About the author

Jason C. Moyer is a nonresident fellow with the Transatlantic Security Initiative at the Atlantic Council’s Scowcroft Center for Strategy and Security. 

Related content

Explore the program

The Transatlantic Security Initiative aims to reinforce the strong and resilient transatlantic relationship that is prepared to deter and defend, succeed in strategic competition, and harness emerging capabilities to address future threats and opportunities.

The post Prioritizing Canada’s investment in Arctic infrastructure appeared first on Atlantic Council.

]]>
Serbia’s future depends on rebuilding rule of law and EU credibility https://www.atlanticcouncil.org/in-depth-research-reports/report/serbias-future-depends-on-rebuilding-rule-of-law-and-eu-credibility/ Tue, 23 Dec 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=895146 After a full year of antigovernment protests, Belgrade faces a sustained challenge to the status quo. The corruption that drew protestors to the streets also stifle growth and imperil political freedom in the country. Restoring a credible path to EU accession would be the single most powerful external incentive for change.

The post Serbia’s future depends on rebuilding rule of law and EU credibility appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Serbia’s reform drive has lost steam, with corruption and political centralization eroding the rule of law and limiting growth.
  • The student-led protests that began in late 2024 signal renewed civic pressure for fairer elections and stronger institutions—if they succeed, Serbia could return to its reform trajectory of the early 2000s.
  • Restoring a credible path to EU accession would be the single most powerful external incentive for change, with potential spillover benefits for stability and governance across the Western Balkans.

This is the third chapter in the Freedom and Prosperity Center’s 2026 Atlas, which analyzes the state of freedom and prosperity in ten countries. Drawing on our thirty-year dataset covering political, economic, and legal developments, this year’s Atlas is the evidence-based guide to better policy in 2026.

Evolution of freedom

Serbia’s freedom trajectory since 1995, according to the Freedom and Prosperity Indexes, falls into three distinct periods. The first is the dismal 1990s, defined by war, sanctions, and international isolation; institutions hollowed out, and the political sphere narrowed to the point of collapse. The second begins with the fall of Slobodan Milošević in 2000 and runs to roughly 2011, when the country reopened to the world and took the first steps toward European integration. The third starts around 2012, when the political environment tightened again and the gains of the previous decade began to erode. This pattern is visible in the Freedom Index: a sharp improvement after 2000, followed by a gradual downturn driven overwhelmingly by the political subindex after 2012.

The post-2000 rebound was immediate and dramatic in terms of politics and economics, but the rule of law took a more gradual turn. The political opening—competitive elections, wider latitude for civil society and media, and normalization of international relations—was the most visible change. Serbia signed bilateral investment treaties and free-trade agreements with neighbors and, in 2008, concluded a Stabilization and Association Agreement with the European Union. Even though domestic politics remained turbulent—Prime Minister Zoran Đinđić was assassinated in 2003, nationalism continued as a potent force, and Kosovo’s 2008 declaration of independence sparked a backlash—the trajectory differed markedly from the 1990s. European integration acted as the anchor that pulled politics and policy toward a more open equilibrium.

In 2010, the balance of incentives changed. After the global financial crisis, the EU’s enlargement energy waned; for the Western Balkans, accession increasingly looked theoretical rather than imminent. Without a credible “carrot and stick,” the reform push slowed across the region, while in Serbia, the political environment hardened against EU integration. The timing aligns with the ascent of the Serbian Progressive Party (SNS) and the rise of Aleksandar Vučić—first as prime minister in 2014 and later as president—under whom power centralized and media pluralism came under pressure. International observers like the Organization for Security and Co-operation in Europe (OSCE) became increasingly critical of the country’s internal dynamics. Civic activism—still very present—operated in a tighter space.


European integration acted as the anchor that pulled politics and policy toward a more open equilibrium.

Over the past thirteen years, the cumulative effect has been systemic: Corruption has eroded the rule of law and turned key institutions into instruments of incumbency. Elections remain formally competitive but are marked by recurrent irregularities that leave little chance for alternation. Ruling party-aligned media dominate the information space, public advertising is allocated opaquely, and the security services have targeted civil society organizations on dubious grounds. The result is a shrinking political arena in which checks and balances are increasingly performative rather than constraining.

Media pluralism has faced sustained pressure. Journalists and associations report smear campaigns, threats, and pervasive self-censorship, while access to advertising and public funds tracks political alignment. Civil society is larger and more professional than two decades ago, but its operating space has narrowed—foreign funding is stigmatized, senior officials attack prominent NGOs, and procedural burdens sap time and resources. The situation is not one of outright closure, but the cumulative friction is real.

Within the political subindex, the steepest, most persistent deterioration is in political rights—freedom of association and expression—while the elections and legislative-constraints components also weaken. The contour is recognizable: After the 2000 break, political rights jump, remain broadly stable until the early 2010s, and then trace a clear decline that, while significant, does not return to 1990s levels. Elections remain formally competitive, but the tilt in media access and state resources has grown; the legislative constraints on the executive ebb as power concentrates in the presidency.

The legal subindex tells a different story: It starts at a low point, followed by early reforms and then stasis. The first post-Milošević years saw the establishment of baseline prosecutorial and judicial reforms, but two hard problems persisted: a lack of genuine independence from the executive and the capacity to process cases in a timely, professional way. Both remain binding constraints. Serbia’s legal profile improves off its post-conflict trough and then plateaus, reflecting institutions that function day-to-day but buckle at the most sensitive interfaces with politics. The causes are structural: Building effective, impartial courts is far harder and slower than opening political space, and where EU conditionality is weak or distant, momentum lags.


The steepest, most persistent deterioration is in political rights—freedom of association and expression.

The legal upswing in the 2000s reflected real change—new courts, stronger constitutional guarantees, prosecutorial reforms, and a framework closer to European norms—and informality fell as tax bases modernized and customs enforcement improved. But judicial independence and effectiveness remained the weak links: External pressure, slow case resolution, selective enforcement in high-profile economic cases, and gaps in accountability and conflicts-of-interest rules kept trust low. Those frictions continue to drag on the economy.

Within the legal subindex, Serbia’s early-2000s bump is consistent with a shift from conflict to basic legal normalcy—laws regularized, courts reopened, and administration stabilized—with only minor oscillations later. The 2019–20 dip likely reflects the major protests triggered by the murder of opposition politician Oliver Ivanović in 2018, which led many opposition parties to boycott the 2020 elections. It also reflects setbacks in judicial reform and popular distrust in legal institutions. Constitutional amendments were eventually adopted in 2022, a move that modestly improved formal judicial independence even though implementation remains contested. 

The economic subindex improves steadily from the early 2000s until the pandemic, then levels off. Its composition helps explain why. Women’s economic freedom—largely driven by statutory changes captured in the World Bank’s Women, Business and the Law global report—rises markedly in the mid-2000s. Investment freedom and trade freedom also strengthen as Serbia deepens its commercial integration with the EU and broadens ties with Russia, China, Turkey, and others. Regulatory reform—streamlined procedures, clearer company law, and liberalized capital flows—improved the investment climate, while the accession process nudged alignment on services and market-access rules. New firms entered and integrated into regional supply chains in manufacturing and agribusiness, even as legacy incumbents persisted in some sectors. This is the one domain where policy has been consistently outward-oriented over the past quarter-century, even as rule-of-law reforms slowed. In effect, Serbia decoupled economic integration from institutional convergence: It became a more open, investor-friendly production platform without moving in tandem on media freedom or judicial independence. However, challenges remain in economic freedom. Property-rights enforcement and contract execution remain below EU norms—a deterrence for smaller investors. State-owned enterprises still play an outsized role in some sectors, obstructing competition and investment freedom. The use of incentives, particularly for some foreign investors, while bringing in new capital can also distort the level playing field.

The most recent political developments underscore both the resilience of civil society and the limits of the current equilibrium. Since late 2024, large student-led protests—sparked by a fatal building collapse in the city of Novi Sad and subsequent corruption allegations in the construction industry—have broadened into a sustained challenge to the status quo. The student-led movement remains within institutional politics: It aims to contest and win elections and then reform from within. Whether it can do so without direct confrontation depends on the state’s willingness to ensure a level playing field—and on the response of powerful external patrons. In the Freedom Index, the immediate consequences fall on the political subindex, but the stakes are larger: Progress in the legal subindex will require credible insulation of the judiciary from political interference, and professional policing—areas that have lagged for a decade.

Evolution of prosperity

Serbia’s prosperity profile reflects the same three phases, but the translation from freedom to outcomes is neither automatic nor linear. In the early 2000s, as political freedoms opened and the economy reconnected to Europe, income per capita rose and the country began to narrow the gap with the regional average. Then the 2008–09 financial crisis hit Serbia, though not as hard as in many EU member states—partly because Serbia was outside the euro area and partly because of its diversified trade and investment partners. The pandemic-era shock was similar: Growth dipped but recovered quickly relative to Western Europe, helped by early access to vaccines from China and less severe energy-price pass-through due to ties with Russia. The Prosperity Index’s income component captures this series of interruptions rather than collapse.

The country’s resilience is tied to its growth model. For roughly a decade, net foreign direct investment (FDI) inflows have run at about 6–7 percent of GDP, with sources increasingly diversified beyond the EU. China has become a leading investor, while Serbia has also plugged into German value chains in mid-tier manufacturing. The model is not high-tech sophistication; rather, it is steady insertion into European (and to a degree global) production networks. As long as political stability held, the arrangement delivered: jobs in export-oriented plants, a stronger tradables base, and sustained convergence. The current uncertainty—whether stability can continue without institutional reform—is therefore not an abstract governance concern but a direct question about the durability of the prosperity path.

Prosperity has more dimensions than income, and Serbia’s experience across them is uneven. Health is the sharpest outlier in the pandemic period: While output fell less than in Western Europe, excess mortality was higher, reflecting more permissive lockdowns, thinner safety nets, and health-system limits. Over the long run, health outcomes have improved, but there is still a persistent gap with richer European systems; out-of-pocket costs are high by regional standards, and hospital infrastructure trails the EU core.

Education follows a less pronounced trajectory. The baseline is decent legacy human capital—Serbia inherits strong math and engineering traditions from Yugoslavia—but the system struggles with funding and modernization. The Prosperity Index’s education component rises gradually with cohort attainment and expected years of schooling, but there is no step change akin to the post-2000 political jump. The bottlenecks are familiar: teacher pay and training, infrastructure in secondary and vocational streams, and alignment with the needs of an export-oriented manufacturing base.

On income inequality, Serbia’s path in the 2000s and early 2010s conforms to a modest Kuznets-style worsening—where inequality rises during the early stages of development—as growth resumed and labor markets restructured. That was followed by a period of relative stability and, by the mid-2010s, Serbia’s Gini index was among the higher readings in Europe, reflecting how early market liberalization often rewards upper deciles first while redistribution and competition policy lag. Today’s level is close to the mid-1990s baseline, underscoring how incomplete rule-of-law reform constrains broad-based gains. Here again, the structure of growth matters: FDI-led manufacturing and construction have provided employment and some formalization, but the gains are uneven across regions and skill levels. When investment cools—because confidence dips or political risk rises—the distributional strain is quickest to reappear at the margins.


The environment and the treatment of minorities complete the picture. In environmental quality, the legacy of coal-heavy energy and industrial emissions weighs on air quality, especially in urban centers, even as gradual gains in household energy and vehicle standards help. The Prosperity Index’s environment component records a slow improvement that is vulnerable to policy drift and external shocks. The politics of a green transition are visible in the Jadar lithium project near Loznica. Touted as a strategic growth opportunity and opposed over groundwater risks, land loss, and opacity, the mining project has swung from license revocation in 2022 to partial reinstatement in 2024, reigniting protests. The episode captures the broader dilemma: aligning investment with credible environmental standards and local consent.

On minority access, the record is mixed: Legal protections exist and the worst 1990s legacies have receded, but equal access to services and opportunities depends on local administration and enforcement capacity—precisely the legal-institutional levers that have lagged. Post-2000 reforms—constitutional protections, cultural councils, and local representation—moved minority rights closer to regional norms, especially for Hungarians, Bosniaks, and Roma, but progress has stalled since 2011. Formal guarantees remain, but politicization, uneven municipal implementation, and hostile media narratives in tense electoral periods have limited real access to services and opportunities.

The interaction between freedom and prosperity is clearest in three places. First, the post-2012 slide in political rights bleeds into the economy by weakening predictability: When media scrutiny and legislative checks soften, policy becomes more discretionary, which eventually shows up as softer investment freedom and a more erratic economic policy. Second, the state capacity problems in legal matters—especially judicial independence and effectiveness—translate into higher transaction costs, slower dispute resolution, and a bias toward insiders; these are prosperity-sapping frictions, even in an open-trade, FDI-friendly regime. Third, women’s economic freedom raises the ceiling on growth by widening the labor pool and entrepreneurial base; Serbia’s mid-2000s improvement on statutory gender equality has been a quiet contributor to its industrial catch-up. The Prosperity Index registers all three channels, but the pace and breadth of gains depend on whether the political and legal pillars reinforce or undercut one another.


The post-2012 slide in political rights bleeds into the economy by weakening predictability.

Finally, recent domestic politics inject new uncertainty into what had become a well-understood model. The student-led protests that began in late 2024 have matured into a more organized political movement seeking early elections and a reform mandate. It is clear that this crisis will not simply fade away. Any escalation will pose serious questions for both Serbia’s democratic trajectory and the wider Western Balkans, where progress on rule of law, civic rights, and European integration remains fragile.

Investors are studying these signals closely. Already, foreign direct investment has fallen sharply: in the first five months of 2025, net FDI inflows amounted to roughly €631 million, compared with about €1.943 billion in the same period the year before—a drop of around 67.5 percent. If the political outcome is a genuine leveling of the electoral playing field and a credible push on rule-of-law reforms, Serbia’s prosperity path could re-accelerate—foreign capital is mobile and already present at scale. But if confrontation mounts, early elections are denied, and external patrons from China and Russia harden their positions, the risk is a prolonged standstill with wider regional repercussions.

The Prosperity Index is a lagging indicator here, but its income and inequality components will tell the tale in the next few readings.

The path forward

Serbia’s way forward is not mysterious, but it will be hard. The growth model that delivered catch-up—trade openness, diversified investment partners, and insertion into European value chains—remains viable. But it is probably not going to deliver the same amount of growth in an increasingly fragmented global economy facing higher tariffs and a global slowdown in FDI. And preserving it now requires political and legal reforms that were postponed when the EU accession horizon receded. The central insight of the last decade is that while economic integration can be decoupled from institutional convergence for a time, it cannot be decoupled indefinitely. The Freedom Index already shows the cost of delay in the political subindex, and the longer the legal subindex lags, the more the prosperity gains will flatten.


It is clear that this crisis will not simply fade away … escalation will pose serious questions for both Serbia’s democratic trajectory and the wider Western Balkans.

The immediate priority is political. Elections must be not only formally competitive but substantively fair, with balanced media access and a clean separation between state resources and party campaigning. Legislative oversight should recover ground lost to executive centralization; if the presidency remains dominant, courts and parliament cannot perform their checking functions. Serbia’s civil society has shown it can mobilize against overreach; the question is whether that energy can produce institutional change without confrontation. A credible commitment to level competition would register quickly in the political subindex—especially in elections and political rights—and, with a short lag, in investment sentiment.

The second priority is legal. Serbia needs a judiciary that is both insulated and empowered. Independence requires appointment and promotion systems that minimize political leverage; effectiveness requires resources and management that accelerate case processing and professionalize court administration. The legal subindex’s components offer a checklist: Clarify laws and reduce contradictions; strengthen judicial independence and effectiveness; improve bureaucratic quality while tightening corruption control; maintain security without eroding civil liberties; and treat informality not as a statistical curiosity but as evidence of high transaction costs that can be lowered. Even modest improvements would be catalytic: When firms expect fair, timely adjudication, they invest more and formalize faster, amplifying the earlier economic gains due to trade and investment liberalization.

Sound economic policy should aim to keep what works and fix what jeopardizes it. The external stance—openness to EU markets, continued diversification of partners, and predictable treatment of foreign investors—has served Serbia well. But stability established by way of muted scrutiny is running out of road. A rules-first approach to fiscal policy, procurement, and state-firm relations would lower the risk premium without forcing a retreat from the country’s pragmatic geoeconomic posture. In this sense, the economic subindex’s strongest components—trade, investment, and women’s economic freedoms—are the baseline to protect, while property-rights enforcement and corruption control are the levers for raising the ceiling.

Prosperity policy should target slow variables that pay off across cycles. Health outcomes require steady investment in primary care, hospital equipment, and public-health capacity; the pandemic showed how quickly gaps widen when systems are overrun. Education needs a dual track: modernized general schooling and a serious vocational stream matched to the country’s role in regional value chains. Inequality is best tackled by sustaining labor-intensive FDI while pushing more value added into local supply chains; when more of the “last mile” of production happens domestically, wage gains spread. Environmental quality will improve when energy policy tilts toward cleaner sources and when industrial standards rise; here, alignment with EU norms is both feasible and, over time, growth-enhancing. The Prosperity Index components—health, education, inequality, environment, minorities—will move together if legal quality does its part.

Geopolitics will keep testing Serbia’s pragmatism. The country’s relative nonalignment among major powers has so far produced diversified capital and insurance against shocks. The risk is that a domestic political crisis or external confrontation would force sharper choices. The safest way to preserve room for maneuvering is institutional: Fairer elections, stronger oversight, professional courts, and trustworthy administration lower the temperature at home and raise trust abroad. Investors do not require perfection; they require predictability. The Freedom Index’s political and legal pillars are proxies for that predictability, and progress there will determine whether the Prosperity Index resumes its upward slope or plateaus.

Reenergizing the EU accession track would have effects well beyond Serbia’s borders. Because Belgrade sits at the center of the region’s unresolved files—above all, relations with Kosovo and the major constitutional and territorial agenda in Bosnia and Herzegovina—building Serbian stability would lower regional tensions. A visible move from Belgrade to a more committed EU path would lower the political risk premium, unlock stalled dossiers, and revive the demonstration effect that powered reforms in earlier enlargement waves. The spillovers would be tangible—more predictable rules, faster dispute resolution, clearer procurement—and would draw in investment that binds the region more securely to European value chains. In short, if Serbia moves, the region moves; if Serbia stalls, momentum will move elsewhere in the region.

A recommitment to Serbia’s EU integration is possible. The region offers examples of rapid legal improvements when potential EU accession is real and monitored; Serbia’s own economy shows how quickly openness pays when credibility is present. What has been decoupled can be recoupled: political pluralism that is not merely formal, legal institutions that function without fear or favor, and an economy that remains as open and diversified as the past decade but under rules that are clearer and more evenly enforced. If that alignment is restored, the next readings should show the familiar pattern in reverse: first, stabilization of political rights and elections; next, a nudge up in legal quality; then, renewed momentum in investment and trade freedom—followed by broader prosperity gains that are felt not only in GDP charts but in health clinics, classrooms, and paychecks.

about the author

Richard Grieveson is deputy director at the Vienna Institute for International Economic Studies and a member of the Balkans in Europe Policy Advisory Group. He coordinates wiiw’s analysis and forecasting of Central, East and Southeast Europe. In addition he works on European policy analysis, European integration, EU enlargement, economic history, and political economy.

He holds degrees from the universities of Cambridge, Vienna, and Birkbeck. Previously he worked as director in the Emerging Europe Sovereigns team at Fitch Ratings and regional manager in the Europe team at the Economist Intelligence Unit.

Explore the data

The Indexes rank 164 countries around the world. Use our site to explore thirty years of data, compare countries and regions, and examine the subindexes and indicators that comprise our Indexes.

Stay Updated

Get the Freedom and Prosperity Center’s latest reports, research, and events.

Stay connected

Read all editions

2026 Atlas: Freedom and Prosperity Around the World

Against a global backdrop of uncertainty, fragmentation, and shifting priorities, we invited leading economists and scholars to dive deep into the state of freedom and prosperity in ten countries around the world. Drawing on our thirty-year dataset covering political, economic, and legal developments, this year’s Atlas is the evidence-based guide to better policy in 2026.

2025 Atlas: Freedom and Prosperity Around the World

Twenty leading economists, scholars, and diplomats analyze the state of freedom and prosperity in eighteen countries around the world, looking back not only on a consequential year but across twenty-nine years of data on markets, rights, and the rule of law.

2024 Atlas: Freedom and Prosperity Around the World

Twenty leading economists and government officials from eighteen countries contributed to this comprehensive volume, which serves as a roadmap for navigating the complexities of contemporary governance. 

Explore the program

The Freedom and Prosperity Center aims to increase the prosperity of the poor and marginalized in developing countries and to explore the nature of the relationship between freedom and prosperity in both developing and developed nations.

The post Serbia’s future depends on rebuilding rule of law and EU credibility appeared first on Atlantic Council.

]]>
How to equip Canada’s defense industrial base to meet NATO’s Hague summit commitments https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/how-to-equip-canadas-defense-industrial-base-to-meet-natos-hague-summit-commitments/ Tue, 23 Dec 2025 00:39:49 +0000 https://www.atlanticcouncil.org/?p=895694 In 2025 Canada met NATO’s target of spending 2 percent of GDP on defense for the first time and committed to the new target of 5 percent by 2035, but its defense industrial base will struggle to deliver in its current state.

The post How to equip Canada’s defense industrial base to meet NATO’s Hague summit commitments appeared first on Atlantic Council.

]]>

Bottom lines up front

  • In 2025 Canada met NATO’s target of spending 2 percent of GDP on defense for the first time and committed to the new target of 5 percent by 2035, but its defense industrial base will struggle to deliver in its current state.
  • Canada will need to grow its defense industrial base through consistent and predictable contracts, streamline the procurement process, and develop expertise in niche markets such as specialized Arctic capabilities.
  • Canada is diversifying its defense industrial partnerships globally, particularly with European partners—a logical step and one to build on.

At the June 2025 NATO summit in The Hague, allies committed to spend 5 percent of their GDP on defense, with 3.5 percent focused on core defense and 1.5 percent on related defense expenditures. Canadian Prime Minister Mark Carney says his country is committed to reaching NATO’s new defense spending target of 5 percent of GDP by 2035—and his government is also on track to meet the previous 2 percent target for the first time by spending an additional C$8.7 billion ($6.58 billion) this fiscal year (which ends in March 2026). Canada has struggled to meet NATO goals in the past. In 2023, it failed to meet both of NATO’s defense spending targets of 2 percent of GDP on defense and 20 percent of that spending allocated for research, development, and equipment. 

Although there is now support for increased defense expenditure at the highest levels of government, Canada has underinvested in its defense industrial base for decades and will need renewed focus, resources, and support to meet the country’s Hague commitments. How will Canada’s defense industrial base adapt to meet the current moment? Carney has put forward the bold claim that “Canada is meeting this moment with determination and resolve—modernising our defence capabilities, strengthening our industrial base, and reaffirming our role as a reliable partner in global security.” But what must its defense industrial base do to match this commitment?

In late 2025, the Atlantic Council’s Transatlantic Security Initiative hosted a workshop with government officials, academic experts, and participants from the public and private sectors of Canada, the United States, and Europe. The insights gathered from these conversations helped inform this issue brief, which assesses challenges, recommendations, and opportunities for Canada’s defense industrial base in an era defined by multiple conflicts and increased coordination by adversaries.

Canada’s defense industry at a crossroads

Canada has an extensive list of military equipment it needs to either produce domestically or purchase internationally, such as new warships, submarines, coastal defense vessels, fighter aircraft, and surveillance aircraft. This new equipment is needed for both national defense and to modernize Canada’s military to meet the current threat environment. In addition to renewing its leadership of the multinational NATO forces in Latvia, Canada has needed to strengthen its military capabilities along its three seas: in the Atlantic, Pacific, and Arctic Oceans. This comes at a time when Canada is also juggling bilateral border security cooperation and engaging in a major renewal of North American Aerospace Defense Command (NORAD) in close cooperation with the United States.

Central to Canada’s defense industry is its reliance on the US market and US companies, which supply much of Canada’s defense needs. Carney has often noted that one challenge facing Canada’s defense industry is that approximately 75 cents of every dollar in capital spending on defense winds up going to firms based in the United States. The relative size of the Canadian defense industrial base and its ability to compete internationally for contracts remain concerns as new funding flows to industry at an unprecedented rate. 

For the first time, Canada’s military is poised to receive additional funding through the new federal budget and facing “the uncomfortable position of having so much cash it will be hard to keep up.” This represents a dramatic mindset shift for the military, which has had to cope with deficits of people, equipment, training, and sustainment. Now, with more funding allocated for defense, the hard work begins as Canada tries to use that funding effectively to address gaps in equipment, personnel shortages, and better training opportunities for its military. 

With this increased available funding, the question matters of Canada’s procurement process and how to adapt it to meet the current moment. Canada’s procurement process, sometimes described as “glacial,” has received more attention lately and has a new agency focused on eliminating waste and accelerating the process. At the same time, Canada should recognize the constraints it faces regarding the size and scope of its defense industry; it should instead focus on niche areas in which it can excel, such as the maritime or Arctic domains. Many hurdles remain for Canada to meet the current moment, including personnel shortages in both the Canadian Armed Forces and industry roles. The Canadian Armed Forces (CAF), in its army modernization report, outlines the challenges facing the CAF to modernize, with at least another fourteen thousand recruits needed to meet the current security environment.

Recommendations for the Department of National Defence

1. Create consistent and predictable defense contracts for industry

A frequent refrain from industry is that the lack of consistency and predictably about defense contracts makes it challenging to scale and expand. A stable defense industrial base can foster innovation and address evolving challenges facing Euro-Atlantic security. The Canadian defense industry contributes about $10 billion annually to the economy and supports an estimated eighty-one thousand jobs. By investing in its domestic defense industry, niche capabilities, and evergreen infrastructure in the near term, the Canadian government can not only meet its NATO commitments but also expand job growth and economic performance. The long-term timeline for this investment in Canada’s defense industrial base will be key—Carney leads a minority government and this inevitably leads to a degree of uncertainty about long-term government commitment. Canada’s defense industrial base will not be able to meet the current moment with a one-off surge in available funding; it requires consistent and predictable funding over a longer-term horizon.

To get a sense of the importance of consistent and predictable defense contracts, look no further than the Canadian Patrol Submarine Project (CPSP) modernization process. Canada has been in the market for a new submarine fleet that is deployable in the Arctic with extended range and endurance. Two qualified suppliers—a German company and a South Korean company—will work with the Canadian maritime and defense sectors to deliver new submarines by 2035. So far, there is no project budget for this initiative, leading to uncertainty from an industry perspective. The Justin Trudeau government frequently made promises about defense spending that failed to materialize. The Parliamentary Budget Office recently quantified past underspending: between 2017 and 2023, efforts to buy new equipment fell short by C$18.3 billion. Ammunition producers claim they need at least C$800 million to open new production lines. Ultimately, for industry to respond to government decisions regarding its defense and security needs, a level of consistency and predictability must be provided, which has been a challenge for Canada’s defense industrial base in the past.

2. Streamline and strengthen the procurement process 

If defense spending is now a given, the question then turns to how the Canadian Armed Forces will acquire the materiel they need. On October 2, Carney announced the formation of a new agency, the Defence Investment Agency (DIA), to facilitate and accelerate the defense procurement process. The procurement process had previously been fragmented across multiple departments, resulting in significant slowdowns in obtaining critical equipment. The DIA removes some of the red tape and redundancies with a centralized review and approval process. The agency has a specific aim to bolster Canada’s domestic defense industry, to empower Canadian companies to compete globally while also investing in dual-use capabilities. This will specifically address a frequent criticism that by the time equipment is delivered it is either out of date or unfit for the current mission. Additionally, the agency hopes to bridge the divide between industry and government by bolstering awareness on both sides of the timelines, costs, and expectations for equipment deliveries.

The formation of the DIA is the first step in an overdue streamlining and strengthening exercise for procurement. As the Canadian government seeks to foster innovation and create national champions in the defense space, it needs to continue bridging the divide between industry and government. Additional work can be done to ensure a role for Canada’s many small and medium-sized enterprises (SMEs) in its industrial base, which is critical to ensure agility and flexibility. The current conflict in Ukraine has demonstrated the significance of drones, but the next conflict might look very different and, in turn, might require industry to adapt to changing battlefield conditions. SMEs are better poised to adapt and pivot as technology evolves at a rapid pace and ensure Canada’s military is ready to respond to future conflicts. 

3. Balance “Buy Canadian” with buying the right equipment for the mission

Despite the improvements to the procurement process, the Canadian Armed Forces still needs to ensure they are buying the best possible equipment for the mission. As the CAF seeks more expeditionary and proactive capabilities, this modernization effort places a premium on not just buying domestically but buying the best possible equipment. The prime minister’s new goal of focusing investment on domestic manufacturers will naturally come into conflict with the army’s modernization efforts if Canada’s defense industrial base cannot produce equipment to meet its operational needs. In turn, this decision to “Buy Canadian” will impact Canada’s ability to export its materiel and potentially raise barriers to other markets. Canada exports about half of the defense materiel it produces, with 63 percent destined for the United States and a further 12 percent to the Middle East and Africa. Striking the right balance between investing in its domestic industrial base and strengthening ties to international markets will be key to the long-term sustainability of Canada’s defense industrial base.

4. Strengthen ties with Europe

The conversation around bolstering Canada’s defense industrial base mirrors those conversations taking place in Germany, France, and elsewhere across Europe. Indeed, a deepening of Canada-Europe relations has been on display in the last year in response to the growing complexity of international conflicts and crises. This includes a landmark security and defense partnership between the European Union (EU) and Canada, which was agreed to in June 2025. This defense pact paves the way for the two to cooperate on cyber, maritime, and space security, and also opens the door to joint weapon procurement. Additionally, Canada has been proposed as a potential participant in the EU’s Security Action for Europe (SAFE) program, offering low-interest loans to accelerate procurement and investment in defense capabilities.

Diversifying and increasing the number of strategic partnerships globally, instead of over-relying on a single provider for its defense materiel, is a logical step to strengthen Canada’s defense industrial base—and also spurs innovation and supply chain resilience. Beyond the EU, Canada has sought to strengthen opportunities to collaborate with its fellow Five Eyes members, particularly the United Kingdom and Australia. The newly formed Canadian DIA aims to facilitate conversations with its counterparts in France, the United Kingdom, and Australia. Due to the similarity of their intentions to spend more on defense, Canada will have natural partners in European nations, as well as the EU more broadly. 

5. Focus on doing a few things well rather than trying to do everything all at once

A consistent theme across the various challenges facing Canada’s defense industry—its size, speed, and reliance on the US market—can all be partially solved by specializing in a few niche areas rather than doing too much all at once. Three specific areas in which Canada has both urgent needs for development and the opportunity to specialize are: unmanned autonomous systems (aerial and underwater vehicles in particular); Arctic-specific technologies, including icebreakers; and maritime capabilities leveraging Canada’s three-ocean geography. The Arctic region emerges repeatedly as a unique domain in which Canada should invest more, for both its own national security purposes and for enhancing wider Alliance capabilities. Canada has the most icebreakers of any NATO ally and is working through the trilateral ICE Pact (with Finland and the United States) to build even more of these highly specialized vessels. Capitalizing on the dearth of icebreakers within NATO would give Canada a unique opportunity to leverage its Arctic capabilities to support its shipbuilding industry while enhancing Alliance capabilities in the Arctic.

Conclusion

Carney’s government is taking unprecedented steps to strengthen Canada’s armed forces, invest in the country’s industrial base, and reaffirm Canada’s role as a reliable partner within NATO and the wider global security context. While his government’s approach and announcements so far are laudable, Canada now must turn to the task of how to support and expand its defense industrial base to meet these goals. Without this foundation, Carney’s pledges will fail to translate into improved capabilities and will hinder attempts to modernize the CAF. Time is short, the amount of work ahead is significant, and history will remember how Canada meets the current moment and security environment. 

About the authors

Related content

Explore the program

The Transatlantic Security Initiative aims to reinforce the strong and resilient transatlantic relationship that is prepared to deter and defend, succeed in strategic competition, and harness emerging capabilities to address future threats and opportunities.

The post How to equip Canada’s defense industrial base to meet NATO’s Hague summit commitments appeared first on Atlantic Council.

]]>
First hundred days: How Kast can accelerate US investment in Chile https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/first-hundred-days-how-kast-can-accelerate-us-investment-in-chile/ Mon, 22 Dec 2025 21:12:03 +0000 https://www.atlanticcouncil.org/?p=895516 Chile's newly elected president enters office facing a slew of economic pressures: slow growth, weak investment, stagnant productivity, high inequality, limited social mobility, and regional gaps. What can his administration do to jumpstart foreign direct investment?

The post First hundred days: How Kast can accelerate US investment in Chile appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Chile elected José Antonio Kast president December 14, after a campaign centered on economic growth, security, and institutional stability.
  • Kast’s proposed security measures aim to restore the predictability of long-term investment needs.
  • To deepen economic ties with the US, in his first hundred days Kast could also expand workforce training and regional programs to ensure access to skilled talent across the country.

New president, new pressures

José Antonio Kast will head to La Moneda in March 2026. Chile’s president-elect won the second round of the election with 58.2 percent of the vote—winning by a margin of more than 16 percentage points. The day after the election, Kast met with outgoing President Gabriel Boric and emphasized afterward that he will advance a “government of national unity on priority issues: security, health, education, and housing.”

Kast will enter office with a slew of economic pressures in his inbox: slow growth, weak investment, stagnant productivity, high inequality, limited social mobility, and regional gaps. The labor market remains segmented, with low female participation and high informality. Along with these economic pressures, security and rising crime rates dominated the electoral campaign and addressing them will be central to Kast’s government plan.

In 2024, Chile’s economy showed signs of stable but uneven recovery, with moderate 2.6-percent gross domestic product (GDP) growth driven largely by mining, easing inflation, and falling poverty, while unemployment and informality remained elevated and investment growth lagged. Looking ahead to 2026, growth is expected to remain steady at 2.6 percent. Alongside a narrowing fiscal deficit and inflation stabilizing, this suggests a macroeconomic environment that is steady but still dependent on restoring investment momentum.

Chileans want to see changes and expect Kast to deliver some economic wins quickly. But the ability to do so goes hand in hand with addressing the increased rates of crime and violence. Kast’s campaign focused on the security of the country with proposals such as his Plan Implacable,  which aims to “restore state authority and curb organized crime” through tougher penalties, more federal control over prisons, and stronger security operations, while also reasserting state authority in areas where criminal networks have expanded. This plan might be among the things on which Chileans want Kast to take action first. However, Kast and his administration need to balance what they want and what they can actually get done, especially regarding migration and deportation.

A challenging congress

The first one hundred days of the Kast administration will test the executive’s ability to move legislation that supports faster growth, rebuilds investor confidence that has been weakened by security concerns and political fragmentation, and signals a clearer economic direction.

That said, Kast takes office with a congress that leans right but does not give him full control. Right and far-right parties aligned with Kast hold seventy-six of the 155 seats in the Chamber of Deputies, with his second-round opponent Jeannette Jara’s left and far-left coalition of Unidad por Chile controlling sixty-one. The swing party of Franco Parisi, Partido de la Gente, holds fourteen seats.

Kast will need a simple majority to pass most legislation. But constitutional amendments and reforms of the electoral system would require two-thirds of votes in the congress. Kast’s coalition cannot reach either threshold on its own, and must work with partners to move any major bill forward. This makes the Partido de la Gente especially important. Because no bloc controls a majority, its fourteen deputies are in position to decide whether a proposal advances or fails. Its votes can tilt negotiations, shape the final text of legislation, and determine how governable the next term becomes.

Passing legislation through the lower house will be easier, but major legislation such as Kast’s proposed mass deportations will need broader support. The evenly split senate will require him to work with the traditional right as well as swing actors to move legislation. As such, Kast will be faced with increased pressure to deliver short-term results on crime and economic growth, signaling early whether his administration can translate public demand for order and stability into a more predictable environment for investment, something US investors typically look for before committing capital in Chile.

How Chile’s investment environment has shifted

Since the mid-1980s, Chile has implemented significant reforms that opened its economy and encouraged foreign investment. These included changes in the financial and social markets, such as Law No. 20.848 of 2015 establishing the framework for foreign direct investment (FDI), as well as other tax and labor reforms. However, social unrest in 2019, the COVID-19 pandemic, two failed constitutional reform attempts, and rising crime have affected investor confidence.

The trade relationship between Chile and the United States is one of the deepest and most strategic for our country. Since the Free Trade Agreement came into effect in 2004—which allowed 100 percent of bilateral trade to be duty-free by 2015—trade between the two countries has more than doubled, and Chilean exports to the US have grown steadily. Today, the United States is our second-largest export destination and also the second-largest foreign investor in Chile, reflecting a mutual trust built over time.

The opportunities to deepen this partnership are enormous: sustainable energy, critical minerals, green hydrogen, water and digital infrastructure, and advanced technologies. Chile contributes stability, legal certainty, and strategic resources; the United States brings innovation and capital. Strengthening this cooperation is key to driving investment, productivity, and new opportunities for both countries.


—Susana Jiménez Schuster, president, Confederation of Production and Trade (CPC)

The foundation for investment in Chile lies in democracy, rule of law, and a predictable regulatory environment. The Organisation for Economic Co-operation and Development (OECD) has indicated that Chile’s growth might be reaching a ceiling, making continued reforms—such as streamlining permits, encouraging innovation, digitalizing paperwork, simplifying regulations, and removing bottlenecks—essential for reigniting momentum.

Chile has economic sectors with great potential that meet global demand for a wide range of goods and services, as well as developed markets and a stable institutional framework. Just as our country can offer attractive conditions to foreign investors, we can also provide knowledge and talent in those industries where we have developed a high level of know-how and expertise. Chile’s growth has been founded on strong collaboration, and free trade agreements with various economies around the world.


—Francisco Pérez Mackenna, board member, AmCham Chile

What makes Chile an attractive destination for US investors

Several conditions strengthen opportunities for US investment in Chile. Together they shape a more attractive environment for long-term investment is likely to be a priority for the incoming Kast government.

  • Chile is a key tech hub in Latin America. This is because of its stable economy, strong startup ecosystem, skilled workforce, advanced digital infrastructure, and government-backed innovation programs. Successful tech projects require a strong and solid workforce. According to CBRE’s Scoring Tech Talent 2025 report, Santiago has the third-highest tech talent pool in Latin America, with more than 143,000 professionals. This positions Chile as an attractive hub for companies to expand. That said, most initiatives are heavily concentrated in Santiago, emphasizing the need for additional training in both the northern and southern regions to ensure successful new project implementation.
  • US companies benefit from working with reliable local partners, in part because Chile has clear rules for contracts and strong institutions and because local firms usually have long experience navigating permitting, local procurement, cultural nuances, and sector-specific regulations. These conditions create an environment where these partnerships give foreign investors a dependable base of support on the ground.  
  • Investors trust Chile because its infrastructure is strong, and its politics stay steady. In 2024, Chile received $15.3 billion in FDI, one of the highest inflows in recent years. A big share of that comes from reinvesting earnings, which shows that companies already in Chile are confident enough to expand. The government agency InvestChile closed 2024 with a portfolio of $56.2 billion in foreign-backed projects, with US companies investing the largest share at $20.5 billion. Major investments target clean energy: green hydrogen, mining, and infrastructure. These numbers show that foreign investors, especially those from the United States, believe in Chile’s long-term stability and the clarity of its rules. They see a country where projects can start quickly and scale up, thanks to predictable regulations and reliable systems. That confidence in both infrastructure and political stability strengthens the case for more investment.

The U.S. International Development Finance Corporation (DFC)’s mandate prioritizes investments in markets that offer predictability, stability, and clear rules, conditions that have historically made countries like Chile attractive for engagement. The DFC, a US federal agency, was created under the 2018 Better Utilization of Investments Leading to Development (BUILD) Act, which merged the Overseas Private Investment Corporation (OPIC) with USAID’s Development Credit Authority. Its core purpose is to mobilize private capital to advance US development and foreign policy objectives by leveraging financial tools such as loans, equity investments, guarantees, and political risk insurance to support private-sector-led solutions in markets where commercial finance is limited or unavailable.

In December 2025, Congress reauthorized and modernized the DFC through the FY 2026 National Defense Authorization Act (NDAA), extending its authorization through 2031, and significantly expanding its scope and authorities. Under this reauthorization, the DFC’s investment cap (Maximum Contingent Liability) was raised to $205 billion, and the agency gained new tools, including a $5 billion equity revolving fund and increased equity investment authority. The legislation also broadened DFC’s ability to invest in more countries and sectors while placing limits on financing in the wealthiest countries, ensuring that no more than 10 percent of its portfolio may support high-income markets, with specified sector exceptions such as energy, critical minerals, and information and communications technology.

While Chile’s high-income status means that large-scale DFC engagement is still limited compared with developing markets, the agency can support selected projects in strategic areas, including clean energy, critical minerals, infrastructure, and technology, particularly where there is a clear economic or strategic rationale and consistent with the statutory constraints on participation in wealthy countries.

Addressing bottlenecks to further FDI in Chile

Following the presidential election, Chile enters a new political phase with renewed attention on how the next administration will translate campaign promises into policy. Chile continues to take steps to strengthen its investment environment, while facing persistent bottlenecks that shape foreign investor confidence and will influence the country’s economic direction in the months ahead.

  • Regulatory delays are a major concern and become impediments. Permitting and environmental review processes can take several years. However, the Framework Law on Sectoral Authorizations (Law 21.770)—better known as the Ley de Permisología, which creates the Framework Law on Sectoral Authorizations (LMAS)—was enacted and posted in September 2025. The goal is to update and speed up the permit process to encourage investment. The law creates a single digital portal called SUPER to manage permits simultaneously, introduces simplified procedures for low-risk projects, and establishes administrative silence. Streamlining and updating procedures are expected to drop processing times between 30 percent and 70 percent without lowering regulatory standards. This will also be a step forward for attracting foreign investment.
  • Policy uncertainty remains a concern for long-term investors. Over the past decade, shifts between governments of the right and left have created questions about the direction of future regulations. Relations between Santiago and Washington are expected to further deepen under a new administration. Kast will need to show that he can meet public expectations for stronger growth and higher investment. Here, it’s critical to balance the demands of [JF1] parties across the political spectrum as this congressional balancing act is what’s needed to advance legislation reassuring to investors. Although Chile has struggled lately to attract FDI, the United States remains its second-largest source, with a strong presence in energy, data centers, and mining.
  • The economy also plays a major role in the current political moment. Chile has experienced slow growth for several years and unemployment sits at about 9 percent. Investment remains stagnant, with inflation and high living costs shaping daily choices for many Chileans. Voters widely see the current government as falling short in addressing these issues. The national budget was also a central topic of conversation during the election. The legislative commission in charge of reviewing the annual budget recently rejected the proposal for 2026; Kast will now likely express his approach to next year’s spending plan in the short term. That said, his proposal of gradual elimination of property taxes on primary residences, starting with those on homeowners over sixty-five, would reduce government revenue, meaning the 2026 budget will need to account for this shortfall. The administration will need to balance funding public services and implementing the policy in a fiscally responsible way.
  • Security is another major risk. While Chile remains relatively safe in comparison to select other countries, crime has risen in recent years—including organized crime, drug trafficking, and violence in northern regions and Santiago. Researchers estimate crime costs the country nearly $8 billion annually, discouraging some foreign investment. Kast made public safety a core part of his platform through the previous mentioned Plan Implacable, which includes tougher penalties for organized crime, high-security prisons, expanded self-defense laws, protections for law enforcement and judicial actors, and targeted border security measures with his Plan Escudo Fronterizo.

American investment has been central to the growth of Chile’s strategic industries, while Chile’s stability, talent, and infrastructure have enabled US companies to scale across Latin America. Significant opportunities remain. Chile is the world’s largest copper producer and holds 25 percent of global lithium output, with growing mineral-processing capacity and emerging resources such as rare earths and cobalt. The country is also becoming a regional digital hub, supported by projects like Google’s Humboldt Cable and expanding data-center infrastructure. Upcoming port concessions and the need for energy storage solutions in a rapidly growing clean-energy system offer additional avenues for deeper US investment.


—Beatriz Herrera, investment commissioner for North America, Embassy of Chile

Sectors in Chile with investment potential

  • Information technology (IT): Chile’s IT sector is expanding rapidly, driven by high internet penetration, widespread mobile connectivity, and growing demand for digital services. Key emerging sectors include fifth-generation (5G) deployment, big-data analytics, and artificial intelligence (AI) integration, supported by initiatives such as Chile Digital 2035 and the National AI Policy. To accelerate growth, Chile can build on existing programs by expanding Chile Digital 2035 and Digital Talent for Chile, increasing investment in digital infrastructure, scaling training and education initiatives, and deepening public-private partnerships to ensure broader access to advanced IT solutions, close the skills gap, and achieve full digitalization of public services.
  • Critical minerals (copper and lithium): As the world’s largest copper producer, supplying 24 percent of global output, and home to 41 percent of lithium reserves, Chile is a strategic source of materials essential for clean technologies. These include electric vehicles, energy storage, and digital infrastructure. With public policies promoting sustainability and high environmental standards, Chile is positioning itself to attract investment that advances technological innovation, supports the global energy transition, and fosters inclusive economic growth. China currently dominates global demand for Chilean copper and lithium, but Kast could attract more Western-aligned investment by promoting legal certainty, officering incentives, and fostering partnerships with companies that meet high environmental and governmental standards.
  • Water management and drought mitigation: Chile is increasingly leveraging public-private partnerships to improve water management and climate resilience. Investments focus on both traditional infrastructure, such as dams, and natural solutions including reforestation and wetland restoration. There is demand for technologies that enhance water efficiency, like advanced treatment and recycling systems, data-driven water management tools, and construction waste reduction. Sustainable agricultural practices that conserve water and lower input costs also present promising opportunities. Water management could become a strategic priority for Kast, with the advancement of such projects allowing the administration to deliver visible results, balance regional needs, and contribute to Chile’s robust agriculture sector.
  • Seismic-resilient infrastructure: Situated on one of the most active fault lines in the world, Chile experiences frequent earthquakes, including several above magnitudes of eight. Critical infrastructure—such as ports, airports, and energy facilities—requires modern seismic design. There is strong demand for engineering and technology services in risk modeling, resilience planning, and early warning systems. Opportunities include digital twins, smart sensors, and integrated solutions to strengthen utilities, transportation networks, and urban development.

How can the new Kast administration help unlock Chile’s economic potential and attract investment?

  • Visit Washington before the March 11 inauguration. This would reinforce Chile’s shared interests in economic security and investment cooperation, present project pipelines aligned with DFC priorities and clarify Chile’s commitments in areas such as energy transition and trade. Early engagement would allow Chile to secure a proactive position in shaping US investment decisions, demonstrate commitment to close cooperation with the United States, and build political support in the US Congress and executive branch for stronger bilateral financing ties. When in Washington, use the visit to generate broader public interest in the importance of Chile as a strong US partner.
  • Identify emerging skills and priority growth sectors in Chile and encourage private-sector programs that link education directly to industry needs. Kast can do this by providing tax incentives and speeding up the processing of paperwork for companies involved in workforce training. Scholarships, vocational training, apprenticeships, and partnerships with universities that teach technical skills can help equip students and current workers with the skills required for mining, technology, energy, and other strategic industries.
  • Maintain continuity in key policies on permitting reforms. This applies to policies such as the Ley de Permisología, which aims to streamline and coordinate environmental and sectoral permitting across government agencies, and they should be expanded to ensure that the ministries and offices involved are actively collaborating with each other. If government entities are not coordinating—for example, in the processing of environment permits—the procedures for key sectors such as mining and technology will continue to be delayed. Demonstrating consistency will reinforce Chile’s reputation as a stable investment destination and encourage both new and reinvested capital.
  • Avoid over-centralizing these initiatives in Santiago. This can be done by collaborating with regional partners or established private-sector actors to develop and train local workforces. This could include local recruitment, training programs at regional universities, and ongoing partnerships between the government and private sector.

These measures strengthen security in ways that matter for investors by creating clearer rules, steadier institutions, and stronger local trust. When the government improves workforce training and expands formal job opportunities, it reduces pressures that fuel crime in regions tied to mining and energy. Better coordination on permits lowers chances of corruption or operational disruptions because companies face fewer conflicting decisions from different agencies. Together, these steps create a safer and more predictable environment for investors. 

Conclusion

Chile remains a trusted and stable partner for the United States. Its democratic values, institutional strength, and openness to trade make it a strategic destination for US investment. But sustaining and expanding this partnership will require continued economic reforms and political engagement between both countries to ease processes for doing business, improve regulatory efficiency, enhance human capital, and foster political stability toward a robust, long-term strategic partnership. As Kast prepares to take office, he has an opportunity to set a foundation to ignite Chile’s economic growth and attract investment. And with the Western Hemisphere as a top priority for Washington, Chile has the potential to be an even more strategic partner to the United States.


The views expressed in this publication are those of the authors alone. Some of the investment opportunities discussed in this issue brief were informed by an October roundtable discussion on US-Chile investment relations, which included the participation of US and Chilean private-sector leaders, public-sector representatives, and multilateral organizations. The roundtable was organized in partnership with AmCham Chile and with the support of MetLife. Neither were involved in the production of this issue brief.

About the authors

Maite Gonzalez Latorre is program assistant at the Adrienne Arsht Latin America Center of the Atlantic Council.

Jason Marczak is vice president and senior director of the Adrienne Arsht Latin America Center of the Atlantic Council

Explore the program

The Adrienne Arsht Latin America Center broadens understanding of regional transformations and delivers constructive, results-oriented solutions to inform how the public and private sectors can advance hemispheric prosperity.

The post First hundred days: How Kast can accelerate US investment in Chile appeared first on Atlantic Council.

]]>
Is extending the New START limits in the US national security interest? https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/is-extending-the-new-start-limits-in-the-us-national-security-interest/ Mon, 22 Dec 2025 20:41:09 +0000 https://www.atlanticcouncil.org/?p=895163 This issue brief will ask and answer the question of whether extending the New START limits is in the US national security interest.

The post Is extending the New START limits in the US national security interest? appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Before the last remaining quantitative limit on US and Russian nuclear forces expires in February 2026, the United States must decide how to respond to Moscow’s proposal to extend the limits by one year.
  • Russia has violated at least nine arms control agreements since Putin assumed the presidency, and the global environment has changed dramatically since New START was negotiated in 2009.
  • Agreeing to extend New START does not make sense when the United States now faces the likelihood of two nuclear peers—especially when Washington can’t verify whether Moscow is abiding by the limits.

Table of contents

Introduction

The Treaty between the United States of America and the Russian Federation on Measures for the Further Reduction and Limitation of Strategic Offensive Arms (also known as the New START treaty) expires on February 5, 2026. In September, Russian President Vladimir Putin proposed that Russia and the United States agree to continue complying with the “central quantitative limits” of the treaty for one additional year.1 He added, “We believe this measure will only be viable if the United States acts in a similar manner and does not take steps that undermine or disrupt the existing balance of deterrence potentials.”2

The United States must therefore decide whether to accept Putin’s proposal, reject it, or insist modifications be made. Given that New START is the last agreed-upon quantitative limit on the strategic nuclear forces of Russia and the United States, this is a consequential decision. Yet the choice is ultimately downstream of a more fundamental question: In order to assess the appropriate path forward, the United States must determine its strategy for managing the two-nuclear-peer threat environment that China’s rapid, unexplained nuclear buildup will create. Only then can Washington identify what nuclear forces will be required to implement that strategy with high confidence—an essential prerequisite for assessing whether an extension of New START aligns with US interests.

This issue brief will ask and answer the question of whether extending the New START limits is in the US national security interest. It will do so by analyzing the history of the New START treaty (including the circumstances under which it was negotiated); the nature of the two-peer nuclear problem and the strategic challenges it poses; the history of Russian arms control compliance; and the potential benefits and risks of accepting Putin’s proposal for a one-year extension of the New START central limits. The issue brief concludes with a recommendation for US action going forward.

US President Barack Obama and Russian President Vladimir Putin meet over breakfast in Moscow in July 2009. (White House photo by Pete Souza)

The history of New START

When the Obama administration took office in January 2009, it faced an immediate nuclear arms control challenge. Two strategic nuclear arms control treaties were in effect: the Strategic Arms Reduction Treaty (START I) and the Strategic Offensive Reductions Treaty (SORT). The dilemma was that, while SORT reduced both sides’ operationally deployed strategic nuclear warheads to between 2,200 and 1,700 (far below START I’s limit of six thousand warheads), it contained no verification provisions. START I, which had significant verification provisions, was scheduled to expire in December 2009. The incoming administration rapidly sought to negotiate a follow-on agreement to SORT that would further reduce strategic nuclear forces and secure significant verification provisions before the expiration of START I. That new agreement would be dubbed New START.

At the time that the New START treaty was negotiated and signed, the United States did not view Russia as an adversary, and the prospect of large-scale war in Europe was deemed negligible. The 2010 Nuclear Posture Review (NPR) declared that “the most immediate and extreme threat today is nuclear terrorism,” a sentiment that reflected a strategic environment in which neither Russia nor China was assessed as a major or imminent strategic threat.3 Regarding the nuclear threat posed by Russia, the 2010 NPR stated, “While policy differences continue to arise between the two countries and Russia continues to modernize its still-formidable nuclear forces, Russia and the United States are no longer adversaries, and prospects for military confrontation have declined dramatically.”4 Similarly, at the time of New START negotiations, the nuclear threat posed by China was appropriately treated in US strategy as a “lesser included case” of the Russian nuclear threat, meaning that a force sufficient to implement US nuclear strategy vis-à-vis Russia with high confidence was sufficient to address the significantly smaller nuclear threat posed by China. That strategic assumption, however, no longer holds. 

The Obama administration’s perception of the threat environment—combined with the substantial conventional military superiority then held by the United States and its allies over any potential adversary—shaped its decision to further reduce and deemphasize the role of nuclear weapons in US national security strategy. This approach was, in part, motivated by the hope that other nuclear-armed states would follow the US lead. In this context, the United States was comfortable agreeing to the New START strategic nuclear force limits with Russia without securing parallel limits on theater nuclear forces aside from those already imposed by the Intermediate-Range Nuclear Forces Treaty (INF Treaty), which banned land-based intermediate-range ballistic and cruise missiles. After the ratification of New START, Russia rejected subsequent US efforts to negotiate further nuclear force reductions—including proposals to address Russia’s roughly ten-to-one advantage in theater nuclear forces.

A second consideration is central when assessing whether to accept Putin’s proposal: Russia’s circumvention of the New START central limits through the development of strategic nuclear weapons systems not covered by the treaty. Although developing and fielding these Russian systems are not violations of the New START treaty, they nonetheless circumvent its central limits and, more importantly, undermine its intended purpose. If the treaty’s limits were extended without addressing these new systems, they would pose an unconstrained threat to the United States.

The Russian Federation is developing two new strategic nuclear weapon systems that clearly circumvent New START: the Burevestnik intercontinental-range, nuclear-armed ground-launched cruise missile, and the Poseidon intercontinental-range, nuclear-armed torpedo (and the unique submarines from which it can be launched). The United States is within the range of both of these systems—and neither is covered by the treaty’s current provisions.

Article 5, Paragraph 2 of the treaty gives each party the right to “raise the question” of whether a “new type” of strategic offensive arm developed by the other should be subject to the treaty’s limits. The United States raised this question regarding these systems, and Russia (as is its right under the treaty) refused to discuss including them under the New START limits.

A Kinzhal ballistic missile on a MiG-31K at the Moscow Victory Day Parade in 2018. The Kinzhal can carry a nuclear warhead. (Kremlin)

Two other Russian systems raise significant questions about the impact and advisability of agreeing to Putin’s proposal to extend the New START limits for a year.

The first is the bomber-launched Kinzhal, a nuclear-capable air-launched ballistic missile. The treaty limits “heavy bombers” capable of launching “long-range nuclear air-launched cruise missiles” with a range over 600 kilometers. When air launched, the Kinzhal has a range much greater than 600 kilometers. Russia has demonstrated this capability by employing the conventionally armed variant from the Tu-22M3 bomber in the war in Ukraine. While the Tu-22M3 does not meet the 8,000-kilometer range criterion to be a “heavy bomber” under New START, it would be limited by New START if it were capable of launching a nuclear-armed cruise missile with a range of more than 600 kilometers. Because the Kinzhal is a nuclear-capable ballistic missile, not a cruise missile, it does not make the Tu-22M3 subject to the New START central limits. This raises a salient question: Should it be? The system effectively circumvents the treaty’s constraints.

The second Russian system is the nuclear-capable RS-26 Rubezh intercontinental ballistic missile (ICBM) and the related Oreshnik intermediate-range ballistic missile (IRBM). In 2012, the RS-26 Rubezh was flight tested to a range of more than 5,500 kilometers, making it a New START treaty-limited ICBM if deployed.5 It was subsequently tested at least three times at ranges well below 5,500 kilometers, raising the question of whether the missile’s true military purpose was as an intermediate-range system banned by the INF Treaty.6 However, after the United States withdrew from the INF Treaty due to Russia’s material breach of that agreement, Russia claimed that it had developed a new IRBM, the Oreshnik. Russian subsequently used it in combat in Ukraine (meaning that it might now be deployed). Russia claims this Oreshnik is not the RS-26 ICBM. But in a November 2024 briefing, Defense Department Deputy Press Secretary Sabrina Singh confirmed “that Russia did launch an experimental intermediate-range ballistic missile.” Singh added, “This IRBM was based on Russia’s RS-26 Rubezh intercontinental ballistic missile model.”7 The relevant question regarding New START limits extension is whether any deployed Oreshnik missiles should be counted as deployed ICBMs under the New START central limits. The answer depends on how similar the Oreshnik is to the RS-26 Rubezh, a determination that the US intelligence community must make. At a minimum, the RS-26 and the Oreshnik should serve as a cautionary tale for US decision-makers regarding Russia’s demonstrated willingness to circumvent arms control limits. 

What does the history of the New START treaty tell us regarding the advisability of agreeing to Putin’s proposal to extend the treaty’s central limits for another year? The bottom line is that New START was negotiated in—and for—a very different threat environment than the one the United States faces today and will likely face in the near future. Given what the United States knew then about the threats it was likely to face, the New START limits made sense. They provided a US nuclear force sufficient to support the US nuclear and national defense strategies with high confidence. But the nuclear threat environment has changed dramatically since 2010.

The nature of the two-peer nuclear strategy challenge

The report of the Congressional Commission on the Strategic Posture of the United States opens its executive summary as follows.

“The United States faces a strategic challenge requiring urgent action. Given current threat trajectories, our nation will soon encounter a fundamentally different global setting than it has ever experienced: we will face a world where two nations possess nuclear arsenals on par with our own. In addition, the risk of conflict with these two nuclear peers is increasing. It is an existential challenge for which the United States is ill-prepared, unless its leaders make decisions now to adjust the U.S. strategic posture.”8

When New START was negotiated, there was no perceived prospect of the United States facing two peer nuclear adversaries. But that threat now is expected to become reality within a decade. The Defense Department’s 2022 China military power report to Congress concluded, “If China continues the pace of its nuclear expansion, it will likely field a stockpile of about 1,500 warheads by its 2035 timeline.”9 Analysts have not yet determined whether China intends to curtail its nuclear buildup once it reaches rough strategic parity or to continue it in pursuit of a usable strategic advantage, but both possibilities are realistic. 

This emerging two-nuclear-peer environment raises two fundamental questions that US national security decision-makers must address in the near term. First, what nuclear strategy will the United States adopt to manage this unprecedented challenge? Second, what nuclear forces will be required to credibly execute that strategy?

An unarmed Minuteman III Intercontinental Ballistic Missile during an operational test November 5, 2025, at Vandenberg Space Force Base, California. (US Space Force photo by Tech. Sgt. Draeke Layman)

Because extending the New START limits could impede the United States’ ability to implement its strategy to address this impending threat, answering these two questions is a prerequisite for making a responsible decision on such an extension.

What nuclear strategy will the United States adopt in the future, and what forces will be necessary to implement that strategy with high confidence? The answer is still uncertain; the US government has not announced which strategic path it will choose. However, there has been a notable continuity in US nuclear strategy since the Cuban Missile Crisis. For decades, US nuclear strategy has primarily focused on three core objectives, or “ends,” including

  • deter war and nuclear escalation in war;
  • assure allies regarding US extended nuclear deterrence commitments; and
  • achieve US objectives if nuclear deterrence fails.

As noted earlier, when New START was signed, it was possible to achieve these objectives against both Russia and China simultaneously with a force compliant with the New START central limits. Due to the increase in China’s nuclear forces, this will no longer be the case. If the US strategy for addressing two nuclear peers calls for achieving these same objectives against two peer adversaries simultaneously, US strategic nuclear forces will eventually need to grow significantly beyond the New START central limits. To avoid this required force growth, the United States would need to make a significant change in long-standing US deterrence and targeting strategies that have arguably prevented not just nuclear war, but also large-scale conventional conflict between nuclear-armed adversaries. Correlation does not necessarily indicate causation, but the least that can be said for these legacy strategies is that they have not failed in more than six decades. Is it likely that the United States will profoundly change a strategy with this track record to avoid needing to grow US nuclear forces in a relatively modest way?

If one accepts the need to increase US nuclear forces beyond the New START limits to address the two-nuclear-peer threat, the next question is when this increase must be implemented. The precise timing of the required force growth is a complex question that can be answered only with access to classified information about the threat’s growth, related targeting requirements, and US capacity to expand its forces over time. What is clear, however, is that it will take time for the United States to increase its strategic forces enough to address the two-nuclear-peer threat. Given the state of the extant US nuclear force, the nuclear modernization program, and the industrial base that supports both, the decisions needed to increase the force must be made in the near term.

The history of Russian Federation arms control violations

Russia’s track record of violating both legally binding and unilaterally declared arms control obligations is directly relevant to the advisability of accepting Putin’s proposal. Since Putin’s rise to the Russian presidency, the United States has formally found Russia in violation of nine separate arms control agreements or commitments.10 In no particular order, they are 

  • the INF treaty;
  • the Chemical Weapons Convention (CWC);
  • the Biological Weapons Convention (BWC);
  • the Conventional Forces in Europe (CFE) treaty;
  • the Open Skies Treaty;
  • the Vienna Document;
  • Russia’s Presidential Nuclear Initiative;
  • Russia’s nuclear testing moratorium (and the unratified Comprehensive Test Ban Treaty); and
  • the New START treaty itself.

Russia seems to be on the verge of violating the Outer Space Treaty—if it has not already—by deploying a nuclear weapon in low-Earth orbit.

Under Putin, Russia’s track record across all these agreements and commitments is astoundingly poor. But, as the issue at hand is the proposed extension of the New START central limits, Russian violation of the New START treaty itself should be the first consideration.

Following Russia’s invasion of Ukraine, Putin suspended Russia’s compliance with the data notification and onsite inspection provisions of New START. This action is unambiguously a treaty violation. Russia’s suspension of compliance with these provisions directly undermines the United States’ ability to determine whether Russia remains in compliance with the central numerical limits that Moscow now proposes to extend. Notably, the Russian extension proposal does not include reactivation of the treaty’s data notification and onsite inspection provisions.

Obama administration officials discuss the New START Treaty at the White House, November 18, 2010. (White House photo by Pete Souza)

During Senate deliberations on ratification of New START, proponents of the treaty emphasized the importance of those provisions and the consequences for the United States if Washington lost access to them. Rose Gottemoeller, then the assistant secretary of state for arms control, verification, and compliance and Washington’s chief New START negotiator, said in remarks at the US Institute for Peace on July 26, 2010:

“The New START Treaty contains the mechanisms that will enable us to monitor and inspect Russia’s strategic nuclear forces. Our knowledge of Russian nuclear forces would substantially erode over time without ratification of the Treaty, increasing the risks of misunderstandings, mistrust, and worst-case analysis and policymaking.”11

Similarly, in an online issue brief, the Arms Control Association noted regarding the New START verification provisions: “Absent the new treaty’s extensive verification provisions . . . the United States will steadily lose clarity on the current status of the most lethal potential threat it faces: Russia’s strategic nuclear arsenal.”12

Assuming these New START advocates were right, the United States has been suffering these consequences since 2022.

Benefits and risks of accepting the Russian proposal

An assessment of the Russian proposal to extend the New START central limits for one year must weigh both the potential benefits and the significant strategic risks.

On the benefit side, an extension could forestall a near-term Russian upload of strategic nuclear delivery vehicles above 1,550 accountable warheads, if the Russians complied with their treaty commitments. This would prevent the Russians from increasing the number of New START accountable weapons with which they could target the United States.

Additionally, some US allies might be reassured that the last remaining quantitative limit on US and Russian nuclear forces would remain in place for another year. For those allies concerned about eroding arms control structures, even a temporary extension could serve as a political signal that Washington and Moscow are not allowing the last vestige of existing arms control to collapse unchallenged.

Delaying the start of any US upload or expansion of US strategic nuclear forces for another year could save resources in the near term and might avoid incentivizing China to accelerate its already significant nuclear buildup.

Finally, both Washington and Moscow could arrive at the spring 2026 Nuclear Nonproliferation Treaty (NPT) Review Conference and claim to have preserved the New START central limits for another year. This might allow them to demonstrate a degree of commitment to the NPT’s Article VI and potentially blunt criticism from non-nuclear states.

However, there are risks to accepting Putin’s proposal—and those risks are substantial. If the United States maintains continuity in its nuclear strategy in a two-nuclear-peer environment, accepting a one-year extension of the New START central limits would delay the necessary increase in US strategic nuclear forces that the strategy will require. Such a delay will make future force-sizing adjustments more difficult to implement at scale.

Furthermore, an extension of the treaty’s central limits alone—without restoring the treaty’s verification protocol—would reward Russia for its violation of the treaty. It might also signal that the United States has diminished concerns about strict compliance, which implicitly incentivizes future Russian cheating.

Moreover, unless the central limits extension is modified to cover Russian strategic nuclear systems not currently covered by New START—such as Burevestnik, Poseidon, Kinzhal, and possibly Oreshnik—the proposal would allow Russia to continue expanding its strategic nuclear force. This possibility is especially troublesome, as the United States would remain constrained from doing so by New START limits. A one-year extension could also create a political dynamic in which recurring renewals become expected, narrowing future US options and complicating any eventual decision to cease extending the limits.

More broadly, an extension of the central limits would favor the Russian Federation, as it enables Moscow to focus its resources on the war in Ukraine and continuing its strategic programs that circumvent those limits, while the United States remains constrained. These US disadvantages would all come while China continues racing to numerical parity or beyond. Without a reinstatement of the treaty’s full complement of verification provisions, the US ability to verify continued Russian compliance will be constrained, and US insight into Russian behavior would degrade. These factors all increase the risk of further violations. The historical record under the Putin regime demonstrates that if Russia believes it can cheat without being detected (e.g., its violations of the CWC, BWC, INF, and the nuclear testing moratorium), it will.

US President Donald Trump greets General Secretary of the Chinese Communist Party Xi Jinping before a bilateral meeting at the Gimhae International Airport terminal in Busan, South Korea, October 30, 2025. (White House photo by Daniel Torok)

Extending the New START central limits would send a troubling message to China regarding US capability and will to respond to Beijing’s large-scale nuclear buildup. This signal would likely undermine the prospects for bringing China to the arms control negotiating table, indicating to China that US forces will remain limited regardless of what China does. Key US allies will be profoundly unassured by the apparent US willingness to ignore Russia’s New START violation and circumvention, as well as China’s large-scale buildup. This risks strengthening the calls for nuclear proliferation in South Korea and Japan.

Finally, repeated annual extensions of the central limits will result in the number of effective prompt counterforce-capable missiles in the US strategic force dropping over the course of the planned modernization program. For example, while constrained by New START limits, the number of submarine-launched ballistic missiles (SLBMs) in the US strategic force will be reduced by four with the deployment of each new Columbia-class ballistic missile submarine (SSBN).13 Relief from the New START limits would allow the United States to increase the number of survivable SLBMs through 2035 despite the introduction of the Columbia class.14 Repeated extensions would also limit the expansion of the US strategic bomber force. Without those limits, the United States could unconvert thirty B-52 bombers, increasing the size of the force available to carry the new Long Range Stand Off (LRSO) cruise missile in the early 2030s. Such extensions would have the same effect on the US ability to upload the ICBM force to alleviate increasing target coverage issues in the two-peer environment. The New START central limits would prevent the United States from roughly doubling the number of warheads deployed on the ICBM force, something it could do if not constrained by the treaty. 

A path forward

After reviewing the pros and cons above, it is clearly in the US national interest to reject Putin’s proposal to extend New START limits. Instead, once New START expires, the United States should promptly begin implementing a measured expansion of its strategic nuclear forces to address the growing threat from Russia and China, while developing a new approach to US nuclear arms control policy that fully reflects the dramatic worsening of the international security environment since New START went into force.

The increase in US strategic nuclear forces should have near- and medium-term components. In the near term, the United States should unconvert SLBM launchers on Ohio-class SSBNs, increase the SLBM force, and prepare additional SLBM warheads for deployment. The United States should also begin uploading Minuteman III ICBMs. In the medium term, the United States should convert B-52 bombers and increase the planned number of next-generation air-launched cruise missiles it intends to field. It should also consider commensurate increases in future acquisitions of the SSBN force and planned number of future stealth bombers. These deployed force increases need to be accompanied by an increase in the production capacity of the US nuclear weapons complex and defense industrial base.

An appropriate new US arms control approach would require an agreement or agreements with both Russia and China. The United States should not agree to limit its nuclear forces with Russia alone in the context of China’s rapid and large-scale nuclear buildup. Rather, the US should put forward a new proposal for a trilateral agreement that enhances deterrence while managing the scope and scale of competition, placing the burden of rejecting a credible US proposal squarely on Moscow and Beijing.

The strategic force increase outlined above would not only enable the continuation of long-standing US nuclear strategy in the two-nuclear-peer environment but also generate meaningful negotiating leverage for the arms control strategy described above. The current US modernization program provides no such leverage. It is simply a rough replacement of the US New START force structure with more modern equipment. Unless the United States credibly demonstrates that it will create new dilemmas for—and additional strategic pressure on— Russian and Chinese strategy if those countries do not come to the negotiating table, neither will have an incentive to do so.

There is, of course, a less attractive alternative. It is possible that, despite the case made above, the president decides that a one-year extension is politically advantageous and does not pose insurmountable barriers to US force expansion downstream.

Should the president want to say yes, any acceptance should be conditioned—publicly and explicitly—on substantial safeguards, including two non-negotiable conditions and a publicly announced caveat.

First, Russia should agree to reinstate the full panoply of New START verification provisions as of February 6, 2026. Second, Russia should agree that the Burevestnik ground-launched cruise missile, the Poseidon intercontinental range torpedo (and its submarine launcher), and the Tu-23M3 bombers capable of launching the Kinzhal air-launched ballistic missile are, in fact, accountable under the New START central limits once deployed, and subject to data notification and onsite inspections. Moscow should also agree to discuss the applicability of New START limits to the Oreshnik IRBM.

The public caveat should be equally clear: during the one-year extension, the United States will prepare to increase its strategic nuclear forces to address the threat posed by China’s nuclear buildup. If China and Russia do not engage the United States in meaningful arms control negotiations during that period, the United States will not agree to any further extension of the New START limits.

Anything short of these conditions should be rejected.

President Donald Trump welcomes Russian President Vladimir Putin to Anchorage, Alaska, August 15, 2025 (DOD photo by Benjamin Applebaum)

Conclusion

The United States should not agree to extend the New START central limits for one year. Doing so rewards Russia’s violation of the treaty, constrains needed US strategic nuclear force modifications, and indicates to China that it can proceed with its large-scale nuclear buildup and its rejection of serious arms control discussions without consequence. New START extension would also, perhaps somewhat counterintuitively to some, significantly reduce the likelihood that the United States can negotiate an arms control agreement in the future that enhances US and allied security while constraining strategic competition.

It is time for the United States to make a definitive decision regarding its future nuclear strategy for the impending two-nuclear-peer threat environment and the forces required to implement that strategy with high confidence. Extending the New START limits for a year will only delay a decision that should have been made already.

About the author

Greg Weaver is the principal of Strategy to Plans LLC. Previously, he served as deputy director for strategic stability in the Joint Chiefs of Staff Directorate for Strategic Plans and Policy (J5), where he was the principal policy and strategy adviser to the chairman of the Joint Chiefs of Staff on nuclear, space, cyber, missile defense, and arms control issues. Prior to joining the Joint Staff, Weaver was principal director for nuclear and missile defense policy in the Office of the Under Secretary of Defense for Policy, and the deputy director for policy and plans at US Strategic Command. (Strategy to Plans LLC has a contractual relationship with Lawrence Livermore National Laboratory and Los Alamos National Laboratory, which design and manufacture nuclear warheads.) 

Acknowledgements

The Scowcroft Center for Strategy and Security’s work on nuclear and strategic forces has been made possible by support from its partners, including Los Alamos National Laboratory, Northrop Grumman Corporation (the prime contractor on the B-21 Raider bomber), the Norwegian Ministry of Defense, the Swedish Ministry for Foreign Affairs, the US Department of Defense, the US Department of Energy, and the US Department of State, as well as general support to the Scowcroft Center. The partners are not responsible for the content of this report, and the Scowcroft Center maintains a strict intellectual independence policy.

Explore the programs

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

1    The treaty limits each nation’s strategic nuclear forces to seven hundred deployed strategic delivery vehicles, eight hundred deployed and non-deployed strategic nuclear delivery vehicles, and fifteen hundred deployed strategic nuclear warheads. For the purposes of the treaty limits, deployed heavy bombers count as one deployed strategic nuclear warhead each, regardless of their actual weapons carriage capacity. “Putin Offers to Extend Last Nuclear Arms Pact with US,” Radio Free Europe/Radio Liberty, September, 22, 2025, https://www.rferl.org/a/russia-nuclear-us-new-start-treaty/33537093.html.
2    “Putin Offers to Extend Last Nuclear Arms Pact with US.”
3    “Nuclear Posture Review Report,” US Department of Defense, April 2010, 3, https://csps.aerospace.org/sites/default/files/2021-08/Nuke%20Posture%20Review%20Apr10.pdf.
4    Ibid., IV. 
5    “RS-26 Rubezh,” Missile Threat, Center for Strategic and International Studies Missile Defense Project, last updated April 23, 2024, https://missilethreat.csis.org/missile/ss-x-31-rs-26-rubezh/.
6    Ibid.
7    “Deputy Pentagon Press Secretary Sabrina Singh Holds a Press Briefing,” US Department of Defense, November 21, 2024, https://www.war.gov/News/Transcripts/Transcript/Article/3975265/deputy-pentagon-press-secretary-sabrina-singh-holds-a-press-briefing/.
8    “America’s Strategic Posture: The Final Report of the Congressional Commission on the Strategic Posture of the United States,” Congressional Commission on the Strategic Posture of the United States, October, 2023, https://www.ida.org/-/media/feature/publications/a/am/americas-strategic-posture/strategic-posture-commission-report.ashx.
9    “Military and Security Developments Regarding the People’s Republic of China,” US Department of Defense, 2022, https://media.defense.gov/2022/Nov/29/2003122279/-1/-1/1/2022-MILITARY-AND-SECURITY-DEVELOPMENTS-INVOLVING-THE-PEOPLES-REPUBLIC-OF-CHINA.PDF.
10     “Adherence to and Compliance with Arms Control, Nonproliferation, and Disarmament Agreements and Commitments,” US Department of State, 2025, https://www.state.gov/adherence-to-and-compliance-with-arms-control-nonproliferation-and-disarmament-agreements-and-commitments/.
11    Rose Gotemoeller, “Remarks at the United States Institute for Peace,” US Department of State, July 26, 2010, https://2009-2017.state.gov/t/avc/rls/145126.htm.
12    “The Value of New START Verification,” Arms Control Association, July 21, 2010, https://www.armscontrol.org/issue-briefs/2010-07/value-new-start-verification.
13    Northrop Grumman, a sponsor of the Scowcroft Center’s work on nuclear forces, and Lockheed Martin, a sponsor of other Scowcroft Center work, produce SLBMs for the US Navy.
14    This would be accomplished by unconverting four SLBM launchers on each Ohio-class SSBN. Without such conversions, the size of the SLBM force will drop from 240 to 216 by 2036.

The post Is extending the New START limits in the US national security interest? appeared first on Atlantic Council.

]]>
Nuclear priorities for the Trump administration: A time to decide https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/nuclear-priorities-for-the-trump-administration-a-time-to-decide/ Mon, 22 Dec 2025 20:34:39 +0000 https://www.atlanticcouncil.org/?p=895197 This report offers recommendations to the Donald Trump administration for policy and investment decisions that will shape this new era of strategic competition in the United States’ favor.

The post Nuclear priorities for the Trump administration: A time to decide appeared first on Atlantic Council.

]]>

Bottom lines up front

  • The United States now confronts a two-nuclear-peer threat environment for the first time in its history, requiring immediate decisions to expand and adapt its nuclear posture beyond Cold War–era assumptions.
  • Existing US nuclear forces and policies, while fundamentally sound, are no longer sufficient to deter simultaneous strategic and regional nuclear challenges from China and Russia without additional deployed warheads and new theater capabilities.
  • Absent decisive action on force sizing, nonstrategic nuclear capabilities, missile defense, and nuclear enterprise reform, US deterrence credibility and escalation control will erode in an increasingly coordinated adversary environment.

The United States faces a deteriorating global security environment, adversary governments engaged in unprecedented levels of coordination, and disruptive military and dual-use technologies shaping the future of warfare. In this context, Washington must brace for a seismic shift in the strategic landscape. This report offers recommendations to the Donald Trump administration for policy and investment decisions that will shape this new era of strategic competition in the United States’ favor.

Strategic threats facing the United States and its allies

For the first time in its history, the United States will soon need to deter two adversaries with nuclear arsenals as large as its own nuclear forces. China is undergoing the largest nuclear breakout since the height of the Cold War, Russia maintains the largest and most diverse nuclear weapons stockpile in the world, and both seek to leverage their nuclear capabilities to reshape the international order to be more suited to their interests and governing systems.1 Beyond the great powers, North Korea’s nuclear arsenal and Iran’s nuclear ambitions continue to pose threats to US national security.

China’s rapid nuclear buildup is key to its ongoing efforts to displace the United States at the center of the international system. Through its nuclear arsenal, Beijing will aim to coerce and deter Washington from pursuing its strategic interests regionally and internationally.2 According to an authoritative US Department of Defense report, China will likely reach nuclear parity with the United States in deployable nuclear warheads by the mid-2030s.3 Simultaneously, as part of its anti-area/area denial (A2/AD) architecture, China is fielding dual-capable, theater-range weapons systems able to carry either conventional or nuclear payloads.4 These systems, which are embedded in Chinese military plans under an “opaque” employment doctrine, complicate US escalation calculus and would introduce capability asymmetries in a regional standoff.5

As China surges toward parity with the United States, Russia maintains the world’s largest nuclear arsenal. Russia is armed with strategic, nonstrategic, and so-called “exotic” capabilities, all of which remain central to Russia’s strategy of coercion, intimidation, and escalation in regional conflicts and great-power competition.6 The Strategic Posture Commission (SPC) notes that “Russian strategy and doctrine rely on strategic nuclear forces to deter a large-scale US nuclear response against the Russian homeland while Russia can escalate to limited nuclear war in theater if it chooses.”7. Russia actively uses the threat of nuclear escalation to undermine US efforts to support NATO allies and Ukraine, as well as to pursue strategic objectives in Europe.8

Russian President Vladimir Putin, Chinese President Xi Jinping, North Korean Supreme Leader Kim Jong Un, and Pakistani Prime Minister Shehbaz Sharif before the Beijing military parade commemorating the 80th anniversary of the end of World War II (Kremlin).

Further complicating US strategic calculus are the nuclear capabilities or ambitions of rogue states. North Korea remains committed to increasing its nuclear warhead stockpile and making advancements in nuclear and missile technology to expand the lethality of its program and coerce the United States and South Korea on the Korean Peninsula and beyond.9 Iran also remains committed to pursuing a nuclear weapons program.10 While combined Israeli and US strikes against Iran’s nuclear infrastructure have significantly degraded the regime’s program, Iran has vowed to rebuild, meaning the threat persists.11

The two-nuclear-peer-plus threat environment and growing collaboration between US adversaries present unprecedented challenges. The United States must now prepare for the possibility of concurrent or cascading conflicts in theater and across different regions with multiple nuclear-armed adversaries. Questions related to deterring multiple peer nuclear powers simultaneously and preventing opportunistic aggression must shape US nuclear strategy, employment guidance, force sizing, and conventional operations.

Strategy

As the United States faces two nuclear-armed peer adversaries, threats from emerging technologies, and limited prospects for the future of arms control, Washington must update its nuclear posture and planning to account for the realities of the next decade and beyond. Importantly, it is essential to make decisions regarding these changes now so that the United States is prepared to implement them in future years.

Even in this security environment, the traditional US nuclear strategy remains fundamentally sound. However, the United States must pursue a force posture, backed with the necessary new capabilities, that addresses the evolving challenges.

Declaratory policy

As the 2018 Nuclear Posture Review (NPR) emphasized, “given the range of potential adversaries, their capabilities and strategic objectives,” the United States requires a flexible, tailored nuclear deterrent.12 With a full toolbox of conventional and nuclear options, US leaders will be better positioned to deter aggression, address crises, and, if necessary, manage escalation before and during conflict.

The United States should leave open a first-use option and, as the 2018 NPR states, “retain some ambiguity regarding the precise circumstances that might lead to a US nuclear response.”13 This would force an adversary to assume that US nuclear escalation is possible, even in response to a non-nuclear, strategic attack. Similarly, the United States should not adopt a sole purpose statement regarding the function of its nuclear weapons. Maintaining the current declaratory policy without adopting a no first-use policy or sole purpose statement supports US extended deterrence and increases allies’ assurance, as this ambiguity backstops conventional deterrence.

The United States should continue what is generally referred to as a counterforce targeting doctrine, which means not intentionally targeting population centers and deterring adversaries by holding at risk “key elements of their leadership, the security structure maintaining their leadership in power, their nuclear and conventional forces, and their war-supporting industry.”14 A counterforce targeting policy is advantageous to US objectives in several key ways. Counterforce targeting complicates adversaries’ planning and introduces doubt about their ability to achieve objectives through nuclear use. The possibility of a US strike on adversary nuclear weapons casts a shadow over an adversary’s initiation of limited nuclear use. Further, targeting adversary nuclear weapons deters by targeting what authoritarian leaders value most; these regimes prioritize regime survival and the instruments that ensure it, such as nuclear forces, over the well-being of their populations. Russian President Vladimir Putin has demonstrated in Ukraine that even massive casualty figures will not deter him from pursuing his political goals, a mindset likely shared by China and North Korea.15 By holding an adversary’s strategic forces at risk, the United States threatens the very tools on which these regimes rely for their survival, thereby reinforcing deterrence. Finally, counterforce targeting holds out the prospect of damage limitation. By holding the adversary’s leadership, strategic forces, and command and control (C2) at risk, the United States could limit the damage an adversary could inflict on the United States and its allies in a nuclear exchange.

Force sizing

With the New Strategic Arms Reduction Treaty (New START) set to expire in 2026 and China’s nuclear breakout challenging the current US deterrence posture, the United States must rethink how it sizes, structures, and postures its nuclear forces to ensure credible deterrence at both the strategic and regional levels.

Strategic forces

As the expiration of the New START treaty approaches in February, the administration must assess the future of the US nuclear force, ensuring it can maintain a credible second-strike capability against two nuclear peers, while supporting employment guidance. To do so, the administration must decide on how many strategic weapons it will need, determine the adequacy of the current triad modernization effort, evaluate upload capacity, and assess nuclear command, control, and communication (NC3) resilience.16

In addressing the two-nuclear-peer environment, the Trump administration should codify the SPC’s conclusion that the “nuclear force constructs can no longer assume that the nuclear forces necessary to deter or counter the Russian nuclear threat will be sufficient to deter or counter the Chinese nuclear threat simultaneously” and that, therefore, the program of record is “necessary but not sufficient.”17 The notion of “necessary but not sufficient” outlined by the SPC saw traction toward the end of the Joe Biden administration with Pranay Vaddi, senior director for arms control at the National Security Council (NSC), stating, “Absent a change in the trajectory of adversary arsenals, we may reach a point in the comings years where an increase from current deployed numbers is required.”18 With the growing recognition that the 1,550 treaty-accountable deployed strategic nuclear warheads will no longer be a viable force posture, senior leaders within the administration must determine how many additional deployed strategic warheads will be needed. This determination can only be calculated in a classified setting and is beyond the scope of this report.

 An unarmed Minuteman III Intercontinental Ballistic Missile launches during an operational test on Nov. 5, 2025, at Vandenberg Space Force Base, California (US Space Force photo by Staff Sgt. Joshua LeRoi). 

To increase deployed strategic nuclear warheads, the administration should adopt a two-track approach. The long-term strategy should be prioritizing the full execution of the nuclear modernization program of record (POR). This effort will require continued, disciplined investment in triad modernization, including delivery systems, NC3, and supporting infrastructure. As this long-term strategy is being executed, it is vital that a balanced nuclear triad, a key underpinning of US nuclear force strength and deterrence, is maintained. Imbalance within the triad—due to program costs, modernization pressures, and emerging threats—risks overreliance on one leg or undermining another. These imbalances could create new vulnerabilities for the force, encourage adversary preemption, and weaken strategic stability.19

In the near term, to supplement the current force and address capability gaps, the United States should upload additional warheads onto extant delivery systems as soon as New START expires. The existing Minuteman III intercontinental ballistic missile force can accommodate additional warheads from the existing stockpile on multiple independently targetable reentry vehicles (MIRVs).20 Additionally, the SPC recommends the Air Force and Navy “develop plans and procedures to ‘re-convert’ [submarine-launched ballistic missile] launchers and B-52 bombers that were rendered incapable of launching a nuclear weapon under New START.”21 This would offer a short-term remedy to an increasingly insufficient force. The ability to upload additional warheads takes weeks to years, depending on the launch vehicle.22 Measures should be taken now to overcome some of the bottlenecks in this process (e.g., the limited number of cranes certified to hoist nuclear weapons)

Nonstrategic forces

The United States faces a growing asymmetry in nonstrategic, theater nuclear forces compared to Russia and China. The insufficient arsenal of nonstrategic weapons available limits the president and military leaders’ options in addressing escalation, undermining US regional deterrence efforts. The administration must decide how it intends to address these regional asymmetries through additional capability deployment, nuclear sharing, and changes to previous policy.

The United States’ nonstrategic force principally includes dual-capable aircraft (DCA) armed with B61-12 gravity bombs stationed in Europe as part of NATO nuclear sharing, with no presence in the Indo-Pacific. The United States also fields a handful of low-yield W-76-02 warheads on its submarine-launched ballistic missiles; while a prudent stopgap measure, these weapons have limitations that make them unattractive as a sole option for addressing the risk of limited nuclear use. The current nonstrategic nuclear capabilities of the United States are lacking in several factors: survivability, penetration of adversary defenses, target coverage, and presence in theater.23 The SPC recommended that deployed theater nuclear delivery systems have some or all of the following attributes.

  • “forward-deployed or deployable in the European and Asia-Pacific theaters;
  • survivable against preemptive attack without force generation day-to-day;
  • a range of explosive yield options, including low yield;
  • capable of penetrating advanced [integrated air and missile defenses] with high confidence;
  • and operationally relevant weapon delivery timelines (promptness).”24

These attributes are similarly recommended in a study conducted by the Center for Global Security Research (CGSR).25

To address the capability gap in theater, the administration should continue prioritizing the nuclear-armed submarine-launched cruise missile (SLCM-N), which was discontinued by the Biden administration but funded by Congress as part of the program of record. Additionally, the administration should consider a program to deploy nuclear-armed ground-launched cruise missiles (GLCM-Ns) on road-mobile launchers and nuclear-armed ground-launched ballistic missiles (GLBM-Ns) with alternative reentry vehicles.26 Both capabilities would be effective in the European and Indo-Pacific theaters.27 The administration could also consider pursuing a stand-off capability by redesigning a joint air-to-surface standoff missile (JASSM) around a nuclear payload, creating an in-theater nonstrategic triad.

The full deployment of ground-based nuclear systems and nuclear-armed JASSMs is unlikely due to budget constraints, trade-offs between nuclear and conventional force investments, and the National Nuclear Security Administration’s (NNSA) backlog. As a result, at a minimum, the administration should pursue the development of the SLCM-N to ensure the United States has an in-theater capability that meets the requirements outlined in the SPC.

Ohio-class ballistic-missile submarine USS Maine (SSBN 741) transits the Puget Sound during routine operations, March 18, 2025 (US Navy photo by Mass Communication Specialist 1st Class Ryan Riley)

Arms control and nonproliferation post-New START

The security environment has greatly changed since the New START arms control treaty was signed in 2010, and, as noted above, the United States will need to expand the size of its strategic-deployed nuclear arsenal. This means that the United States cannot extend the quantitative arms limits specified in New START.

Instead, the United States should identify and pursue new trilateral arms control agreements with both China and Russia, consistent with America’s new deterrence requirements. The Atlantic Council has outlined a number of frameworks for trilateral arms control in a previous study.28 It is unlikely that these efforts will succeed as China is unwilling to engage in good faith in arms control negotiations. Still, there are benefits to the United States continuing to make a good faith effort to control the strategic nuclear arms competition.

Absent a verifiable trilateral framework that includes China, the era of numerically binding arms control treaties is likely over for the foreseeable future. Still, Washington can and should pursue risk reduction measures, such as missile launch notifications, to reduce nuclear dangers.

Golden Dome for America

The administration laid out an audacious plan in the “Iron Dome for America” (later dubbed the “Golden Dome”) executive order (EO), but this policy requires significant further definition. To operationalize this initiative, the administration must define the core objective of the Golden Dome and, from there, establish an architectural concept and identify the near- and long-term research and engineering priorities necessary to achieve this vision.

Policy framework and architecture

The EO calls for “deploying and maintaining a next-generation missile defense shield.”29 Of particular significance, the EO states “the architecture shall include, at a minimum, plans for:

  • “Defense of the United States against ballistic, hypersonic, advanced cruise missiles, and other next-generation aerial attacks from peer, near-peer, and rogue adversaries;
  • Acceleration of the deployment of the Hypersonic and Ballistic Tracking Space Sensor layer;
  • Development and deployment of proliferated space-based interceptors capable of boost-phase intercept.”30

In total, these objectives represent a major departure from existing US homeland missile defense (HMD) precedent. Implementing them would require not only the fielding of new capabilities but, in several cases, fundamental advances in research, development, and operational concepts.

The foundation of US missile defense policy remains the 1999 National Missile Defense Act, which directed the deployment of a system to defend the United States against limited ballistic missile attacks. Since then, successive administrations have built on this mandate, maintaining policies centered on safeguarding the homeland against nuclear-armed, long-range ballistic missiles from regional adversaries.31 Current HMD policy states that the United States “will defend against air- and sea-launched cruise missile threats from any country but will only pursue defenses against ballistic missiles launched by rogue states.”32 Today, the US HMD architecture relies on forty-four ground-based interceptors (GBIs), with an additional twenty next-generation interceptors (NGIs) planned beginning in 2028.33 However, the EO’s directives indicate a significant shift in both policy and capability. Defending the homeland against the full spectrum of advanced missile threats, including hypersonic glide vehicles and long-range cruise missiles launched by peer adversaries, would represent a fundamental expansion of mission scope.

THAAD battery supports defense operations during 2019 maintenance of NATO’s Aegis Ashore Ballistic Missile Defense System (AABMDS) in Romania (Photo by US Navy Lt. Amy Forsythe, Public Affairs Officer, Naval Support Facility Deveselu) 

The recently passed “One, Big, Beautiful, Bill” allocates approximately $25 billion toward developing an integrated air and missile defense system.34While this funding provides a solid foundation to initiate the effort, achieving the EO’s ambitious goals will require sustained, multiyear investment that extends well beyond a single administration. This raises two critical questions. First, near-term execution: what steps can be taken in the immediate future to demonstrate tangible progress toward the president’s vision? Second, long-term viability: how can the administration institutionalize this effort to ensure its continuity and eventual success across future administrations?

The administration should pursue a layered, preferential defense architecture with a space-based element. Such a system would allow the United States to rapidly enhance its HMD using existing technologies, providing credible protection against limited, coercive missile attacks by peer or near-peer adversaries, as well as reinforce extended deterrence commitments.35

This near-term improvement could be achieved by augmenting the current GBIs and future NGIs with an additional defensive layer composed of the Navy’s Aegis Ashore systems, armed with SM-3 Block IIA interceptors, and the Army’s ground-mobile Terminal High Altitude Area Defense (THAAD) batteries.36 Integrating these systems into a cohesive HMD network would create additional engagement zones, improve shot opportunities, and strengthen resilience against complex missile threats.

While this layered defense strategy would mitigate immediate vulnerabilities and demonstrate measurable progress toward the EO’s objectives, realizing the full vision—including the deployment of proliferated space-based interceptors and the acceleration of the Hypersonic and Ballistic Tracking Space Sensor layer—will require sustained political and financial commitment. Continued progress will hinge on securing congressional buy-in to ensure consistent funding, program stability, and long-term strategic momentum across future administrations.

Nuclear enterprise

With the proposed changes to policy and capability, significant demand will be placed on the nuclear enterprise. As then NNSA Administrator Jill Hruby stated, “NNSA is being asked to do more than at any time since the Manhattan Project.”37 Meeting the Departments of Defense and Energy’s “plans to operate, sustain, and modernize current nuclear forces and purchase new forces,” would cost $946 billion over the 2025–2034 period.38 To achieve the necessary increase in nuclear warheads and delivery systems, the administration must reform the broader nuclear enterprise. This means addressing not only the infrastructure and production capacity, but also the workforce.

To meet the surge in demand generated by the ongoing nuclear modernization effort, NNSA must establish a Rapid Response Office (RRO) as outlined by the FY2026 National Defense Authorization Act (NDAA).39 This office, endowed with delegated authorities and flexible funding, would be empowered to rapidly design, prototype, and produce key components in response to emerging requirements. Such a capability directly supports the SPC recommendation that NNSA “meet the capability and schedule requirements of the current nuclear modernization program of record and the requirements of force posture modifications,” while maintaining the agility to “flex to respond to emerging requirements in a timely fashion.”40

At present, excessive review layers, rigid oversight procedures, and limited incentives for innovation have created an environment that is risk averse and process driven rather than mission driven.41 An RRO would enable the enterprise to operate under delegated acquisition authority, streamlined contracting lanes, and incentive structures that reward speed, innovation, and cost control.

However, even a more agile organization cannot succeed without a modern, resilient infrastructure. Decades of underinvestment have left the NNSA complex brittle, outdated, and, in many cases, dependent on single points of failure. Nearly 60 percent of NNSA’s facilities are more than forty years old, many dating back to the Manhattan Project era.42 As NNSA moves to modernize critical capabilities—such as plutonium pit production, uranium processing, high-explosive manufacturing, and non-nuclear component production—these efforts have been undermined by cost and schedule overruns. As of August 2023, the agency’s eighteen major construction projects had a combined cost overrun of roughly $2.1 billion and cumulative schedule delays approaching ten years.43 The Uranium Processing Facility alone faces potential additional delays of up to six years and a cost increase of approximately $3.8 billion.44

While the SPC appropriately calls for Congress to “fund the full range of NNSA’s recapitalization efforts,” the scale and pace of these overruns make the current approach unsustainable.45 To stabilize the modernization program and maintain capability continuity, NNSA should prioritize establishing redundant production capacity for plutonium pits and uranium components, reducing dependence on any single site and ensuring resilience in the event of technical or operational disruptions. In parallel, NNSA should establish a model similar to the Navy’s Working Capital Fund (NWCF) or Military Construction (MILCON) “no year” funds to mitigate year-to-year appropriation volatility. The NWCF “provides stabilized pricing to customers and acts as a shock-absorber to fluctuations in market prices during the year of execution.”46 MILCON “no year” funds “represent budget authority available for obligation indefinitely until expended, regardless of fiscal year.”47 Adopting these models for NNSA would allow for continuous and flexible funding of long-term recapitalization projects, reducing costly stop-start inefficiencies that currently plague major construction programs.48

The final critical challenge to meeting enterprise demand is workforce retention and generational turnover. The Enhanced Mission Deliverer System Initiative (EMDI) report found that the nuclear security enterprise faces “tremendous workforce attraction and retention issues,” with roughly 40 percent of the NNSA workforce having less than five years of experience within the enterprise.49 Compounding this challenge, “more than one-third of the nuclear security workforce will be eligible for retirement within the next five years,” risking the loss of decades of institutional knowledge and technical expertise.50

To mitigate these workforce gaps, the administration should act on the SPC’s recommendation to “establish and increase the technical education and vocational training programs required to create the nation’s necessary skilled-trades workforce for the nuclear enterprise.”51 This should include expanding partnerships between NNSA, the Department of Education, and industry to fund specialized STEM (science, technology, engineering, and math) pipelines, apprenticeships, and advanced degrees in nuclear engineering, materials science, and manufacturing. Strengthening the talent pipeline and institutionalizing mentorship programs will be essential to maintaining design, production, and sustainment capabilities across the next generation of the nuclear security enterprise.

Transporter erector is raised during an annual proofload test at Minot Air Force Base, North Dakota, April 2, 2019 (US Air Force photo by Senior Airman Ashley Boster).

Strategy implementation

US nuclear strategy will only be as successful as its implementation plan. The administration must focus on two key areas of implementation: senior-leader buy-in and implementation across the combatant commands.

Sole authority for nuclear use remains with the president of the United States. While it might be impractical to involve the president personally in exercises and wargames, it is essential that senior-level defense and political leaders participate in nuclear exercises at a significantly higher cadence than they have in the past.

US Strategic Command continues to implement US nuclear strategy in operational plans but, as the salience of theater nuclear forces and the potential for limited nuclear use increase, it is more important than ever that US European Command, US Indo-Pacific Command (and its sub-unified commands), and others integrate the potential for nuclear use and the management of escalation below and across the nuclear use threshold into their operational plans and exercises. The services must also take escalation management and operations in a post-nuclear-detonation environment more seriously in their development of capabilities; tactics, techniques, and procedures; and professional military education.

Conclusion

The United States stands at a critical inflection point. For the first time in history, it must simultaneously deter two peer nuclear adversaries. The post–Cold War assumptions that guided past force planning are no longer sufficient, and senior defense leaders must reorient nuclear and missile defense policies at both the strategic and theater levels to meet today’s complex threat environment. Key decisions must be made regarding a post-New START force structure, including addressing widening capability gaps in nonstrategic forces. At the same time, policy and funding guidance is required to operationalize the Golden Dome executive order, balancing near-term implementation with long-term architectural objectives. Finally, the United States must ensure that the nuclear enterprise possesses the infrastructure, production capacity, and skilled workforce necessary to execute the nation’s nuclear strategy, which requires sustained and substantial investment in modernization, resilience, and workforce development. For eighty years, the United States has sustained the rules-based international order, helping to produce a level of stability and international collaboration without historical precedent. At the crux of this stability is a credible and extended US nuclear deterrent, which has constrained revisionist powers and upheld the integrity of global norms. A resilient nuclear posture, capable of deterring two nuclear peers simultaneously, remains the most effective safeguard against great-power war and a prerequisite for sustaining US global leadership.

About the authors

Matthew Kroenig is vice president and senior director of the Atlantic Council’s Scowcroft Center for Strategy and Security. Kroenig was appointed by the US Congress as a commissioner on the Congressional Commission on the Strategic Posture of the United States. He previously served in the Department of Defense and the intelligence community. Kroenig is also a tenured professor of government and foreign service at Georgetown University. He holds an MA and PhD in political science from the University of California at Berkeley.

Jonathan Rosenstein is a program assistant in the Forward Defense program of the Atlantic Council’s Scowcroft Center for Strategy and Security, where he supports work on nuclear strategy and space security. Rosenstein is a recent graduate of the George Washington University’s Elliott School of International Affairs, where he earned his master’s degree in security policy studies with a concentration in US national security, and he holds a bachelor’s degree from Tulane University.

Acknowledgements

The authors wish to acknowledge Dr. Robert Soofer for his inputs to this paper, all of which were completed before his return to the US government in 2025. They wish to acknowledge Mark Massa and Alyxandra Marine for their assistance in reviewing and editing this paper.

The Atlantic Council’s Scowcroft Center for Strategy and Security conducts work on nuclear and strategic forces, which is supported by donors including the Carnegie Corporation of New York, Lockheed Martin Corporation, Los Alamos National Laboratory, Northrop Grumman Corporation, RTX Corporation, the Smith Richardson Foundation, the United States Department of Defense, and the United States Department of State, as well as through general support to the Scowcroft Center for Strategy and Security.

Explore the programs

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

1    Madelyn R. Creedon, et al., “America’s Strategic Posture: The Final Report of the Congressional Commission on the Strategic Posture of the United States,” Institute for Defense Analyses, October 2023, 11, https://www.ida.org/research-and-publications/publications/all/a/am/americas-strategic-posture.
2    John Lee and Lavina Lee, “Implications of Chinese Nuclear Weapons Modernization for the United States and Regional Allies,” Hudson Institute, July 30, 2025, https://www.hudson.org/defense-strategy/implications-chinese-nuclear-weapons-modernization-united-states-regional-allies-john-lee.
3    Creedon, et al., “America’s Strategic Posture,” 12.
4    Chris Andrews and Justin Anderson, “China’s Theater-Range, Dual-Capable Delivery Systems: Integrated Deterrence and Risk Reduction Approaches to Counter a Growing Threat,” Defense Threat Reduction Agency, August 2024, https://digitalcommons.ndu.edu/cgi/viewcontent.cgi?article=1001&context=wmdcenter-research.
5    Ibid., 6.
6    Creedon, et al., “America’s Strategic Posture,” 17.
7    Ibid., 92
8    Ibid., 39.
9    Mary Beth D. Nikitin, “North Korea’s Nuclear Weapons and Missile Programs,” Congressional Research Service, May 23, 2025, https://www.congress.gov/crs_external_products/IF/PDF/IF10472/IF10472.39.pdf; Markus Garlauskas, “Toplines: The United States and Its Allies Must Be Ready to Deter a Two-Front War and Nuclear Attacks in East Asia,” Atlantic Council, February 7, 2025, https://www.atlanticcouncil.org/in-depth-research-reports/report/toplines-the-united-states-and-its-allies-must-be-ready-to-deter-a-two-front-war-and-nuclear-attacks-in-east-asia/.
10    “Iran’s President Vows to Rebuild Nuclear Facilities with ‘Greater Strength,’” Times of Israel, November 2, 2025, https://www.timesofisrael.com/irans-president-vows-to-rebuild-nuclear-facilities-with-greater-strength.
11    Ibid.
12    “Nuclear Posture Review,” US Department of Defense, February 2018, 22, https://media.defense.gov/2020/May/18/2002302062/-1/-1/1/2018-NUCLEAR-POSTURE-REVIEW-FINAL-REPORT.PDF.
13    Ibid.
14    Creedon, et al., “America’s Strategic Posture,” 30.
15    Alexandra Vacroux, “Does Vladimir Putin Care What the War Has Cost Him?” Harvard University Davis Center, May 5, 2022, https://daviscenter.fas.harvard.edu/insights/does-vladimir-putin-care-what-war-has-cost-him; Mark F. Cancian, Matthew F. Cancian, and Eric Heginbotham, “Wargaming Nuclear Deterrence and Its Failures in a U.S.-China Conflict over Taiwan,” Center for Strategic and International Studies, December 13, 2024, https://www.csis.org/analysis/confronting-armageddon; John J. Hamre, et al., “North Korea Policy & Extended Deterrence,” Center for Strategic and International Studies, January 19, 2023, https://features.csis.org/north-korea-extended-deterrence/.
16    Peter L. Hays and Sarah Mineiro, “Modernizing Space-Based Nuclear Command, Control, and Communications,” Atlantic Council, July 15, 2024, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/modernizing-space-based-nuclear-command-control-and-communications/.
17    Creedon, et al., “America’s Strategic Posture,” 31.
18    Pranay Vaddi, “Adapting the U.S. Approach to Arms Control and Nonproliferation to a New Era,” Arms Control Association, June 7, 2024, https://www.armscontrol.org/2024AnnualMeeting/Pranay-Vaddi-remarks.
19    Paul Amato, “In Defense of the US Maintaining a Balanced Nuclear Triad,” Atlantic Council, September 29, 2025, https://www.atlanticcouncil.org/blogs/new-atlanticist/in-defense-of-the-us-maintaining-a-balanced-nuclear-triad.
20    “Statement of Anthony J. Cotton,” Senate Committee on Armed Services, February 29, 2024, https://www.armed-services.senate.gov/imo/media/doc/cotton_statement.pdf.
21    Joseph Trevithick, “Return to ICBMS Armed with Multiple Warheads Suggested by Stratcom Boss,” War Zone, February 29, 2024, https://www.twz.com/nuclear/return-to-icbms-armed-with-multiple-warheads-suggested-by-stratcom-boss.
22    David J. Trachtenberg, “Assessing the 2022 Nuclear Posture Review,” National Institute for Public Policy, December 19, 2022, https://www.nipp.org/wp-content/uploads/2023/06/Proceedings-December-2022.pdf.
23    For more information see: Greg Weaver, “The Imperative of Augmenting US Theater Nuclear Forces,”Atlantic Council, April 11, 2025, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/the-imperative-of-augmenting-us-theater-nuclear-forces/.
24    Creedon, et al., “America’s Strategic Posture,” 49.
25    Kristine Wong, ed., “China’s Emergence as a Second Nuclear Peer: Implications for U.S. Nuclear Deterrence Strategy,” Lawrence Livermore National Laboratory, Spring 2023, https://cgsr.llnl.gov/sites/cgsr/files/2024-08/CGSR_Two_Peer_230314.pdf.
26    Weaver, “The Imperative of Augmenting US Theater Nuclear Forces.”
27    Ibid.
28    Kroenig and Massa, “Toward trilateral arms control: Options for bringing China into the fold,” Atlantic Council, February 4, 2021, www.atlanticcouncil.org/in-depth-research-reports/issue-brief/toward-trilateral-arms-control-options-for-bringing-china-into-the-fold/.
29    “The Iron Dome for America: Executive Order 14186,” Executive Office of the President, February 3, 2025, https://www.federalregister.gov/documents/2025/02/03/2025-02182/the-iron-dome-for-america.
30    Ibid.
31    Rob Soofer, “‘First, We Will Defend the Homeland’: The Case for Homeland Missile Defense,” Atlantic Council, January 4, 2025, https://www.atlanticcouncil.org/in-depth-research-reports/report/first-we-will-defend-the-homeland-the-case-for-homeland-missile-defense.
32    Ibid.
33    Ibid.
34    “HASC/SASC Reconciliation Overview,” US House Armed Services Committee and US Senate Committee on Armed Services, last visited December 12, 2025, https://armedservices.house.gov/uploadedfiles/hasc_reconciliation_overview.pdf.
35    For more reading on this subject, see: Soofer, “‘First, We Will Defend the Homeland.’”
36    Ibid.
37    Anya L. Fink, “The U.S. Nuclear Security Enterprise: Background and Possible Issues for Congress,” Congressional Research Service, August 15, 2025, https://www.congress.gov/crs-product/R48194.
38    “Projected Costs of U.S. Nuclear Forces, 2025 to 2034,” Congressional Budget Office, April 2025, https://www.cbo.gov/system/files/2025-04/61224-NuclearForces.pdf.
39    National Defense Authorization Act for Fiscal Year 2026, S. 2296 (2025), 1754, https://www.congress.gov/119/bills/s2296/BILLS-119s2296es.pdf.
40    Creedon, et al., “America’s Strategic Posture,” ix.
41    “National Nuclear Security Administration: Fully Incorporating Leading Practices for Agency Reform Would Benefit Enhanced Mission Delivery Initiative,” Government Accountability Office, February 2025, https://www.gao.gov/assets/gao-25-106675.pdf.
42    “NNSA Passes Major Milestone in Dispositioning Manhattan Project-Era Facilities,” National Nuclear Security Administration, April 26, 2021, https://www.energy.gov/nnsa/articles/nnsa-passes-major-milestone-dispositioning-manhattan-project-era-facilities.
43    “National Nuclear Security Administration.”
44    Ibid.
45    Creedon, et al., “America’s Strategic Posture,” ix.
46    “Department of the Navy Fiscal Year (FY) 2026 President’s Budget: Justification of Estimates,” Department of the Navy, June 2025, https://www.secnav.navy.mil/fmc/fmb/Documents/26pres/NWCF_Book.pdf.
47    Drew C. Aherne, “Appropriations Duration of Availability: One-Year, Multi-Year, and No-Year Funds,” Congressional Research Service, June 7, 2024, https://www.congress.gov/crs_external_products/R/PDF/R48087/R48087.1.pdf.
48    “National Nuclear Security Administration.”
49    Ibid
50    “Leadership Development Program Proves Highly Successful Recruiting and Retention Tool,” National Nuclear Security Administration, July 21, 2022, https://www.energy.gov/nnsa/articles/leadership-development-program-proves-highly-successful-recruiting-and-retention-tool.
51    Creedon, et al., “America’s Strategic Posture,” ix.

The post Nuclear priorities for the Trump administration: A time to decide appeared first on Atlantic Council.

]]>
Enhancing land military mobility in Europe: Advocating a pragmatic approach https://www.atlanticcouncil.org/in-depth-research-reports/report/enhancing-land-military-mobility-in-europe-advocating-a-pragmatic-approach/ Fri, 19 Dec 2025 18:25:54 +0000 https://www.atlanticcouncil.org/?p=894533 Solving the challenges of military mobility in Europe requires a whole-of-government and whole-of-society perspective. Given the geopolitical climate, Europe should move quickly on this most pressing issues for the North Atlantic Alliance.

The post Enhancing land military mobility in Europe: Advocating a pragmatic approach appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Europe’s military mobility infrastructure is showing the effects of 30 years of underinvestment since the Cold War, with bridge operations, rail transport, and air defense unprepared for moving NATO troops to the front lines.
  • The ideal of a “military Schengen zone” remains far off, with border crossings requiring up to a month’s notice and non-standardized rail systems forcing engine changes at every border.
  • The urgency of the situation requires focusing on enacting prompt, rapid solutions—and the EU has a key role to play.

Table of contents

Foreword

It is a great honor to write the foreword to this Atlantic Council report, Enhancing land military mobility in Europe: Advocating a pragmatic approach. This new report comes at a highly opportune moment. Against the backdrop of Russia’s war in Ukraine, the 2025 NATO summit at The Hague endorsed the Alliance goal of spending “up to 1.5% of GDP annually to inter alia protect our critical infrastructure, defend our networks, ensure our civil preparedness and resilience, unleash innovation, and strengthen our defense industrial base.” This seminal paper on military mobility opens a broader transatlantic dialogue on the efficacy of current European military mobility plans and actions, and highlights where additional fiscal resources can be wisely spent.

This is a subject of great interest to the Atlantic Council. Under the leadership of General Curtis M. Scaparrotti, a retired US Army general and former NATO supreme allied commander, and Ambassador Colleen Bell, former US ambassador to Hungary and a current member of the Atlantic Council board of directors, the Scowcroft Center for Strategy and Security established a task force on the subject six years ago to “assess the adequacy of efforts to improve military mobility in Europe.” I had the privilege to direct that study for the Scowcroft Center.

That task force’s collective efforts resulted in the 2020 report, Moving Out: A Comprehensive Assessment of European Military Mobility. The report generated important politico-military discussions on the issue across the capitals of Europe, helping to shape a broader debate over the need for Alliance improvements not only in capability and capacity, but also in logistics and sustainment, especially for northern and central Europe. The report also successfully encouraged the European Union (EU) to provide critical financial resources for mobility in its 2021–2027 multiannual financial framework. However, written as it was some five years ago, it came two years before Russia’s full-scale military aggression against Ukraine in February 2022. Consequently, a new study on the subject is timely and beneficial.

European interest has reignited on issues of military mobility, logistics, and sustainment, especially for NATO’s own southern flank. In light of NATO’s new force model and 360-degree strategy of multidomain collective defense, the 2024 NATO summit communiqué placed a heightened emphasis on the “threats, challenges and opportunities in the South,” to include “strengthening our ability to move, reinforce, supply and sustain our forces to respond to threats across the Alliance, including through effective and resilient logistics and the development of mobility corridors.” As the Atlantic Council’s task force on a security strategy for the Black Sea visited the region two years ago to help prepare its report, A Security Strategy for the Black Sea, Romanians expressed keen interest in additional study and analyses on military mobility within the broader context of the ongoing war in Ukraine, especially for its impact on NATO’s southern flank. This report places heightened emphasis on the land mobility challenges affecting that flank.

With publication of Enhancing land military mobility in Europe: Advocating a pragmatic approach, the Atlantic Council once again is playing a leadership role in advocating for military mobility modernization, this time within the context of NATO’s broader defense perimeter and rear areas. This report should be of great assistance to all NATO countries and EU member states, providing them with a foundation from which to reinvigorate their own national military mobility programs on what is increasingly acknowledged to be a vital Alliance-wide deterrence and defense planning issue. The report correctly places special attention upon Germany as a “nexus of military mobility,” and Berlin receives high priority as a critical enabler within a broader Alliance defense-planning context.

The report has much to convey to the Alliance on the technical, operational, and burden-sharing issues pertinent to strengthening collective defense across the continent. In advocating a pragmatic approach to enhancing European military mobility, the report focuses on the enhancement of existing capabilities including existing dual-use infrastructure, the mobilization of civilian assets, cyberdefense, infrastructure resilience, and looking at military mobility from the lens of a “whole-of-government, whole-of-society task.” This emphasis comports with the Atlantic Council’s 2020 report and is the right place to start. It correctly observes that land mobility capabilities have suffered from thirty years of underinvestment, making them poor cousins of European armies’ capabilities, and therefore emphasizes improving and standardizing the road and railway network in Europe including the nine trans-European transport network (TEN-T) corridors. The report also recommends making major upgrades to European rail infrastructure, electrification, and interoperable signaling systems.

The report goes further than the Council’s 2020 effort in several respects. This 2025 report focuses on European-wide improvements to both the organization of and the planning for military mobility. The report recommends that military mobility be institutionalized across the Alliance, to fully involve NATO stakeholders, from subject matter experts like the Joint Support Enabling Command for mobility on up to the International Military Staff as strategic military adviser, in the definition of priority areas of interest “to reinforce the overall coherence of the network.” The report also recommends the institutionalization of “a seminar on infrastructure linked to military mobility, jointly organized by the EUMS [EU Military Staff] and NATO, to inform participants of existing funding mechanisms and the need for nations to be involved.” These recommendations leverage and improve upon the general recommendations of the 2020 report that NATO and the EU create an institutionalized political dialogue to improve alliance information sharing.

Finally, this report’s seventeen specific technical recommendations all deserve serious consideration by national decision-makers. The report’s excellent discussion of continent-wide gaps in military mobility, and air defense mobility in particular, should be of keen interest to the Alliance given lessons learned in these areas from the Russia-Ukraine and Israel-Iran wars. Also of great interest should be the report’s comparison of routes taken by major units during World War II with the TEN-T road network of today and its analyses of the deeper penetration of West-East corridors in the North than in the South. As the geography of southern Europe is much more mountainous and complex, there is an ongoing need to address these factors and rebalance military mobility southward to seek better connectivity toward the Mediterranean.

Significantly, the report’s analysis on European-wide logistics issues of concern should be of great interest to national planners and decision-makers. The report cogently addresses the commercial ownership imbalance at several key European ports involving non-European powers—including China COSCO shipping—and the need to address this imbalance. It does so by encouraging a deeper integration of logistics requirements across northern and southern Europe to enable a more balanced combat logistics flow coming out of Europe’s twenty-nine ports, with an emphasis on the TEN-T core ports, including those on the Atlantic coast. In addition, the report encourages regular training events and educational seminars on military mobility, increased Action Plan on Military Mobility funding for large-scale projects, the development of more flexible European investment rules, transportation reserves, and national implementation of whole-of-government approaches to mitigating military mobility shortfalls. If acted upon, the report’s recommendations would offer greater burden-sharing opportunities for NATO military forces and help expedite Alliance force projection during times of crisis.

There continue to be several areas where longer-term European military mobility improvements could be made that should be the focus of future NATO and EU research efforts. These include better defining transatlantic airlift and sealift requirements within the NATO force model, expanding in-theater airlift capacity, improving planning for refugee operations, leveraging cold and dispersed basing, and evaluating the efficacy of enhanced public-private partnerships. These stand as additional opportunities for more vigorous Alliance-wide study and analyses at an even deeper level of integration.

Enhancing land military mobility in Europe: Advocating a pragmatic approach demonstrates how important it is that the Alliance stay vigilant and current on the dynamic issue of military mobility. The future is far brighter on the topic of NATO military mobility than it was five years ago. The issue has been elevated out of the defense-planning realm up to the national decision-making level. The transatlantic community should be heartened that the foreign and defense ministries of the countries within the Alliance and their militaries have the resident defense thought leadership to make major progress on the mobility issue in the years ahead.

The United States Department of Defense, NATO, and the European Union should welcome the Atlantic Council’s continuing interest, expertise, and enthusiasm shown on this highly important transatlantic security topic, as evidenced by this outstanding research report. We strongly encourage US and NATO military and political leaders to not only seriously consider these Atlantic Council military mobility recommendations, but to take positive, expeditious action upon as many of them as is practicable in the months and years ahead.

Wayne A. Schroeder, Ph.D.
Nonresident senior fellow
Scowcroft Center for Strategy and Security, Atlantic Council

The imperative: Defining the role of military mobility in Europe

Since the Russian Federation’s annexation of Crimea in 2014 and the following full-scale invasion of Ukraine in February 2022, the credibility of NATO’s deterrence and defense is at stake on Europe’s eastern flank. In response, facilitating the movement of military troops and assets across Europe will be essential to improve the implementation of NATO’s focus on territorial defense. Bringing troops from western Europe or across the Atlantic to the front lines is the first step of combat. Therefore, NATO’s ability to deter aggression and “defend every inch” of its territory relies heavily on military mobility.

Today, Europe’s military mobility capabilities are inadequate. Assessing the performance of major land, sea, and air logistical vectors is paramount to the projected fighting power of the Alliance as a whole. If the logistics chain currently in place to support Ukraine were considered a blueprint, it would not be capable of sustaining a long-lasting and massive deployment of troops to the eastern flank. If anything, transatlantic support to Ukraine over the past three years has highlighted a harsh reality: Military mobility capabilities in Europe are stretched thin. It is therefore imperative to consider the short-term operational requirements for enabling land mobility from all directions toward and along NATO’s eastern border. This report takes a holistic view of facilitating the seamless movement of troops to the East. 1

Improving military mobility will require a whole-of-society and multilateral approach. The military cannot act alone. Most of the challenges behind land mobility such as infrastructure development and legal and diplomatic procedures fall under civilian control. Further, military mobility must consider economic and political realities as well as military ones to marry civilian priorities with NATO’s operational requirements.

NATO is the most efficient operational actor regarding military mobility, but the European Union (EU) plays a critical role in improving the continent’s military mobility. The EU could become the main operator of dual-use infrastructure, being responsible for managing and running their day-to-day operation, to allow the Alliance to operate as seamlessly as possible. The EU’s interest in military mobility is not new, but it could acquire a more strategic role in steering continent-wide priorities.

Meeting NATO’s new force generation requirements

NATO’s military efficiency relies on three key principles: a robust peacetime-activated force structure; high levels of interoperability of forces across members; and the capability, as a result, to place a significant number of forces under NATO command. The latter requires both robust integration mechanisms and adequate military mobility infrastructure. However, Western forces have struggled to adapt to the needs of current military mobility requirements.

First, Europe has much ground to recover since the end of the Cold War, when military mobility was considered a strategic issue. The post-Cold War “peace dividend” led to reductions in European armies’ forces and structures. Ground military mobility relies on five core capabilities: road transportation, road traffic management, bridge operations, railroad operations, and air defense. Those essential capabilities were gradually scaled back. Due to thirty years of underinvestment, the overall performance levels of the largest European armies in logistics have become insufficient, especially in terms of ratio of available vehicle-launched bridges for wet gap crossings,2 military transport,3rail-repair capabilities for logistics, and air-defense assets per brigade.4

Second, for decades, Western armies have been tailored for counterinsurgency warfare beyond NATO territory, such as in sub-Saharan Africa, Iraq, or Afghanistan. The previous decades’ focus on the war on terror meant armies logically prioritized airlift for their respective expeditionary engagement instead of sea, rail, and land. This emphasis was further reinforced by the uncontested air supremacy Western forces enjoyed, which made airlift the fastest option. The result has been a structural bias toward short-term air mobility, at the expense of long-term, railway-intensive planning required for the large-scale movement of heavy forces in Central Europe. Today, this supposedly acquired air superiority is being upended—even in the rear area—by the range of land-air and air-air systems.

The requirements for military mobility have also evolved in response to Russia’s war of aggression against Ukraine, with a NATO force posture readiness model adopted at the 2022 NATO summit in Madrid. The Alliance’s defensive strategy seeks to immediately inflict losses on an aggressor and defend every inch of NATO’s territory, instead of the previous trip-wire strategy. The NATO force model expanded the readiness of forces and the requirement for how fast and where troops could be deployed. At any time, more than half a million personnel are to be made available to the supreme allied commander Europe (SACEUR) within thirty to 180 days to implement the new NATO plans.

This strategy means military planning must account for a much quicker flow of personnel and materiel to the front—meaning NATO’s new frontline, which stretches from the High North to the Baltic states and Poland, and down to the Black Sea region. In the event of a threat to NATO’s territory, rapid and massive reinforcements will be necessary from elsewhere on the continent, making mobility essential. The recent enlargement of the Alliance with the accession of Finland and Sweden has significantly extended the distance to cover for troops coming from across the ocean and multiplied the number of border crossings, adding to the existing challenge.

Allies have been slowly building up a presence along the eastern flank. Until recently, NATO did not have significant forward-deployed units along its eastern border, except for a reassurance force in the form of four NATO battlegroups: They became operational in 2017 in the three Baltic states and Poland. At the 2023 Vilnius summit, these enhanced forward presences were bolstered to improve the imbalance of conventional forces in states on the eastern flank, and particularly in the Baltic area. Now, following the decision in 2022 to quickly create four more battlegroups in Bulgaria, Hungary, Romania, and Slovakia, NATO manages eight battlegroups on the eastern flank. In 2024, Sweden announced its intention to assume the framework nation role in the enhanced forward presence in Finland, which is geared toward defending the Northern ports—with a brigade-sized unit.5

In Romania, France deploys 1,500 permanent personnel, which will be regularly reinforced to approximately 4,000 in order to train the ability of France to deploy a brigade—typically 3,000 to 5,000 soldiers—within ten days.6

Even prior to this new push, military mobility was understood to be an essential task for the Alliance. The establishment of the Joint Support and Enabling Command (JSEC) in 2018 shows that military mobility, particularly in terms of coordination, was again a strategic priority for SACEUR.

The nexus between geographical constants and technological constraints

The history of military movements across Europe provides a valuable blueprint for understanding how forces would move across the continent. The maneuvers of the major units that took part in the final victory in the European theater during World War II demonstrate the continued relevance of certain corridors. Furthermore, comparing historical and current maps underlines the role of the Carpathian Mountains as one of the most formidable physiographic divides of the European theater. The map also shows how much Germany lies at the core of the northern corridor of mobility.

While dual-use infrastructures can reduce the inequality of access between the North and South, they cannot provide complete balance. Mobility will remain more complex in the southern area than in the northern area, given its mountain chains including the Alps and Carpathians, but also rivers, notably the Danube. As a result, efforts will have to be made outside of this double corridor in the North to geographically balance activity and ensure redundant connections to the Mediterranean. In the High North, achieving secondary routes is made difficult by the fact that countries only have a few roads and even fewer rail lines. Finland’s railway gauge is different from the rest of Europe. Existing lines of transport are susceptible to winter damage. The Alliance must balance these geographical constraints with military requirements.

Figure 1: Second World War mobility corridors across Europe

Figure 2: Contemporary corridors of land mobility

Sources: Data taken from European TENtec Map and NATO online portal

Modern realities paint a more complex picture for military mobility. In a break from the past, the relative safety of the rear area of the theater of operations is fading. The increased hybrid nature of modern warfare and the proliferation of long-range weapon systems mean that the Alliance must plan for enemy actions both along the front and in the rear, meaning western Europe will also need security in the context of military mobility. Furthermore, Russia’s alliance with Belarus and the Russian enclave of Kaliningrad, in which short-range, ground-launched ballistic and cruise missiles are situated, put military mobility most at risk in the northern corridor.

For example, the Baltic Sea’s most important harbor, Klaipėda, in Lithuania, lies six kilometers from Kaliningrad. This proximity highlights the need for additional supply-line options primarily over Norway through Scandinavia in the event of a strike on the port. Securing sea routes in the High North is also a priority as a diversification strategy, facilitated by the accession of Sweden and Finland to the Alliance. The NATO countries located on its eastern flank are vulnerable to short-range cruise missiles and drone campaigns such as the those launched by Russia in Ukraine.

In the hybrid domain, Russia has shown its willingness and ability to disrupt cyber and energy networks in Europe. It also has shown its capabilities to act covertly, including with the deployment of a military ship under disguise in the English Channel.7 Russian activity remains persistent along NATO’s maritime borders, while incursions have increased across continental Europe8

—particularly on the eastern flank—testing civilian preparedness. These actions challenge not only military mobility but also aim to generate broader cognitive effects. One such effect is habituation—often described through the “boiling frog” metaphor—where organizations gradually become desensitized to hostile activity. Ultimately, the resilience of societies is closely tied to the resilience of their critical infrastructure.

European political momentum and the EU’s role as an operator

NATO allies pledged at the 2025 Hague summit to spend 1.5 percent of gross domestic product annually toward infrastructure including military mobility.9

Harnessing the current political momentum, this report suggests ways for Europe to address and advance its short-term gaps in air, sea, and land mobility. For example, successfully moving a massive number of troops across the entire European continent depends on reliable, resilient infrastructure with sufficient trucks and trains to execute the mission. However, it also relies on efficient coordination, smooth border crossings, and solid planning. A patchwork of players is involved in the practice of planning military mobility including:

  • Sending nation: The nation whose troops are moving.
  • Host nation: Transit takes place through this nation.
  • NATO command structure.
  • EU authorities: Those who are responsible for the administrative and legal issues of troop movements.

Much of the effort sits with member states. Many European allies have already taken initiatives to foster greater mobility. A notable example is the tripartite agreement between Poland, Germany, and the Netherlands to create more fluidity in terms of cross-border procedures in military movements along the corridor that connects all three countries. NATO also is a driving force, both in terms of procedures10 and resources, notably through the NATO Security Investment Program (NSIP). This program has seen its funds annually increase,11 given growing security pressures on the continent. However, the management of this funding remains complex, and recent statements lead us to believe that military mobility is no longer one of the most important spending priorities.“In terms of the total approved program (EUR 5,651 million from 2025 to 2030), the majority of the forecasted expenditure relates to Command and Control – Communications and Information Systems, followed by Basing/Facilities and Petrol, Oil and Lubricants. 12

NATO adds another layer to the planning. In peacetime, JSEC prepares the theater for potential reinforcements; during crises, it coordinates the reinforcement and sustainment of forces by managing a multidomain network of contacts across NATO and the EU, facilitating logistics and cross-border coordination to ensure the rapid deployment of forces. This coordination remains complex. It relies on the voluntary efforts of individual nations, and will also be limited, as some EU states are not members of NATO (i.e., Austria, Cyprus, Ireland, and Malta13).

Finally, the European Union is and will be an increasingly major player in improving military mobility. First and foremost, it relies on the Trans-European Transport Network (TEN-T) program, which is an EU program dedicated to civilian and military use, to plan and develop a coherent, efficient, multimodal, and high-quality transport infrastructure across the EU. TEN-T “comprise[s] railways, inland waterways, short sea shipping routes and roads linking urban nodes, maritime and inland ports, airports and terminal,”14and more; specifically, TEN-T core ports are ideally connected to the surface network. The program has elevated military mobility as a strategic priority. It specifically delegates this issue to several of its offices: the European Defense Agency (EDA), the European Investment Bank, the European External Action Service, and several other commissions and agencies. Numerous initiatives have been taken under EU auspices, such as working meetings, reports, and audits, but a more centralized response stands out as an effort to fully target the problem: the Action Plan on Military Mobility (APMM).

The APMM seeks to eliminate bureaucratic obstacles and fund necessary infrastructure improvements. Despite complex coordination challenges—especially with neutral EU states like Austria, Ireland, Cyprus, and Malta—the collective momentum makes one thing clear: Military mobility is no longer a convenience but a cornerstone of Europe’s defense posture. The EU’s White Paper for European Defense Readiness 2030—its first—identified military mobility as one of the seven capability gaps Europe needs to collectively address urgently.15 At the same time, the newly created Defense Commission has since set up a task force to update the existing APMM. The negotiation of the EU’s multiannual financial framework (MFF) 2028–2034 also opens a window of opportunity to prioritize cross-border, dual-use military infrastructure. Military mobility was already a priority for the EU in its 2017 Strategic Compass,16 leading to the first EU APMM adopted in 2018, following by a second one in 2022. Given that the action plan draws out priorities until 2026,17 the Commission is in a process to develop a new set of priorities for the next multiannual plan.18

This Atlantic Council report looks at four areas that require more European and, most importantly, EU effort to strengthen military mobility:

  • Infrastructure development: Updating existing or, if necessary, constructing new transport infrastructure such as port facilities, railroad, road, and supporting infrastructure.
  • Coordination between the EU and NATO: Better coordinating, sustaining, and employing large-scale forces of the Alliance’s command structure, with the EU acting as an operator.
  • Establishment of requirements for civil-military infrastructure development.
  • Development of norms on legal and diplomatic procedures to ensure seamless movement: Facilitating border crossings for military forces by improving communication and coordination between civil-military actors.

EU-NATO cooperation: Efficiently streamlining activities

JSEC’s first mission in a crisis is to coordinate with the host nations to secure lines of communication, then facilitate the transit of military forces across a network of ports, railroads, airports, and roads called the reinforcement and supply network (RSN) of NATO. Since its creation, JSEC has been the main military mobility stakeholder in NATO, achieving a level of planning detail unseen since the 1990s and taking over as the head of the Allied Movement Coordination Center (AMCC), the operational level of military mobility coordination for NATO.

On the host nation side, things have been much slower, but there has been a clear trend toward taking the issue more seriously at the political level since 2022, in the wake of the Russian invasion of Ukraine. First, in western Europe, armies started to create standing Homeland Defense Commands: e.g., France and Germany regained those capabilities in 2023. Some countries, like Finland, had preserved them. Among other duties, these staff structures are tasked with planning the transit of sending-nation troops on their territory. This is important because host nations’ responsibilities include organizing troop-staging areas and making arrangements to protect, refuel, and feed the different convoys.

The protection aspect is essential because defending critical infrastructure and assets is vital against hybrid threats of sabotage and long-range fires. All these tasks require space, time, and supplies (e.g., food, fuel) that will quickly overwhelm any peacetime logistical system. Nations have also made significant improvements regarding their own movement coordination staff or, when in place and fully functional, through their own National Movement Coordination Center (NMCC). These bodies are specifically tasked with coordinating the air, sea, road, and rail movement of allied troops as a host nation or their own troops abroad as a sending nation. Several countries had not set up NMCCs up until recently, and some have not fully integrated the different movement capabilities. On the opposite end of the spectrum, Poland has recently announced its plan to create dedicated national units for the reception, staging, and onward movement (RSOM) of Alliance units on its soil.

The EU has not created an additional structure for coordinating allied movements in a major joint operation that does not involve NATO. Still, the existence of the Multinational Joint Headquarters (MNJHQ) in Ulm could fill this role, if called upon to do so, as its commanding general is also the JSEC commander. Of note is the existence of Movement Coordination Centre Europe (MCCE), an ad hoc structure that deals with multimodal strategic movement. While relevant during expeditionary warfare and peacetime, it is unlikely to be fit for high-intensity warfare in its current form. While the multiplying of actors from NATO, the EU, and other ad hoc structures is a clear indication that the subject is being taken seriously, it also carries the risk of overlapping responsibilities. On the planning side, the coordination between NATO and the EU has been fruitful, for example between Europe’s TEN-T and NATO’s RSN. However, there are initiatives that should be merged, like NATO’s Multinational Ammunition Warehouse Initiative (MAWI) and a network of logistics hubs dubbed NetLogHubs,19 through a permanent structured cooperation (PESCO) project. The missions and roles of different entities need clarification, and some will need to disappear, while others will have to be streamlined.

Planning and training

Realistically, there is no way to make sure that when the time comes, the marshaling of Alliance troops on the eastern flank will proceed smoothly. General Eisenhower famously said, “Plans are worthless; but planning is everything.”20

In this case, everything depends on the quality of the planning conducted both by the Alliance’s staff and member nations.

Since 2022, the Alliance has overhauled its various war plans, and the military organizations of its member states have significantly improved their respective levels of preparation. For military mobility in times of crisis, the Alliance will activate the reinforcement and supply network, which includes ports, railways, and roads, but also convoy supply centers and hospitals. Until then, it all comes down to testing these plans. NATO training plans now require that movement training is systematically included in every training exercise in Europe. JSEC has also built its own training schedule, which notably includes Exercise Steadfast Dart, focusing on the deployment of the Alliance’s high readiness Allied Reaction Force. Using simulations or war-games, these events involving member nations’ NMCCs are of great added value. For the purposes of planning and training, NATO uses the LOGFAS (Logistics Functional Area Services) suite, whose software tools include resources, ammunition, force structure, and support infrastructure characteristics to enable accurate operational planning. To achieve the best planning results, the accuracy of the data provided by member states (a sensitive subject among certain members of the Alliance) is of the utmost importance. As managing the logistics of a coalition is challenging, the introduction of AI in a LOGFAS successor has the potential to improve its capabilities.

Member nations also have made significant improvements to the thoroughness of their military planning. However, except for countries bordering Russia, it seemed like only defense ministries were concerned about this issue. The next step is achieving a genuine whole-of-society approach to the military mobility equation. Though the current situation is encouraging, the training that has been conducted to date only involves military structures. As previously noted, military mobility in a time of crisis must be a whole-of-government, whole-of-society affair. The next step will have to include the involvement of civilian actors in transport and security, whether they are from other government departments, private-sector entities, or infrastructure stakeholders. It is encouraging to note that in March 2025, France’s Homeland Defense Command hosted HESTIA 25,“21

a tabletop exercise involving the armed forces, civil servants from a range of departments, and private-sector actors. The focus of the event was the role of France as a host nation within NATO and aimed at fostering mutual comprehension among the different stakeholders, while improving planning and learning valuable lessons.

Existing infrastructure of military mobility

Analyzing the efficiency and capacity of major logistical sea and rail routes is paramount to assessing the projected fighting power of the Alliance as well as its capability to take troops to the front lines. In addition, the durability of these routes must be sustained through a developed network of warehousing and stocking facilities throughout Europe.

Figure 3: Core European ports and freight rail network

Sources: Data taken from European TENtec Map

The European ports: Gateways to military power

Most of the Alliance’s fighting power is provided by the United States and transported by sea, making European port facilities key to the success of European military mobility.

The series of connected ports in the Atlantic Ocean and North Sea are the most unlikely to be threatened by an opposing force, due to the projected Alliance’s naval supremacy. These “core ports” are geographically even: fourteen are located on the Atlantic (in France, Spain, and Portugal) and fifteen on the North Sea (in Norway, Sweden, Denmark, Germany, the Netherlands, and Belgium). However, the overall port activity is far less balanced. The ports of the North Sea conducted 75 percent of maritime commercial activity in 2023 (Netherlands, Belgium, France). In 2023, 58.3 percent of commercial activity was concentrated in Dutch and Belgian ports, with 28.4 percent in Rotterdam’s core port and 17.1 percent in Antwerp’s core port. This imbalance creates a vulnerability in terms of the division of logistical efforts because it makes dispersion much more difficult. In addition to physical vulnerability, this overconcentration is making NATO’s logistics planning highly predictable.

This vulnerability is accentuated by China’s investments in European ports. According to the European Parliamentary Research Service,22 China holds 24.9 percent of the Port of Hamburg’s shares and, even more significantly, COSCO Shipping23 owns more than 85 percent of the Zeebrugge container terminal in Belgium and 67 percent of Piraeus Port in Greece, as underlined by a study from the Dutch think tank Clingendael24. Beyond this financial vulnerability, China is currently providing a vast majority of the cranes used in Dutch ports, notably in Rotterdam. An investigation led by the US Congress demonstrated high threats to confidentiality due to illegally installed Chinese modems in said cranes.25As these cranes unload the goods and scan them, it is likely that the cargo manifests of ships will quickly find their way into servers in China. Consequently, on February 29, 2024, the US House Committee on Homeland Security sent a letter to the chairman of Shanghai Zhenhua Heavy Industries Company, asking for clarification.

Railways: The artery of military mobility

Trains are the only ground-transportation mode capable of sustaining long-lasting and high-intensity conflict. In most European countries, the state and its armed forces maintain close ties with the major railroad companies. For instance, the three biggest European railroad operators26. are still 100 percent owned by their respective countries and the armed forces remain important clients. This relative autonomy is reinforced by the recent European TEN-T policy aimed at developing cooperation and the intermodality of national rail networks. This policy focuses on nine key corridors crucial for military mobility.

Table 1: Rail corridors crucial for military mobility

 Corridor name
1Atlantic
2Baltic Sea-Adriatic Sea
3Mediterranean
4North Sea-Baltic
5Baltic Sea-Black Sea-Aegean Sea
6Western Balkans-Eastern Mediterranean
7North Sea-Rhine-Mediterranean
8Rhine Danube
9Scandinavian-Mediterranean

Despite a strong will to establish coordinated governance over these corridors, there are still some challenges hampering the flow of military mobility. The first set of improvements are needed at the national level (and could be streamlined by standardization):

  • Dealing with who or what is traveling: Some countries, like Germany and Austria, do not allow the circulation of mixed trains, meaning trains that transport both troops and equipment.
  • Engine interoperability: Due to differences in railway safety systems and signaling, one country’s engine can only tow a train on its own national network, thus requiring an engine shift at each border crossing.
  • Notice necessary for a foreign train to cross a border: Before February 2022, Poland required one month of notice during peacetime and five days during wartime.27 Despite the dissemination of dedicated Response Measures,28 this question of notice has been a thorn in NATO’s side, including when deploying its Very High-Readiness Joint Task Force between 2003 and 2024.

The second set of improvements is strictly systemic. Germany lies at the core of European military mobility. Accordingly, its railway network is the most developed on the continent. But, when it comes to freight, its network is already overloaded with brown coal convoys, which mainly move at night and are essential to fuel coal power plants. In this area, military mobility is linked to Germany’s domestic policies.

The third and last set of improvements needed are in the technical realm. Most modern military fighting vehicles have gotten heavier and bigger due to enhanced protection and firepower needs. This change makes rail transport more difficult, as most flatbed wagons were designed for smaller Cold War vehicles. Similarly, some key rail infrastructures, such as tunnels and bridges, might not be adapted to these new vehicles’ dimensions. For instance, before the launch of a modernization program named Scorpion in the 2010s, only four French military vehicles were considered oversize load. Now, most are.

On the other hand, modern civilian trains and engines are also not adapted to military needs because dual-use requirements had disappeared when they were engineered. Some cannot be efficiently adapted to war use,29 while older, dual-use models are too expensive to modernize: The average cost of modernizing one railcar is around €400,000 ($466,480). Fortunately, some countries are investing again in this area: For example, the Polish Army, which has been highly dependent on railways to ensure its strategic mobility, invested in heavy platforms and ramps in 2018 and 2019.30 Moreover, certain parts of the European rail network also lack sufficient electricity, with only 56 percent of this network electrified in 2021.31

Additionally, signaling is only slowly being standardized, preventing trains from crossing borders without having to switch the engine. The European Rail Traffic Management System initiative, launched in the 1980s, is a common effort toward a unified railroad network, but the project is making very little progress. Only 17.3 percent of the nine TEN-T key corridors are equipped with interoperable signaling systems and only 13.6 percent of the sensitive North Sea-Baltic, North Sea-Rhine-Mediterranean, and Atlantic corridors are equipped.

Given the range of improvements needed, Europe could further support the standardization of dual-use European rail cars for the transport of personnel, wounded people, and equipment. (See recommendation 1.)

Strategic air mobility: Enabling NATO’s first response

Strategic air mobility is a cornerstone of NATO’s deterrence and rapid response, offering unmatched speed and flexibility—but it also is vulnerable. In a crisis, air transport enables quick deployment of light forces and equipment, but once air superiority is contested, its role shifts to moving personnel, with heavy gear transported by sea or rail. The majority of NATO’s strategic airlift capacity comes from the US Air Force. While European allies operate Airbus A400M transporters and take part in multinational efforts like the Strategic Airlift Capability initiative, they remain reliant on US assets, especially for oversized cargo. This imbalance is worsened by limited aerial refueling and reliance on a few critical hubs such as the Ramstein and Brize Norton air bases in Germany and the United Kingdom, respectively. Many European runways cannot handle large aircraft, and civilian airports pose security risks. Strategic airlift also depends on ground infrastructure and legal access rights.

Europe’s continued reliance on chartered Antonov AN-124 aircraft through the Strategic Airlift International Solution framework exposed vulnerabilities in its strategic airlift policy. Following the withdrawal of Russian operators between 2018 and 2022, what remains of the Ukrainian fleet is facing mounting maintenance challenges after losing access to Russian-produced spare parts. Though the European Air Transport Command has improved tactical coordination, it lacks the mandate and resources to manage strategic movements. Despite being less visible than ground logistics, strategic air mobility remains important to NATO’s initial response in Europe.

Stocks and warehouses: The fuel of military mobility

During wartime, a network of fully stocked warehouses is crucial in maintaining the vitality of logistical activity, with fuel, ammunition, spare parts and even vehicles directly available. Being able to position reserve equipment in strategic locations is essential to quickly react to any contingency. While the notion of prepositioning military stocks itself triggers some sovereignty issues, this strategy is critical to absorb the first blow of the enemy. The relatively small size of the European continent does not alter the pertinence of this principle, which is why, at Belgium’s urging, NATO launched Multiannual Warehousing Initiative (MAWI) in 2021. This high-visibility warehousing project aims to organize the stocking of ammunition close to the anticipated front lines. As of June 2023, twenty-three allies had joined. However, support for this project has been mitigated by its clause regarding ammunition consumption in wartime, wherein the host nation can use nonnational ammunition stocks and refund them retroactively, a highly sensitive matter when it comes to precious and not-easily procurable ammunitions like 155 millimeter shells.

Although pertinent, this project only concerns ammunition, not battlespace management. For instance, a divisional support group requires a 400 km2 area to set up. Given the growing transparency of the battlefield of modern combat, military logistics will have to rely on a deconcentrated civilian warehousing network. In the absence of an ambitious strategic project regarding EU military stock prepositioning, identifying this network and preparing the legal aspects of requisitions could be a step toward a strategic approach to military commitment on European soil.

Without forestalling sovereignty delegation, the EU could help identify civilian warehouses that could be requisitioned in wartime. (See recommendation 2.)

Future of US force projection in Europe

The United States maintains an organization under the 21st Theater Sustainment Command (TSC) to provide theater sustainment in Europe, a practice begun in the beginning of the Cold War. It is the lead organization for the sustainment activities of the US Army Europe and Africa (USAREUR-AF). Currently the US Army’s largest forward-deployed formation, its very presence functions as a deterrent against potential adversaries.

First, the 21st TSC guarantees the smooth reception, staging, onward movement, and integration of incoming US units, leveraging its maintenance and mobility support units to accelerate force deployment. If called upon to do so, it can dramatically increase the throughput of ports, rail networks, and airports anywhere in Europe, ensuring that troops and equipment reach their respective operational area without delay.

Second, it provides sustainment for initial US forces through a vast network of depots and prepositioned stockpiles, demonstrating the ability to surge forces anywhere in Europe without relying on ad hoc logistics. Finally, the 21st TSC’s overarching mission is to sustain the USAREUR-AF at the theater level, guaranteeing that deployed forces remain effective throughout the campaign.

US deterrence and the credibility of the transatlantic security guarantee are fundamentally reliant on the 21st TSC’s ability to project, sustain, and surge American forces rapidly. In essence, US deployment is inseparable from “Team 21” and its unique logistical capabilities, which may be put under stress by the new US defense posture. As the US posture evolves, NATO must ensure the credibility of its power projection structure remains credible.

Prioritizing and streamlining infrastructure requirements

The infrastructure requirements issue stands at the crossroads of two contradictory dynamics. On one hand, NATO has the best assessment on military logistic needs and the fastest planning process. On the other hand, upgrading mobility infrastructures—used for civilian purposes in peacetime—is a long-term national and civilian prerogative. In this context, the EU’s normative power has a key role to play in organizing the meeting between the operational military requirements and harmonized, communitarian infrastructure development. In that framework, the EU APMM appears to be the best vector to enhance cooperation between NATO and the EU.

An EU strategy to achieve continent-wide effects

The EU APMM, first signed in 2018, has provided a strong incentive for member states to upgrade their infrastructure. The previous action plans have led to significant improvements, but their limited budget prevented them from achieving any broad strategic objectives. The two successive action plans, in 2018 and 2022,32 were shaped by the war in Ukraine, prompting an acceleration, which was also emphasized in the Strategic Compass published the same year.33Approximately €1.7 billion was allocated under the 2021–2027 MFF,34 but a significantly larger, more strategically directed budget could be earmarked in the coming year.

The military scope of selected APMM projects still requires refining. Decision-making is a major issue in the process. It is difficult to understand why some projects receive more money and others do not. Ultimately, 70 percent of selected projects concern land mobility by rail or road, with 81 percent of budget allocated. A major issue is that the selected projects directly support movements within the borders of the applicant countries, with only two of the ninety-five projects selected involving cross-border infrastructure.35 Moreover, the locations of the selected projects show wider distribution in the eastern part of Europe, with Germany, Poland, Lithuania, and Latvia, respectively, in the top four places among the countries that received funding from the action plan. As a result, it remains challenging to assess the overall contribution of these projects to military mobility on a continental scale.

From a geographical perspective, the distribution of APMM-funded projects has favored northern and northeastern Europe. Strikingly, Romania is the only southeastern European country to have benefited from the mechanism, and even then, it ranks only eleventh overall. This imbalance is a systemic weakness in terms of military mobility. It naturally leads to a concentration of flows toward the North, which will rapidly lead to the saturation of lines of communication and greater chances of sabotage due to the geographical concentration of flows. This trend is further underscored by the fact that none of the projects put forward by Greece have been selected.

Instead of merely validating national proposals, the EU should define a genuine strategic framework for military mobility, prioritizing cross-border projects and ensuring that neglected but critical regions are not left aside. (See recommendation 3.) It also entails working more closely with NATO when setting priorities and awarding funds, to reinforce the overall coherence of the network. (See recommendation 4.)

Better cooperation between the EU and NATO would improve the project selection process and give a more strategic dimension to the actions implemented. This assessment must play a greater role in the project validation process to ensure coherent and redundant mobility, to more easily compensate for any regional shortcomings.

Process and budgetary improvements

A study of the current complex EU application process is conducive to imbalances since candidates will invest in this process with varying levels of intensity. In the wake of reviews from the 2021, 2022, and 2023 calls for applications, questions should be raised about the relevance of the process, as it exists today. The selection process involves two phases, one conducted by the European Climate, Infrastructure, and Environment Agency and the other by the Directorate-General for Mobility and Transport. The first phase consists of an independent evaluation report by three experts, followed by a consensus evaluation report from the same experts. In the second phase, the military evaluation is carried out by the European Union Military Staff (EUMS), followed by several internal assessments, and then a final meeting to arrive at a shortlist of projects.

Efforts should be made to clarify and streamline the current mechanism, as highlighted in the European Court of Auditors’ report on EU military mobility.36 Currently, the strategic assessment of infrastructure renovation needs is largely reduced to a single microstep, carried out by the EUMS, in the middle of an administrative mille-feuille. The EU should renovate its application process to include a one-stop, lead decision-maker, which could help implement a better overall strategy. The applicant information should also be supplemented by details of other financing methods. Whether we are talking about direct financing from the Connecting Europe Facility (CEF) or financing purely military infrastructures through the NSIP, efforts must be made to educate all nations participating in the EU and/or NATO, to achieve continental-scale military mobility effects. (See recommendation 5.)

More generally, the EU’s budget for military mobility is insufficient. After an assessment phase from 2021, member states could submit project applications for funding to upgrade dual-use infrastructure. Precipitated by a downward revision, EU funding quickly dried up, as the last call in 2023 exhausted the allocated funds. A total of ninety-five projects were supported by this mechanism, which will ultimately refund 50 percent of the expenditure incurred by states. With an average value of €18 million, each project is expected to be delivered before the end of the EU multinational financial framework,37 which should enable assessment of the mechanism’s effectiveness by 2027.

The amount of funding should not be such a rapidly limiting factor in terms of overall strategy. If we return to Greece, each of its two submitted projects obtained scores that enabled retention in the final ballot, but funds dedicated to the APMM were exhausted before these projects could be financed. This is regrettable, given that the lines of communication linking Greece to Bulgaria and Romania are already being used intensively, and it is a safe bet that in the event of mass deployment, this network would be insufficient.

More generally, the budget allocated to the APMM appears to be poorly directed and too small to provide a comprehensive response to the issue of military mobility on a continental scale. First, part of the budget should be dedicated to large-scale projects that go beyond the national framework and aim to achieve an objective strategic rebalancing on a European scale. Second, the overall budget needs to be increased to consider inflation in construction costs and to avoid holding back microprojects whose overall impact is difficult to measure. The EU should dedicate part of the APMM budget to large-scale projects, targeted by the EUMS to bridge identified capability gaps. (See recommendation 6.) At the same time, it needs to increase the budget dedicated to the APMM to guarantee funding for large-scale projects and prevent the premature drying up of funds, leading to strategic imbalances. (See recommendation 7.)

Feedback should also contribute to better targeting problematic infrastructures. Whether we are talking about flows resulting from support for Ukraine or those deliberately provoked as part of multinational exercises, lessons must be learned to pinpoint military mobility problems linked to dual-use infrastructure. Some lessons seem to have been learned already from Russian aggression, such as the financing by the CEF of standard gauge railroads in Ukraine between Chop and Uzhhorod, but more needs to be done. If Atlantic Resolve38 operations were to make greater use of rail, the difference in rail gauges between Spain and the rest of Europe should encourage the EU to take up the issue of Spain’s network conversion to standard gauge. It is therefore crucial to update the APMM’s guidelines and prioritize the actions to be taken in the light of completed missions. The EU should include a list of operational shortcomings related to dual infrastructures in the joint EUMS/NATO assessment, to encompass the full spectrum of multinational missions in Europe. (See recommendation 8.)

On these two fronts, the EU could take the lead by organizing a dedicated seminar on infrastructure related to military mobility. This event should be jointly hosted by the European Union Military Staff, with active support from NATO stakeholders, to raise awareness of existing funding mechanisms and emphasize the importance of national involvement. The target audience should include representatives from transport ministries and armed forces, fostering greater synergy between civilian and military actors and encouraging more coordinated strategic planning across member states. (See recommendation 9.)

Leveraging civilian resources

The current role of the private sector in military mobility

Being able to access the massive pool of civilian transportation vehicles is a tempting way to improve military mobility in Europe. Since a quick surge in the number of military transport fleets is unlikely, it could be the quickest option available. There are two different approaches to using the private sector: through contracts or requisitioning. The latter calls to mind various legal tools enabling states to legally appropriate resources, assets, and services if no other solutions are immediately available. Although this policy exists in Europe, there are significant process variations across countries. Notably, requisitioning has fallen out of fashion since the Cold War. With the return of war on the continent, however, nations are updating their legislative arsenals to become more efficient in times of crisis. That said, tapping the private sector is not a panacea.

The private sector has had an enduring role in warfare. No matter the period, it has played a significant role in military logistics.39 The success of those endeavors relied heavily on comprehensive planning: Plans were thoroughly tested and routinely revised to stay relevant. The most recent reference in Europe is the Cold War, where both sides planned to rely on requisitions to expedite mobilization, quickly transport hardware and supplies, and boost transport capabilities. Civilian and military offices were engaged in a constant inventory of not only civilian truck fleets but also buses and civil-engineering vehicles—with the tallies, locations, and statuses constantly tracked and updated. Civilian airlines and maritime transport companies made arrangements to enable use of their respective assets on short notice to directly support their country’s armed forces. Given the sheer scale of logistics in peer-to-peer warfare, there will never be enough military vehicles to support this kind of massive effort.

Since the end of the Cold War, the civilian sector dramatically shifted to occupy a contracting role, without any notion of requisition. Western armies themselves encouraged this evolution, deliberately reducing their own heavy logistical assets and increasingly outsourcing functions to civilian providers. The subsequent rise of expeditionary warfare also meant that logistics were essentially static as ammunition consumption remained low, as did human and material losses. Western armies became accustomed to this logistical comfort.

Three years after the Russian invasion of Ukraine, several important realizations have slowly surfaced. First, in the case of major conflict, military mobility alone is insufficient to enable the transport of forces across Europe in a timely manner. Armies lack the number of trucks needed to transport equipment and resources, but the same goes for heavy equipment transport (i.e., trucks able to move main battle tanks) or flatbed railcars, which are mostly owned and operated by civilian companies. This leads us to the second point: The contribution of the private sector will be essential if we want to reach the scale that is required to move and supply a significant military force in Central Europe. The final realization is that mobilization has become an increasingly rare practice, and contemporary governments are often unfamiliar with the full range of capabilities and tools it affords.

Countries are revising old laws. In France, the law mandates that construction, bus, and truck companies must establish and update inventories of their vehicles via a web portal. However, most companies are simply unaware of these legal requirements. A partial conclusion is that mobilization is not an exclusively military issue. Private companies need to be made aware of their obligations and must be involved in current discussions regarding planning and policies. Political impetus is crucial for these processes to be completed successfully, as is testing to ensure the effective functioning of requisition processes. Set up national-level, regular vehicle-mobilization training events involving private companies,40 to check inventories and ensure the validity of the process. (See recommendation 10.)

An unequal modernization

European countries have unequal histories and development and various contexts of mobilizing civilian assets. While European countries have been highly active since 2022 to update their laws,41they are not all at the same level of progress. Most have achieved significant legislative progress, but there is a lot left to do. Also of note, apart from Sweden and Finland, military mobility is considered a purely military issue. However, the need to involve civilian stakeholders from both the public and private sectors is obvious. Most national plans state that transferring massive forces to the front lines will be a “whole-of-government, whole-of-society task.” What remains is translating this buzzword into solid facts, actual plans, and realistic training. Nationally, European countries should foster a whole-of-government approach to military mobility to develop robust relationships between ministries. The EU could fund studies of various European national approaches to civil-military relations to establish a set of lessons learned. (See recommendation 11.)

Take France, Germany, and Sweden, for example, which pursue diverse approaches to civil-military relations—adapted to the specific national context. Since 2023, the French Military Programming Law for the 2024–2030 period has allowed the prime minister to proceed with requisitions and even to delegate that power to both civilian and military authorities. More importantly, this new law expands the cases qualifying for requisitions to include the first stages of a crisis and not merely during war scenarios. It significantly enlarges the scope to become something much more adapted to hybrid warfare.42The result is a significant improvement in the speed at which the French government can respond to unforeseen circumstances, improving deterrence.

As the biggest country in Central Europe, Germany is a nexus of military mobility. Its legal arsenal dates to 1968 with the passage of its Economic Security Assurance Act. Dubbed WiSiG,43 the act laid out its economic mobilization processes in times of both tension and war. These laws have not been altered since then and do not cover the requisition of transport means for the direct benefit of the military, instead focusing on the security of the economy. Although not as advanced as other countries, Germany started to actively plan for its role in a major conflict in 2022. In 2024, Germany started communicating about OPLAN Deutschland, its classified plan to organize the deployment and transit of up to 800,000 NATO soldiers with their 200,000 vehicles and associated logistics across the entire country. As host nation, it is Germany’s role to provide troops with places to stop, rest, and access spare parts, equipment, and fuel. Inevitably, these plans must involve the private sector. To this day, however, there is no sign that Germany plans to resort to requisitioning to achieve its desired results, opting instead for extensive planning of a massive contribution from the private sector.

Sweden has one of the most comprehensive mobilization systems in Europe, rivaled only by Finland. In times of crisis or conflict, Sweden can mobilize civilian resources for both civilian and military needs. Local and regional authorities and the private sector are included in the mobilization planning process. There is an existing legal framework for requisitioning civilian transport assets: buses, trucks, ships, and planes. Both regional and interregional transport systems are merged in military logistics to be used most notably for evacuations and conscript transport. Essential dual-use infrastructures like ports, rail terminals, and airports can also be used and even modified to better suit military needs. The new Total Defence Bill for 2025–2030 (signed in 2024) has modernized and updated the different rules enforced in times of crisis or war, but the Swedish government has stated there is still a lot to do. Sweden is currently looking to revive its Krigsviktiga-företag concept, 44 which designated specific companies whose mission was to maintain their strategic activities even in the case of war and the breakdown of their regular supply chain, thanks to additional stocks and higher readiness. Relying as it did on financial incentives, this system did not survive recent waves of privatization, globalization, and European rules on competition.

Priorities in the private sector-military relationship for strategic mobility

Militaries must factor in the involvement of the private sector given the gigantic size of the task required by mobility in times of war. However, relying exclusively on the private sector is not a panacea as there are areas where the needs of the military and civilians simply do not overlap. Road transportation is the private sector’s most obvious potential contribution. Trucks carry almost 80 percent of all freight transported over land in the European Union, with a truck fleet of around 6.4 million units.45The biggest fleet is Poland’s (1.4 million), followed by Germany and Italy (900,000 each), and then France (600,000). Overall, 700,000 buses are in operation across the EU, almost half of which can be found in three countries alone: Poland (130,000), Italy (100,000), and France (95,000). On paper at least, the resources are there to allow for a quick surge in capacity if need be; but the reality is more nuanced.

There are significant differences between civilian and military logistics. Truck companies use pallets to load and handle goods (the share of container transport in road transport is only 6 percent46), whereas the current military standard is the 20 foot container. The proportion varies greatly depending on the country in question, but on average, only about 20 percent of trucks can handle these containers. Transshipment between strategic and tactical transport would entail a loss of time and effort that would have to be addressed with proper staffing or contracts, further increasing the need for container-handling equipment. European countries, including through the EU, could identify key transport companies and encourage them to use container-compatible equipment. (See recommendation 12.)

Additionally, there is a concern about the dispersal of truck drivers in western Europe for a massive transport fleet. A significant portion of the drivers employed by transportation companies are not nationals and many third-country drivers come from Central Europe. Thus, there is a significant risk that these foreign drivers will answer the call of duty in their own country in a time of crisis. Companies will have to report honestly on these topics if any serious survey initiative is to be successful.

Furthermore, the European Union is facing a looming crisis in road transportation due to the current shortage of truck drivers. This shortage is evaluated at around 250,000 positions today and could triple in 2028 because a third of truck drivers are over the age of fifty.47

Rail is the other area where the private sector’s role will significantly reinforce military mobility. It would be tempting to think that we could easily employ civilian rolling stock for mobilization, but as is the case with road transport, what stands out are the different civilian and military needs.

Even thirty years after the Cold War, most armed forces still possess rolling stock to transport their hardware, but the current number is nowhere near enough to transport entire divisions. On the civilian side, while flatbed railcars are available in large numbers, they are unfortunately not suitable for transporting military vehicles, as they are too high and narrow and few of them are suitable for transporting standardized, reusable containers. Power sources could also become a problem as electric engines become more prevalent across western Europe. However, the lower level of electrification in Central Europe, along with the greater vulnerability of electric lines to sabotage and damage, all make it dangerous to rely solely on electricity. European nations should identify a European budget for the development and acquisition of a standardized military flatcar. (See recommendation 13.)

The relationship between railway companies and the armed forces is a key factor in ensuring that military trains function smoothly. Some companies have teams dedicated to military trains, and exchanges between the highest levels of the armed forces and their CEOs are frequent. However, the liberalization of the rail sector within the EU has introduced significant weaknesses to military railway transport because the needs of the armed forces are so specific that few companies are ready to work with them. As a result, it’s usually the “historic” national operators that bid for contracts involving loading and driving trains for the military, but even this relationship is currently jeopardized by excessive regulation. For instance, Poland is currently in the process of buying new military rail stock from its historical operator, PKP Cargo, but is worried that the move could be classified as unauthorized public aid under EU competition law. European countries could take measures to make European investment rules more flexible on military mobility issues. (See recommendation 14.)

From a human resources standpoint, mobilized workers will have to be prepared. Warfare is evolving, and the relative safety of the rear area of the theater of operations is slowly fading with the proliferation of long-range assets. Proper preparation is crucial because, although civilian drivers face lower risks than combat troops, their exposure remains considerable. Being able to provide volunteer drivers with a suitable military status that will negate their right to withdraw could be a solution. Nations could assess the interest in a transportation reserve that would be used as a pool for military strategic transportation. (See recommendation 15.)

Finally, yet importantly, the world has changed since the Cold War, and global supply chains have shifted how we produce and consume resources. European citizens today rely on a delicate logistical web that makes food grown thousands of miles away available. Even after the COVID-19 pandemic, we live in a world of just-in-time deliveries and minimal stocks. Any brutal change in that web could have dire consequences for the civilian population. Proper planning must consider that a sizable portion of the civilian transportation fleet will be essential to maintain that chain.

Although the requisition process is an act of supreme authority that comes from the state, there must always be compensation provided to the owner. This means that massively resorting to it will not be cheap, especially when considering the damage and destruction to which those assets would be exposed. None of these factors are insurmountable, but it does mean that, as always, planning is essential—not only preparing minds and processes but also adapting the hardware. At the national level, armed forces will have to express their specific needs to the private sector, including initiating discussions with transport and railway companies, several years before a crisis starts to loom, to ensure that everything works as planned when the time comes.

From outsourcing to dependence: The integration of the private sector in the logistical optimization of armed forces through AI

The scarcity of resources, the complexity of equipment, and the omnipresence of intelligence, surveillance, and reconnaissance have transformed warfare into a system where data constitutes one of the most critical fuels.48. In the field of logistics, tasks such as inventory tracking, constrained flow coordination, and data compilation represent major challenges, consuming significant human resources. To address this, NATO relies on logistics information systems such as Logistics Functional Area Services (LOGFAS), which enable real-time tracking of inventory, transportation assets, and expressed requirements.

However, artificial intelligence now emerges as an indispensable enabler to optimize not only these activities but also the use of all necessary resources. The term “resource” should be understood here in its broadest sense. Requisitioning would prove not only administratively complex to implement but also cognitively unmanageable without large-scale data processing capabilities. In the realm of military mobility, the prospects offered by AI seem almost limitless, yet they largely remain beyond the reach of armed forces in terms of data management and computational power.

Given this capability gap, armed forces are turning to specialized companies, generating long-term dependencies. Technological giants such as Google, with its data storage and sharing capabilities, 49or Amazon Web Services (AWS), with the optimization of asset allocation50

and resource management, 51 illustrate some of the possibilities. Some armed forces have already entrusted the management of their operational data to such private actors.

On a broader scale, NATO announced on March 25, 2025, the adoption of the Maven Smart System NATO, developed by Palantir, to equip Allied Command Operations. This AI platform aims to accelerate battlefield decision-making by fusing multisource data. In the specific field of military logistics, Palantir collaborates with Rune Technologies to integrate TyrOS, software designed to transform current logistics processes into intelligent supply networks. This system enables the prediction of future needs, the optimization of available resources, and the facilitation of decentralized operations, even from a laptop in a hostile environment.

Other solutions are under exploration, such as the European Defence Operational Collaborative Cloud at the Alliance level, or Artemis.IA, developed in France. However, this diversity of initiatives presents a challenge: Despite the undeniable contribution of AI in supporting military mobility, competition among private actors and the dispersion of efforts are slowing progress. As customers, the armed forces have little leverage to influence this dynamic. Furthermore, AI raises additional issues, ranging from data compatibility and information sovereignty to resilience against cyber threats.

While the potential of AI for military logistics and mobility has been widely discussed, few significant breakthroughs should be expected in the near term. Such a revolution cannot occur without prior harmonization of standards and methodologies, as well as convergence of perspectives on the security issues inherently linked to the use of artificial intelligence.

The holy grail of a military Schengen area

Streamlining administrative hurdles

The Schengen area permits the seamless movement of people and goods across the borders of different countries. Citizens can travel without passports from Portugal to Poland, never stopping for border control. But for armed forces to move a significant number of troops across allied territory in peacetime, there are complex steps to follow called cross-border movement procedures (CBMP). Standardization is one of the EU’s greatest powers, yet it has failed to iron out these problems. The main issue seems to be that many countries add their own layer of national regulations and paperwork, even though the EU form alone is “officially” enough. On the one hand, NATO is obviously the main client of military mobility. On the other hand, the EU is the main regulator across the continent and already provides funding and executes programs to enhance the infrastructure and border-crossing processes. Some improvements could be made in the following areas.

The first step is that the nation that allied forces want to move into must grant a movement credit that gives authorization to use its roads during a specific timeslot. Depending on the country and situation, the delays can be very long, especially if a force intends to move across several countries. This is because typically civilian authorities grant (or deny) movement credits. Some countries like Germany and France have decentralized their respective processes to regional offices, which causes further delays and complexity. Nowadays, Poland has a much more efficient process because the Army has been given the power to grant movement credits.

Next comes the preparation of the proper customs documentation for border crossing. This requirement appears simple enough: a single form for multiple border crossings. Both NATO and the EU have their own form and while close in content, only the NATO form is digitized. Each country also can (and often does) request additional paperwork. The EU could streamline the process by expediting the digitization of EU 302 Form. (See recommendation 16). Some countries add yet another layer of difficulty by requiring diplomatic clearance to cross.

The number of military organizations that deal with the different aspects of mobility can also be quite overwhelming for the sending nation. Depending on how a force is moving, the host nation might have several entities that will grant, plan, or execute the movement. Integrating these into national military command centers is key. Enforce a standard for NMCCs that integrates all modes of transportation and centralizes the granting of movement credits. These structures could also be supported by JSEC and MCCE to improve their readiness. (See recommendation 17.)

The transport of dangerous goods (e.g., ammunition and explosives) in the military domain has also become a complicated issue, due to a core series of EU regulations augmented by national restrictions. This is particularly significant for the southern strategic corridor. The European Defense Agency has made recommendations for the transport of dangerous goods in the military domain, but they are not mandatory. Streamline restrictions on dangerous goods transport across the EU for military purposes. (See recommendation 18.)

Developing specific corridors

Both at the political and military levels, cooperation between the EU and NATO exists across several points of contact. Regarding military mobility, the main one is through NATO’s Logistics Action Plan.52 On the administrative side, NATO and the EU are working hard to resolve the different issues. The urgency of the situation means that both parties are regularly exchanging information and requirements. Several projects are showing promise to reach NATO’s prerequisites for enabling and deploying large-scale military formations within seventy-two hours. Among them is the Secure Digital Military Mobility System (SDMMS), which will allow the direct and secure exchange of information between EU member states and dramatically accelerate approvals of CBMPs. Eventually, this software will also cover customs.

Another aspect to improving border crossing is the ability to get a train directly from a country to its destination without changing the engine at each border crossing. Standardized security systems like the European Rail Traffic Management System will greatly help with this endeavor, but it will take decades to finish developing the needed railway equipment and rolling stock. Despite the efforts of the different actors, most notably the EDA and NATO, progress on a “military Schengen” has been very slow so far; an intermediate solution is relying on bilateral and multilateral agreements to advance on this issue. In March 2025, the European Council identified four priority corridors: Northern, Central Northern, Central Southern, and Eastern Corridors,53 which European member states are striving to support and streamline.

Practically, these corridors are unfolding in minilateral groupings, the first of which was formed between Netherlands, Germany, and Poland, with a letter of intent signed January 30, 2024. The three countries are all major stakeholders in military mobility, due to the size of their ports and their geographical location.54During the NATO Washington summit in 2024, Albania, Bulgaria, Italy, and North Macedonia signed a corridor agreement.55

Turkey, Romania, and Bulgaria signed a letter of intent in October 2024, while Romanian and Bulgarian defense ministers signed a memorandum to establish a regional special operations command center which will plan and manage the Alliance’s special operations forces in the Black Sea region. In November 2024, the Nordic countries (Denmark, Finland, Sweden, Norway, and Iceland) signed a letter of intent stating their willingness to create such a corridor. 56.Also that month, Bulgaria, Greece, and Romania signed a letter of intent for a corridor that would permit direct access to southern Europe via the maritime port of Alexandroupolis.57

These various planned corridors could provide a blueprint for the future look of European military mobility.

These military mobility areas could theoretically allow for significant improvements and facilitate the movement of military forces between the different nations involved, as well as offer helpful options to transfer forces between northern and southern Europe. The additional corridor between Italy, Slovenia, Hungary, and Romania would potentially keep the road to Romania open in case of a blockade of the Eastern Mediterranean. Unfortunately, stringent regulation regarding the transport of hazardous material in Italy, in total disregard of EU regulations, could dramatically downsize the impact of this initiative.

Notably, these “corridors” are only an administrative development and have not improved infrastructure, as is often incorrectly portrayed. Nevertheless, the Netherlands-Germany-Poland initiative has the potential to become the model for streamlining cross-border procedures, if and only if its successors adopt the exact same requirements. Otherwise, we will end up with a dozen corridors, each with its own specific procedure.

Conclusion and recommendations

Given current geopolitical circumstances—despite the time required to update legislation in Europe, revise the Military Mobility Action Plan or design the EU’s multiannual financial framework 2028–2034—the EU should focus on enacting prompt, rapid solutions, many of which are outlined in this report.

The delays in developing military mobility should encourage every actor to keep prioritizing the issue. An economic reality as well as a military one, mobility is a perfect subject to become one of the first building blocks in the development of European strategic autonomy.

Recommendations

  1. Support the standardization of dual-use European rail cars (transport of personnel, wounded people, and equipment).
  2. Identify civilian warehouses that could be requisitioned in wartime.
  3. Define a genuine strategic framework for military mobility, fostering cross-border projects and ensuring that neglected but critical regions are not left aside.
  4. Work more closely with NATO when setting priorities and awarding grants to reinforce the overall coherence of the network.
  5. Renovate the EU application process to include a one-stop, lead decision-maker, to help implement an overall strategy; and strive to educate all nations participating in the EU and/or NATO, to achieve continental-scale military mobility effects.
  6. Dedicate part of the APMM budget to large-scale projects, targeted by the EUMS and NATO to bridge identified capability gaps.
  7. Increase the budget dedicated to the APMM to guarantee funding for large-scale projects and prevent the premature drying up of funds, leading to strategic imbalances.
  8. Include a list of operational shortcomings related to dual infrastructures in the joint EUMS/NATO assessment, to encompass the full spectrum of multinational missions in Europe.
  9. Organize a seminar on infrastructure linked to military mobility, jointly organized by the EUMS and NATO, to inform participants of existing funding mechanisms and the need for nations to be involved. To encourage synergy, the audience should include representatives of transport ministries and armed forces.
  10. Set up regular mobilization training events involving private companies.
  11. Nationally, foster a whole-of-government approach to military mobility in order to develop robust relationships between ministries.
  12. Identify key transport companies and encourage them to use container-compatible equipment.
  13. Identify a European budget for the development and acquisition of a standardized military flatcar to facilitate mobility by rail.
  14. Make European investment rules more flexible on military issues.
  15. Nationally, assess the interest in a transportation reserve that would be used as a pool for military strategic transportation.
  16. Expedite the digitization of EU 302 Form.
  17. Enforce a standard for NMCC that integrates all modes of transportation and centralizes the granting of movement credits. Those structures could also be audited by JSEC and MCCE to assess their readiness.
  18. Streamline the restriction on dangerous goods transport across the EU for military purposes.

Acknowledgements

This publication was funded by the European Union. Its contents are the sole responsibility of the authors, and do not necessarily reflect the views of the European Union. An earlier draft of this study was submitted as part of the European Commission’s targeted consultation on the military mobility package.

Explore the program

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    Marcin Zaborowski, General Pavel Macko, and Karin Filkászová, Roads to Readiness: Military Mobility Infrastructure on NATO’s Eastern Flank, Globsec (think tank), June 13, 2025,
https://www.globsec.org/what-we-do/publications/roads-readiness-military-mobility-infrastructure-natos-eastern-flank.
2    Among Europe’s four largest armies—France, Germany, Poland, and Italy—the number of armored vehicle-launched bridges is very low. These systems, which enable armored or mechanized units to cross craters, ditches, small rivers, or rail tracks, are critical for mobility. Bridge-laying remains one of the most demanding missions for armored divisions, and current capabilities are uneven across these armies.
3    Military rail-repair capability is almost nonexistent in the Alliance. Only Italy has preserved this capacity with its active duty Reggimento Genio Ferrovieri, which is composed of five companies. Germany disbanded its rail engineer regiment in 1990, as did France in 2010. Even in the US Army, this capability is now held by a reserve unit.
4    The ratio of air defense artillery battalions per brigade is low across Europe, except for Germany, which has a ratio of air defense artillery per battalion higher than the US Army.
5    “Finland Hails Plan for Allies to Join NATO Land Forces on Its Soil,” Reuters, June 25, 2025, https://www.reuters.com/business/aerospace-defense/finland-hails-plan-allies-join-nato-land-forces-its-soil-2025-06-25/.
6    “France to Send Thousands of Troops to Romania for Major NATO Military Drills,” Radio France Internationale, October 10, 2024, https://www.rfi.fr/en/international/20241010-france-to-send-thousands-of-troops-to-romania-for-major-nato-military-exercise. Germany plans to permanently station 4,800 troops in Lithuania by 2027.
7    Ned Davies, Joshua Cheetham, and Matt Murphy, “Russian Naval Ship ‘Disguised’ Itself while Passing through English Channel,” BBC Verify, June 24, 2025, https://www.bbc.com/news/articles/c62gq6y62d1o.
8    “Statement by the North Atlantic Council on Recent Airspace Violations by Russia,” NATO, last updated September 23, 2025, https://www.nato.int/cps/en/natohq/official_texts_237721.htm.
9    The summit declaration specifies “1.5% of GDP annually to inter alia protect our critical infrastructure, defend our networks, ensure our civil preparedness and resilience, unleash innovation, and strengthen our defense industrial base.” See “The Hague Summit Declaration,” June 25, 2025, https://www.nato.int/cps/en/natohq/official_texts_236705.htm.
10    NATO is developing a customs document, Form 302, for cross-border movements of military goods.
11    “The RPPB recommends a NSIP ceiling of EUR 1,324.4 million in 2024, noting the planning figure of EUR 1,710.6 million for 2025 and that submitted requirements rise to EUR 3,565.3 million in 2028 and are projected to reach EUR 5,786.4 million in 2030.” See “The 2024–2028 Common Funding Resource Plan,” last updated September 27, 2023, https://www.nato.int/cps/en/natohq/official_texts_217756.htm.
12    In terms of the future requirements identified by the Strategic Commands, the main forecasted expenditure relates to the Capability Program Plans for the Nuclear Consultation, Command and Control, for Air Basing, and for Maritime Facilities. These are aligned with the Digital Backbone and Readiness Key Requirement Areas, which were defined as priority by the Military Committee.” See “The 2025–2029 Common Funding Resource Plan,” NATO, July 18, 2024, https://www.nato.int/cps/en/natohq/official_texts_228133.htm.
13    While these EU members are neither major military players, nor key transit countries for large troop movements, history shows that no ally should be disregarded. Their inclusion is both essential for the credibility of Europe’s cohesion and a matter of strategic realism. Malta, for example, remains a critical position for anyone seeking to control the Eastern Mediterranean.
14    As defined by the European Commission in “Trans-European Transport Network (TEN-T),” accessed October 2025, https://transport.ec.europa.eu/transport-themes/infrastructure-and-investment/trans-european-transport-network-ten-t_en.
15    The report defines military mobility as an “EU-wide network of land corridors, airports, seaports and support elements and services, that facilitate the seamless and fast transport of troops and military equipment across the EU and partner countries.” See White Paper for European Defence – Readiness 2030, European Commission, accessed October 22, 2025,  https://commission.europa.eu/document/download/e6d5db69-e0ab-4bec-9dc0-3867b4373019_en.
16    The Strategic Compass is a road map for the EU’s foreign and security policy that forms a collective threat assessment and implementation. The European Council adopted it on May 25, 2022. See: A Strategic Compass for Security and Defence, European Union External Action, n.d., accessed November 15, 2025, https://www.eeas.europa.eu/sites/default/files/documents/strategic_compass_en3_web.pdf.
17    “Action Plans on Military Mobility,” European Commission Industry and Space (website), accessed November 13, 2025. https://defence-industry-space.ec.europa.eu/eu-defence-industry/military-mobility_en.
18    “Targeted Consultation on Military Mobility Package,” European Commission Industry and Space (website), accessed November 13, 2025, https://defence-industry-space.ec.europa.eu/consultations/targeted-consultation-military-mobility-package_en.
19    NetLogHubs: Network of logistics hubs in Europe and Support to Operations.
20     Dwight D. Eisenhower, “Remarks at the National Defense Executive Reserve Conference,” November 14, 1957, via “The American Presidency Project” (website), University of California, Santa Barbara,    https://www.presidency.ucsb.edu/documents/remarks-the-national-defense-executive-reserve-conference.
21    HESTIA 25: La France teste sa capacité à accueillir massivement ses alliés (France Tests Its Capacity for Massive-scale Hosting of Its Allies),” French Ministry of the Armed Forces,  March 28, 2025, https://www.defense.gouv.fr/ema/actualites/hestia-25-france-teste-sa-capacite-accueillir-massivement-ses-allies.
22    Karin Smit Jacobs, “Chinese Strategic Interests in European Ports,” At a Glance (brief),European Parliament Research Service, February 2023, https://www.europarl.europa.eu/thinktank/en/document/EPRS_ATA(2023)739367.
23    Léonie Allard, “Own and Control:  China’s Systemic Approach to Global Shipping,” China Trends no. 20:  Critical Infrastructure and Power Games in EU-China Relations,Institut Montaigne: (June 2024), https://www.institutmontaigne.org/en/expressions/china-trends-20-critical-infrastructures-and-power-games-eu-china-relations.
24    https://www.clingendael.org/publication/chinas-strategic-relevance-port-rotterdam
25    US House Committee on Homeland Security, “WTAS: Joint Investigation into CCP-Backed Company Supplying Cranes to U.S. Ports Reveals Shocking Findings,” March 12, 2024,  https://homeland.house.gov/2024/03/12/wtas-joint-investigation-intoccp-backed-company-supplying-cranes-to-u-s-ports-reveals-shocking-findings/.
26    These operators are Deutsche Bahn (Germany), SNCF (France), and Trenitalia (Italy)
27    Wiktor Biernikowicz, “Rail Transport in NATO’s Logistics System: The Case of Poland,” European Research Studies Journal XXIV, Special Issue 1 (2021): 748–61, https://doi.org/10.35808/ersj/2071.
28    A NATO Response Measure is a tool used by SACEUR to request actions from member states.
29    The French high velocity train (aka TGV), with its capacity for 510 passengers, can only transport forty-eight wounded people, for example.
30    Biernikowicz, “Rail Transport.”
31    Independent Regulator Group-Rail, “Annual Market Monitoring Report,” Independent Regulator Group-Rail, a network of European regulators, April 2023, 8.
32    Action Plan on Military Mobility 2.0.
33    The first Action Plan of 2018 assessed existing civilian network transport infrastructures with a view to their use for military purposes. The EU tasked its military staff with providing an assessment of operational necessity of infrastructure upgrade based on two criteria. The first is the project’s contribution to strengthening the EU’s strategic deployment, and the second is whether the project, on a local scale, fills the gaps identified by the member state in question. This assessment enables the creation of a budget dedicated to strengthening dual-use infrastructure.
34    The amount represents a downgrade. The EU Commission initially proposed €6.5 billion for military mobility in the 2021–2027 MFF, while the final endorsed budget was slashed to €1.69 billion.
35    The two are a rail project to connect Finland and Sweden, and a design phase for a bridge over the Danube to link Bulgaria and Romania.
36    “EU Military Mobility Not Yet in the Fast Lane,” European Court of Auditors, May 2, 2025, https://www.eca.europa.eu/en/news/news-sr-2025-04.
37    The multiannual financial framework (MFF) of the European Union is essentially the EU’s long-term budget, which sets limits on annual spending for a period of usually seven years.
38    Atlantic Resolve designates US Armed Forces deployments in Europe in response to Russian operations in Ukraine and has been doing so since 2014.
39    At the start of the nineteenth century, civilian horse carts supported armies, transporting supplies and artillery. Napoleon partially militarized logistics after private companies failed. In 1914 and 1939, civilian transport—including horses, trains, and motor vehicles—was essential. In 1939, for example, the French company Calberson fully mobilized to help move millions of conscripts and their equipment.
40    Foreign companies operating in France through a subsidiary, for instance, are subject to French defense legislation, including requisition provisions under the Code de la défense.
41    This was one of the major lessons learned from the French large-scale and interservice exercise ORION in 2023.
42    The scope is: “in case of threat, current or foreseeable, weighting on the essentials activities of the Nation.” See Pascal Dupont, “L’indispensable réforme des réquisitions du code de la défense,” Institut de relations internationales et stratégiques, November 2024, https://www.iris-france.org/wp-content/uploads/2024/11/ProgIndusDef_2024_11_Reforme_Code_Defense_Note.pdf.
43    WiSiG is an abbreviation of Wirtschaftssicherstellungsgesetz (Economic Security Assurance Act).
44    Pål Jonson (minister of defense of Sweden), “Total Defense Bill 2025-2030,” Swedish Pub. L. No. Prop. 2024-25: 34 (2024), https://www.government.se/contentassets/5c98b885c2cc40d58aa3693d34d915d3/totalforsvaret-20252030-prop.-20242534.pdf.
45    European Automobile Manufacturers’ Association, Vehicles in Use in Europe 2023, January 2023, ACEA, https://www.acea.auto/files/ACEA-report-vehicles-in-use-europe-2023.pdf.
46    EUROSTAT, “Freight Transported in Containers: Statistics on Unitisation,” March 2024, https://ec.europa.eu/eurostat/statistics-explained/index.php?title=Freight_transported_in_containers_-_statistics_on_unitisation.
47     International Road Transport Union, “Global Truck Driver Shortage to Double by 2028,” January 23, 2025, https://www.iru.org/news-resources/newsroom/global-truck-driver-shortage-double-2028-says-new-iru-report.
48    Pierre Vandier, “Comment l’armée tire parti de la révolution numérique (How the Military is Taking Advantage of the Digital Revolution),” Harvard Business Review FRANCE, May 29, 2024, https://www.hbrfrance.fr/innovation/comment-larmee-tire-parti-de-la-revolution-numerique-60585; Admiral Vandier of France now serves as NATO’s supreme allied commander transformation
49    Georgia Butler, “The US Defense Logistics Agency Has Signed a $48 Million Contract with Google Cloud: Google Public Sector Will Provide an AI-ready Cloud Foundation to the DLA  Sector,” September 1, 2025, https://www.datacenterdynamics.com/en/news/us-defense-logistics-agency-signs-48m-cloud-contract-with-google-cloud/.
50    “AWS Showcases Generative AI for Real-time Military Logistics,” Defense News, October 3, 2025, https://www.defensenews.com/video/2025/10/03/aws-showcases-generative-ai-for-real-time-military-logistics/.
51    The ATHENA program, integrating cloud and edge computing, aims to establish a “digital depot” and modernize AFSC operations, aligning with the Air Force’s strategy to transform maintenance and logistics. See Air Force Sustainment Center Strategic Plan, 2025, 18,  https://www.afsc.af.mil/Portals/24/documents/2025%20AFSC%20Strategic%20Plan.pdf.
52    Luc Vanbockryck, “Call for NATO-EU MILMOB Coordination,” Letter, September 27, 2024; Major General Vanbockryck is director of NATO’s Logistics and Resources Division.
53    “Joint Report to the European Parliament and the Council on the Implementation of the Action Plan on Military Mobility 2.0,” European Commission, March 20, 2025, https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52025JC0011.
54    Daniel Tilles, “Agreement on ‘Military Schengen’ Easing Troop Movement Signed by Poland, Germany and Netherlands,” Notes From Poland (blog), January 31, 2024, https://notesfrompoland.com/2024/01/31/agreement-on-military-schengen-easing-troop-movement-signed-by-poland-germany-and-netherlands/.
55    Republic of Albania Ministry of Defense, “Albania, Italy, Bulgaria and North Macedonia Sign in Washington the Document on Military Mobility along Corridor VIII,” Thursday, July 11, 2024,https://www.mod.gov.al/eng/newsroom/1647-albania-italy-bulgaria-and-north-macedonia-sign-in-washington-the-document-on-military-mobility-along-corridor-viii.
57    Romania Ministry of Defense, “Letter of Intent Signed Romania, Bulgaria and Greece for the Creation of a Military Mobility Corridor,” Press Release, July 11, 2024, https://english.mapn.ro/cpresa/6299_Letter-of-Intent-signed-Romania,-Bulgaria-and-Greece-for-the-creation-of-a-Military-Mobility-Corridor-.

The post Enhancing land military mobility in Europe: Advocating a pragmatic approach appeared first on Atlantic Council.

]]>
Colombia needs a strong private sector—and renewed government institutions at the helm https://www.atlanticcouncil.org/in-depth-research-reports/report/colombia-needs-strong-private-sectorgovernment-institutions/ Fri, 19 Dec 2025 17:10:35 +0000 https://www.atlanticcouncil.org/?p=893865 Colombia’s institutions brought stability, yet corruption, insecurity, and widespread informality still undermine trust and limit prosperity. Renewed fiscal discipline, stronger territorial governance, and revived institutional dialogue are essential for translating Colombia’s hard-won freedoms into inclusive and enduring growth.

The post Colombia needs a strong private sector—and renewed government institutions at the helm appeared first on Atlantic Council.

]]>

Bottom lines up front

  • The foundations of Colombia’s 1991 constitution, including an autonomous central bank and fiscal discipline, have maintained macroeconomic stability despite political volatility.
  • Corruption and the rise of illicit economies continue to erode governance and public trust, particularly in rural regions.
  • Restoring fiscal discipline and consolidating territorial control are essential to transforming economic stability into long-term national security.

This is the second chapter in the Freedom and Prosperity Center’s 2026 Atlas, which analyzes the state of freedom and prosperity in ten countries. Drawing on our thirty-year dataset covering political, economic, and legal developments, this year’s Atlas is the evidence-based guide to better policy in 2026.

Evolution of freedom

Between 1995 and 2025, Colombia has gone through five institutional phases. Each phase could be characterized by progress and tension, where advances in democracy, improvements in the rule of law, and economic openness were frequently challenged by fiscal limits, political crises, and persistent inequality and informality.

The rooting period (1991–2002)

A fresh chapter of institutional development arrived in Colombia during the early 1990s. The 1991 constitution emerged from a collective determination to eliminate centralism and violence through establishing a participatory and decentralized state which protected rights for all. Social and cultural rights were integrated into the legal framework along with expanded civic freedoms. In addition, the government in the 1990s initiated structural market reforms which included trade liberalization, financial system modernization, and the establishment of an autonomous central bank to manage inflation and create responsible and prudent macroeconomic policies.

Colombia earned economic policy credibility from these reforms which established fiscal and monetary stability for three decades. Nevertheless, these reforms produced a paradox within the country: The economic liberalization process outpaced the transformation of the country’s productive base. As many authors, such as Juan Carlos Echeverry, have noticed, Colombia opened international trade doors without having first constructed its economic base. The nation developed openness, but industries remained defenseless, and infrastructure remained behind. On the other side, the constitution guaranteed a wide range of rights (related to health, education, justice, and more) which had to be funded and created ongoing fiscal burdens exceeding the state’s financial resources. In the 1990s, Colombia emerged as a nation with promising reforms, but its ambitions outpaced its capabilities. This is the tension in which Colombia has operated for many years.


Security and stabilization (2003–2015)

Between 2003 and 2015, Colombia experienced a phase of security along with stabilization. The country managed to regain territorial authority from insurgent forces while attaining public trust in its institutional structures. The government’s “democratic security” strategy was combined with macroeconomic discipline to create a virtuous cycle of investor return, economic growth, and advancement in the rule of law.

During this time, institutional development advanced significantly in response to various policies. A fiscal rule was established while the central bank kept its independence and debt remained controlled. Changes among political ruling parties in Colombia continued without violence while international observers recognized the country’s democratic progress. However, structural problems remained hidden. The security improvements brought undeniable benefits to Colombia, but fighting insurgent forces led to human rights violations that damaged the country’s legitimacy and ability to govern. Colombia made progress on security but failed to improve equality and strengthen its institutions.

Polarization and the post-peace era (2016–2020)

The third stage in modern Colombian history began with the 2016 Peace Agreement, which put an end to fighting with FARC, the Revolutionary Armed Forces of Colombia, the country’s largest guerrilla force. The peace agreement meant to unite society but instead divided it more deeply. The national plebiscite opposition to the agreement, together with its congressional approval, created an impression that the government had disregarded public opinion.

The government could not maintain the ambitious goals of the peace agreement because it lacked sustainable implementation capacity. The implementation of programs for rural reform and reintegration and financial support for these programs remained insufficient. Progress on truth, justice, and reparation was also uneven. At the same time, non-repetition mechanisms—designed to prevent former combatant or affiliated groups from committing the same crimes and to reduce the likelihood of renewed violence—were only partially carried out. Meanwhile regional territorial conflicts increased as coca production grew (due to the dismantling of aerial coca fumigation), and new criminal organizations appeared. The anticipated “post-conflict” situation was instead a reshuffling of existing threats. By 2020, people in Colombia had grown exhausted and increasingly disappointed that the global celebrations of peace appeared so distant from their actual experiences.

Pandemic and social unrest (2020–2022)

The fourth phase revolves mostly around the COVID-19 pandemic. Although Colombia managed to avoid major economic and social setbacks through its proactive countercyclical economic approach, the pandemic nonetheless revealed structural weaknesses of inequality and informality, which led to multiple indicators falling before they partially recovered in 2021 and 2022. The impact of COVID-19 pushed more people into informal work while increasing poverty and inequality and reducing the number of available jobs. The result was diminished economic freedom. The public protests, in part triggered by illegal support and tax increases announced in the wake of the pandemic, revealed deep societal inequalities and perceptions of corruption and political manipulation. These combined to damage institutional trust, hindering investor confidence and consequently the economy.

Uncertainty and political confrontation (2022–2025)

The fifth phase covers the developments since 2022. The current political environment is marked by a confrontational atmosphere, which disrupted consensus-building efforts and created conditions that decreased investment potential and caused institutional uncertainty that destroyed trust in all government institutions. Since 2022, Colombia has faced fresh difficulties caused by inadequate and debatable policies on energy, public services, education, pensions, health, taxes, and land that drive political polarization and create economic instability. The decline of institutional dialogue has diminished investor trust and created uncertainty about Colombia’s future course while democracy persists. The current state of ideological conflict has displaced the practical economic management approach that used to guide the country’s economic affairs. Colombia now confronts the dual challenge of building trust between government and markets and connecting its citizens with their representative institutions.

The 1991 constitution established institutional structures which form one of Colombia’s most valuable assets. The Acción de Tutela gave citizens legal tools to protect their rights, and decentralization increased local government accountability, capacities, and options. The central bank’s autonomy enabled uninterrupted monetary and exchange rate policy and protected the nation from the populist cycles that ravaged most regions on the continent.

But legal systems cannot ensure freedom by themselves. Governance remains weak due to corruption, excessive regulations, and persistent informalities and social inequalities. Over 55 percent of workers remain outside the formal economy, and millions of firms are microbusinesses with low levels of formality, undermining tax collection and labor protections. Colombia needs to protect its democratic institutions while extending institutional benefits to formalize the excluded population.


Over 55 percent of workers remain outside the formal economy … undermining tax collection and labor protections.

The security situation represents the second vital point in Colombia’s recent timeline. During the 1990s, the Colombian state faced three concurrent threats from drug cartels, guerrilla insurgents, and armed groups that fought for territory; used kidnapping, extortion, and narcotrafficking to fund their operations; and exported large-scale violence to cities. The homicide rate ticked up, and many people were forced to abandon their homes. Business owners lost their local enterprises and had to defend themselves because municipal authority disappeared from vast sections of the country. By 2005, Colombia regained its administrative control and normalized daily activities, which permitted people to travel more freely, reduced transportation expenses, and extended investor horizons. Companies prospered under fiscal discipline and macroeconomic stability, which directed workers toward new regions for economic enterprise.

Over the course of three decades of social and economic development, women gained visibility and access to opportunities in both the public and private sector. Women’s participation in the workforce increased as did leadership diversity and social policies aimed at gender balance. The boost in household earnings together with more stable societies proved that inclusive growth strengthens both economic prosperity and social freedom.

The business environment in Colombia developed according to its political dynamics. Institutional predictability and consistent rules produced the best investment conditions from mid-2010-2020s. The trust in Colombia has been diminished by inconsistent policies and growing polarization since 2022. The business community shows apprehension toward taxation due to its inconsistent design and enforcement.

The country’s most effective reforms happened when governmental authorities joined forces with business leaders and academic experts to craft public policy that integrated regulatory, infrastructure, and labor initiatives to achieve common goals. Economic strategy has lost cohesion because the dialogue that used to inform it has diminished. Because freedom and prosperity depend on a foundation of predictability, the loss of predictability stands as the most critical institutional threat facing Colombia in the short term.

Colombia’s democracy has shown more stability compared to other regional nations, but 2016–18 marked a fundamental change. The nation experienced a rapid deterioration of political rights and a decline in civil liberties during this time frame. The rejection of the peace agreement in the plebiscite triggered political polarization, which worsened after congressional ratification of the plan. This resulted in widespread public concern about the institutional bypassing of political processes. During this period, both cocaine cultivation and illegal mining activities expanded while violence shifted its operational patterns and power dynamics among different actors. The political rights indicator shows further deterioration during the 2020 emergency period, which also witnessed social uprisings, but there was some improvement in 2021–22 once restrictions were lifted.

At present, legal operations are restricted in Colombia because of two fundamental elements. Most labor markets and business activities operate predominantly beyond the formal sector. The rule of law, measured by the legal subindex, experienced a rapid increase in 2014–15, followed by a dramatic decline. Formalization efforts expanded when security conditions improved, and economic activity rose only to retreat once economic performance declined and labor costs increased. Research shows that greater informality reduces enforcement capacity as well as social insurance coverage and tax revenue. Corruption and bureaucratic scandals from 2010 to 2018 reduced judicial public trust, and illegal activities in unregulated territories eroded local government authority.

Inequality, widespread informality, and growing insecurity … had been eroding democratic rights well before the pandemic triggered massive job losses and overwhelmed public services.


Governance quality worsened during these processes even though other sectors showed signs of improvement. While problems existed before the pandemic, COVID-19 made them more apparent. Social unrest spiked sharply in 2019, subsided during COVID-19 lockdowns, and intensified again in 2021. Data reveal that political freedom declined both before and after COVID-19. Yet the underlying causes—rising inequality, widespread informality, and growing insecurity—had been eroding democratic rights well before the pandemic triggered massive job losses and overwhelmed public services. The political situation since 2022 has been more confrontational, hindering consensus-building between government, business, and academic partners and stirring tensions between autonomous institutions and regulatory bodies. The key goal of economic recovery requires the establishment of stable economic directions along with trustworthy dialogue mechanisms that will rebuild private-sector confidence and restore normal market expectations.

Evolution of prosperity

Freedom and prosperity in Colombia have developed concurrently, although their progression has never been perfectly aligned. The 1990s and 2000s market liberalization, alongside expanded rights in the new constitution of 1991 and fiscal and monetary discipline, created the foundation for Colombia’s largest social change in contemporary history. The nation’s average per capita income tripled while poverty dropped by 20 percentage points and life expectancy increased by around ten years. This growth, however, contained a key warning since its uneven distribution meant delayed economic benefits for many Colombians. The clear lesson was that growth without fairness damages society just as severely as economic stagnation.

The inequality trap

Between 2005 and 2016, many observers believed Colombia had entered a positive feedback loop.1 Economic growth remained healthy while job creation improved, and social programs reduced extreme poverty levels. Market freedom finally found a way to work harmoniously with social policy to benefit society.

People will tolerate slow economic growth, but they will refuse to support a system that fails to reward hard work or equitable treatment.

After 2016, the positive cycle started to break down. Economic growth decreased, and productivity reforms came to a halt while the wealth gap between rural and urban Colombia remained the same. Informal employment increased yet again while people lost hope for their future because inequality returned to its former levels. Then the pandemic struck, revealing structural defects the country had delayed addressing. Education interruptions, female job losses, and strained public finances pushed the country to its limits.

The 2021 protests were triggered by discontent over taxes, but they served to express people’s deeper sense of exclusion. Many Colombians felt that prosperity had become an exclusive privilege rather than a universal promise. The widespread perception damaged people’s trust in democracy and transformed economic inequality into a political moral crisis. People will tolerate slow economic growth, but they will refuse to support a system that fails to reward hard work or equitable treatment.

Colombia achieved indisputable progress through its recognition of Indigenous and Afro-descendant community rights. However, many of these advancements failed to deliver real benefits in practice. From 2010 to 2020, minority inclusion freedom indicators experienced a decline. The absence of governmental security in peripheral regions, combined with ongoing displacement and illegal expansions of mining and drug production, continue to drive social marginalization.

The disconnect between greater formal rights and stagnant living conditions is clearly visible. For many Colombians, equality before the law failed to translate to real equality of opportunities. The main takeaway is that inclusion demands more than official recognition; it requires continuous financing for education, infrastructure, and peacekeeping that creates national investment incentives for all territories.

Since 2018, Colombia has received over two million Venezuelan migrants. Managing this massive influx tested national institutions but also brought new energy, talent, and entrepreneurship to Colombian society. Border communities became overburdened because social services reached their limits. The “Temporary Protection Statute” along with other pragmatic policies transformed what could have been a humanitarian crisis into a demographic boon over time. Formal labor market workers contributed to the economy through tax payments while bringing new and energetic workforce potential. Amid regional tendencies to respond with populist fervor, Colombia demonstrated a distinct approach that blended openness with strategic foresight. Institutional flexibility combined with inclusiveness demonstrated that migration could be a driver of renewal instead of instability.

Colombia has achieved one of its most remarkable successes through environmental policy initiatives. From 2010 through the early 2020s, Colombia transitioned from setting green targets to producing tangible achievements. The economic policy established through CONPES 3934 (2018) and CONPES 4075 (2022) proved that green growth had become an integral economic plan instead of merely aspirational.

The addition of electric vehicle incentives, together with renewable energy auctions in La Guajira and enhanced prosecution of illegal mining, transformed environmental defense into a core competitiveness element. Mercury emissions decreased while wind and solar power capacity expanded, and the nation began perceiving sustainability as an advantage rather than a limitation. Although environmental issues such as deforestation remain, Colombia has advanced to where economic and environmental goals are more in sync.

Human development presents the clearest demonstration of how freedom relates to prosperity. People in Colombia have experienced longer lifespans and enhanced health outcomes over the past three decades. Infant mortality rates dropped dramatically while literacy rates increased, and healthcare access became almost universal. As a result of the 1993 and 2011 reforms, Colombia’s health care systems transformed to become one of Latin America’s most comprehensive.

Education in Colombia remains divided: Urban schools have developed quickly but rural areas continue to lag behind. Digital access and trained teachers remain scarce in many classrooms while educational results show significant differences across regions. The pandemic intensified educational inequalities, emphasizing to policymakers that offering coverage without proper quality or relevance is insufficient. Future development requires better integration between educational systems and productive sectors to create job opportunities which could also lead to social stability.

The path forward

Colombia is approaching a critical point which will define its future direction. Thirty years of institutional advancement delivered stability alongside credibility, yet the country continues to struggle with social inequality, economic informality, and declining public trust. Challenges arose after 2016, when investment diminished, economic growth declined, and political polarization intensified. But the real issue is greater than Colombia’s ability to grow: The crucial challenge is to achieve inclusive growth that transforms freedom into equal prosperity.

The foundation of prosperity rests on establishing stable public finances. After the necessary spending during the pandemic period and the increase in public debt, Colombia started to make a fiscal adjustment which was successfully implemented between 2020 and 2023. However, since then, public debt and the fiscal deficit have risen high enough to make investors nervous. As a result, Colombia needs an effective reform that expands the taxpayer base while making compliance easier; it should also eliminate tax benefits that favor a select few while preserving support for small regional businesses.

The restoration of fiscal rules (which were suspended in 2025) would demonstrate Colombia’s commitment to disciplined governance while enhancing market and public confidence in the country’s fiscal management. Decentralized fiscal authority with proper accountability mechanisms would enable state institutions to connect with citizens more effectively while distributing growth benefits more fairly.

Peacebuilding requires more than negotiation-based approaches while demanding consistent territorial governance. Large rural areas of Colombia still live under alternative and illegal power systems that impose fear instead of upholding legal authority. Road construction alongside internet connectivity and new schools serve as development tools which could also be useful in strengthening citizenship.

Government investments in infrastructure yielded clear advancements across Antioquia, the coffee region, and parts of the Caribbean region in the form of decreased violence, increased job opportunities, and population retention. Security improves only when people have access to opportunities to replace coercive systems. The practical and moral lesson that emerges is that prosperity requires peace, and peace demands governance from a state whose presence is felt where people reside.

Informality blocks the path that unites freedom with a prosperous future. More than 50 percent of Colombian workers lack contracts and protections since they work outside the formal system. The workplace formalization process would be achievable by easing procedures and reducing labor expenses and modernizing ways to connect workers with employers.

Simultaneously, Colombia needs to transition from an extraction-based economy to an innovation-driven economic model. Productivity functions as the link between immediate economic recovery efforts and enduring prosperity. This requires industry-university coordination along with technological implementation support and local business development investment. Subsidies will not reduce inequality nor sustain freedom because productivity growth serves as the fundamental solution.

Colombia’s greatest challenge, however, springs not from fiscal concerns but from the political domain. The current political division has turned policy discussions into entrenched conflicts, making compromise look like weakness. Future development in Colombia depends on institutional pragmatism, which requires leaders to prioritize results over political statements.

Non-negotiables must be to protect the independence of the central bank and to maintain the autonomy of courts and oversight agencies. Dialogue between government, business, and civil society needs to be reestablished through structured channels. Economic freedom depends not only on predictable rules for investors but also on the social contract that allows it to endure. Transparent institutional operations promote both economic and public trust.

Non-negotiables must be to protect the independence of the central bank and to maintain the autonomy of courts and oversight agencies.

The transition toward clean energy creates difficulties while promising new possibilities. Even though oil and gas continue to generate substantial government revenue, Colombia possesses vast renewable energy potential. The appropriate approach involves slow and responsible market transition combined with building new industries based on sustainable agriculture, clean energy, and ecotourism while preserving fiscal stability.

Environmental stewardship could become a competitive advantage when established through consistent regulations and patient investment. Colombia is endowed with geographical diversity, biodiversity, and abundant water resources that would enable green industries to thrive—as long as institutions remain constant, regulations are simplified, and public-private partnerships are strengthened.

Throughout the thirty-year period from 1995 to 2025, Colombia has been trying to balance its aspirations against its limitations. It strengthened its democracy and opened the economy, but it continues to battle persistent problems of inequality, informality, and insecurity. Freedom in the country has never been fixed since each generation must labor to preserve and renew it.

The next chapter depends on Colombia’s ability to tether freedom to present-day opportunities. Achieving fiscal stability together with security systems, educational advancement, and institutional trust is a moral obligation essential for democratic success. Once trust returns to citizens and government bodies, between investors and institutions, and among regions with their central authorities, Colombia will convert its practical liberty to enduring economic prosperity.

The future direction of the nation depends on making decisions between opposing forces, including confrontation versus consensus, populism versus pragmatism, and empty rhetoric versus courageous social and economic reforms. With the right decisions, Colombia can become an example of democratic stability and inclusive development throughout the Americas.

about the author

José Manuel Restrepo is an economist, academic leader, and former public servant with experience in education management and economic policy. He has served as president (rector) in Universidad EIA, Universidad del Rosario, and CESA Business School in Bogotá. He held cabinet roles as Colombia’s minister of commerce, industry and tourism and later as minister of finance and public credit. He holds a master’s degree in economics from the London School of Economics and a Ph.D. in management from the University of Bath.

A strong advocate for innovation, sustainability, and institutional ethics, Restrepo has championed policies such as the Entrepreneurship Law, Green Sovereign Bonds, and the modernization of Free Trade Zones 4.0. His leadership experience extends to academia, government, and business, where he seeks to foster collaboration as a means to turn policy into progress. As a frequent speaker and columnist, he reflects on productivity, education, and governance, emphasizing that economic progress must always serve people.

Explore the data

The Indexes rank 164 countries around the world. Use our site to explore thirty years of data, compare countries and regions, and examine the subindexes and indicators that comprise our Indexes.

Stay Updated

Get the Freedom and Prosperity Center’s latest reports, research, and events.

Stay connected

Read all editions

2026 Atlas: Freedom and Prosperity Around the World

Against a global backdrop of uncertainty, fragmentation, and shifting priorities, we invited leading economists and scholars to dive deep into the state of freedom and prosperity in ten countries around the world. Drawing on our thirty-year dataset covering political, economic, and legal developments, this year’s Atlas is the evidence-based guide to better policy in 2026.

2025 Atlas: Freedom and Prosperity Around the World

Twenty leading economists, scholars, and diplomats analyze the state of freedom and prosperity in eighteen countries around the world, looking back not only on a consequential year but across twenty-nine years of data on markets, rights, and the rule of law.

2024 Atlas: Freedom and Prosperity Around the World

Twenty leading economists and government officials from eighteen countries contributed to this comprehensive volume, which serves as a roadmap for navigating the complexities of contemporary governance. 

Explore the program

The Freedom and Prosperity Center aims to increase the prosperity of the poor and marginalized in developing countries and to explore the nature of the relationship between freedom and prosperity in both developing and developed nations.

1    Otaviano Canuto and Diana Quintero, “Colombia: Getting Peace, Getting Growth,” Policy Center for the New South, March 23, 2017, https://www.policycenter.ma/blog/colombia-getting-peace-getting-growth; avid Felipe Perez, “After a Decade of Growth and Political Stability, It’s Time to Invest in Colombia’s Future,” World Finance, accessed [insert access date], https://www.worldfinance.com/wealth-management/after-a-decade-of-growth-and-political-stability-its-time-to-invest-in-colombias-future.

The post Colombia needs a strong private sector—and renewed government institutions at the helm appeared first on Atlantic Council.

]]>
Narrating the war: Analyzing Russia’s narratives for its invasion of Ukraine https://www.atlanticcouncil.org/content-series/russia-tomorrow/narrating-the-war-analyzing-russias-narratives-for-its-invasion-of-ukraine/ Fri, 19 Dec 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=894342 The latest report in the Atlantic Council's Russia Tomorrow series examines the Kremlin's narratives about its invasion of Ukraine.

The post Narrating the war: Analyzing Russia’s narratives for its invasion of Ukraine appeared first on Atlantic Council.

]]>

Russia’s full-scale invasion of Ukraine in February 2022 challenged much of the common Western understanding of Russia. How can the world better understand Russia? What are the steps forward for Western policy? The Eurasia Center’s new “Russia Tomorrow” series seeks to reevaluate conceptions of Russia today and better prepare for its future tomorrow.

Table of contents

Russia’s invasion of Ukraine has been, by any metric, a strategic nightmare for Moscow. Not only has Russia lost more soldiers in Ukraine than in any war since World War II—and might well end up losing more troops than the United States lost during the entirety of WWII—but the Russian economy has lurched between overheating and stagflation. All the while, the Kremlin’s decision to expand its invasion of Ukraine has resulted in a NATO both enlarged and enhanced; in Russia’s transition from regional hegemon to a “junior partner” (and even potential vassal) of China; in waning influence in places such as the South Caucasus, the Middle East, Africa, and Europe; and the creation of a heavily armed, deeply resentful neighbor in Ukraine, which will see Kyiv nurse both an animus toward Russia and a desire to reclaim much of the occupied territories for years to come.

The entire war has been an exercise in Russian myopia, accelerating Russian decline and leading to a broad range of self-inflicted wounds. Mirroring other neo-colonial wars—France in Algeria, the Netherlands in Indonesia, Portugal in southern Africa—the war has exposed Russia as a pretender to great-power status and a shell of a once-swaggering empire. While Moscow might yet gain more towns scattered throughout Ukraine’s eastern Donbas region, any remaining victories will remain pyrrhic, with Russia continuing to sacrifice its future prospects for any present gains.

Much of Russia’s failure rests on Ukrainians’ ongoing sacrifices, as well as on the broader West’s willingness to back Ukraine’s troops. But a great deal of this disaster also stems from a series of muddled narratives that Russia has peddled about precisely why it launched the expanded invasion in the first place. Pushing a sprawling, occasionally contradictory series of goals and rationales, and without a clear narrative push to consolidate either support or success, Moscow has flailed for years, lurching from one rationale to another—all while its troops continue dying en masse and its domestic population continues to feel escalating pain and stress as the war drags on.

Given all of the competing claims Moscow has put forth to defend its invasion of Ukraine, it is worth analyzing how the Kremlin has justified its expanded war and how Moscow has tried to sell the deadliest war Europe has seen since the days of Adolf Hitler and Benito Mussolini. Such analysis can not only help Western allies of Ukraine figure out how best to back Kyiv’s efforts but can provide a roadmap for sounder Russia policy in the West overall. In sifting and sorting these narratives, we can identify precisely what is motivating the Kremlin—and, better yet, how to stop it.

Selling the war

The Kremlin’s public rationales for its war in Ukraine fall into two broad buckets.

The first rests directly on Russia’s relationship with Ukraine, focusing specifically on the links, both historic and contemporary, between Moscow and Kyiv. The narratives focused specifically on Ukraine, and on Russians’ relationships with Ukrainians, can be broken down further into three primary prongs.

  1. The Ukraine war is primarily about “rescuing” Russians and Russian speakers, especially (but not exclusively) in eastern and southern Ukraine. This is primarily predicated on the idea that Ukraine is overseen by “fascists” and “Nazis,” who have been in power since the 2014 Euromaidan “coup.”
  2. Russia and Ukraine are actually “brotherly” nations, and Ukrainians are simply “confused” about their relationship as subalterns to Russia. This is primarily predicated on the idea that Ukraine is simply “Little Russia,” part of the “triune state” of Russia, Belarus, and Ukraine—and, naturally, not part of the West. The war is simply about restoring that Ukrainian status. It is also about restoring Russia’s colonial control of Ukraine and keeping Ukraine as an entity subservient to Russia.
  3. “Ukraine” does not actually exist but is a Leninist fabrication. This is predicated on the idea that Vladimir Lenin and other Soviet leadership were mistaken to draw any internal, republican borders within the Soviet Union—and that the entire “near abroad” is rightfully Russian. The war is about rectifying this Leninist mistake.

However, the Kremlin’s rhetoric explaining its war in Ukraine has often expanded far beyond Ukraine itself. Indeed, while the fighting might take place largely on Ukrainian (and occasionally Russian) territory, the Kremlin has often claimed that the war is both global and epochal, linked directly to the second broad bucket of narratives and focused on the status of Russia’s global standing. Those narratives centering on Russia’s role in the broader international context, as well as the creation of a new geopolitical order, can also be broken down into three primary threads.

  1. This war is primarily about beating back NATO and Western expansion. NATO “pledged” in 1990 that it would not expand its borders, and this war is simply about forcing NATO to uphold that pledge. This war is a “defensive” war, aimed at preventing Russian “encirclement.”
  2. This war is about the non-Western world standing up to Western bullying, hypocrisy, and decadence. Russia is at the vanguard of the non-Western world’s fight against Western “colonialism,” trying to restore “traditional values” that the West is attempting to destroy around the world.
  3. This war is about restoring Russia’s status as a “great power,” both in Europe and globally. It is primarily about ushering in a “multipolar” world, with other “civilization-states” such as China and India rising to parity with the United States.

None of the narratives above are mutually exclusive. Indeed, one of the difficulties in assessing these narrative components is the multiple instances of reinforcing themes and topics. For example, the idea that Russia and Ukraine are brotherly nations—or even the notion that Ukraine does not exist—can be directly tethered to the idea that NATO must never extend to Ukraine and that the war is necessarily defensive. The false claim that Ukraine’s 2014 revolution was in reality a coup is also often paired with the idea that the war is about rolling back Western influence and meddling in non-Western nations. These narratives can often work in conjunction—and are often included in the same speeches and writings from Russian President Vladimir Putin and his allies.

Adding to the difficulty, many of these narratives are also in tension with one another. For example, Putin wrote at length about the supposed brotherly relationship between Ukraine and Russia, yet he has simultaneously claimed that Ukraine is a mere fabrication set to be annulled. Likewise, the idea that this is somehow an anti-colonial war grates against the claim that some countries are civilization-states destined to rule over smaller nations.

Still, each of these narratives is worth analyzing on its own. The remainder of this paper will be dedicated to just that: detailing the primary contours of each of these narratives, as well as offering analysis (and often corrections) therein. The paper will also offer a brief conclusion about what these competing and contradictory narratives reveal about Russia’s aims—and how best to combat Russian expansionism in Ukraine and elsewhere.

Russia’s relationship with Ukraine

  1. The Ukraine war is primarily about “rescuing” Russians and Russian speakers, especially (but not exclusively) in eastern and southern Ukraine. This is primarily predicated on the idea that Ukraine is overseen by “fascists” and “Nazis,” who have been in power since the 2014 Euromaidan “coup.”

Details

One of the primary narratives that Russia has relied on since its expanded invasion did not originate in February 2022, or even in the months beforehand. It instead traces back to at least early 2014, when Ukrainian protesters successfully ousted former President Viktor Yanukovych in the democratic Euromaidan Revolution—and when Putin launched Russia’s initial invasion of Ukraine in Crimea and parts of the Donbas.

At its simplest, Russia’s post-Euromaidan narrative boiled down to the idea that the Ukrainian protesters were illegitimate usurpers, ousting a democratically elected leader and instituting a new regime dedicated not only to wresting Ukraine out of Moscow’s orbit but focused especially on the immiseration of Russians and Russian speakers. The “junta” responsible for this “coup” was secretly in hock to its “real masters in the West,” who were simply using Ukraine and its post-2014 government as a means of targeting Russia and Russian interests. In this view, these new Ukrainian leaders—including Volodymyr Zelenskyy—should be considered fascists and Nazis, simply because they were opposed to Russia writ large, whether that meant not recognizing Russia’s claims to Crimea or encouraging the use of the Ukrainian language throughout the country.

According to Russia, this supposed junta continued its persecution for years until things reached a breaking point in early 2022. That February, Moscow was supposedly forced to invade Ukraine for the express protection of Russians in regions like eastern Ukraine. As Putin claimed, Russia did not need to annex any further parts of Ukraine, but authorities in Kyiv needed to recognize the nominal independence of both the Donetsk People’s Republic and Luhansk People’s Republic—building upon previous demands that these entities must also have a veto over Kyiv’s foreign policy decisions. According to Moscow, Ukraine also needed to renounce any fascist or Nazi leaders and sympathies forevermore.

As Putin said during his address announcing the expanded invasion, “The purpose of this operation is to protect people who, for eight years now, have been facing humiliation and genocide perpetrated by the Kiev regime.” As he added in 2025, the crisis did not begin with Russia’s invasion but was the “result of the coup d’etat in Ukraine, which was supported and provoked by the West.” More specifically, Putin said in 2022 that Russia’s expanded invasion was a direct response to the “tragedy” in the Donbas. As Tass reported, Putin told a twelve-year-old girl that Ukraine’s “bombardments, artillery strikes and combat operations” in Donetsk and Luhansk “compelled Russia to start this military operation.”

Putin’s rhetoric also built on this narrative to call for the notion of “denazifying” Ukraine. As he memorably claimed during his February 2022 address, Russia would “seek to demilitarize and denazify Ukraine, as well as bring to trial those who perpetrated numerous bloody crimes against civilians, including against citizens of the Russian Federation.” The Russian Foreign Ministry and the Russian ambassador to the United Nations echoed this language.

Analysis

The idea that Russia needed to invade Ukraine in order to rescue compatriots and remove Nazi elements from Ukraine’s leadership is, to outside observers, perhaps the most farcical of the narratives detailed here. The notion that Ukraine—whose president is Jewish—requires denazification was immediately met with ridicule and mockery. However, this argument also provided a sense of flexibility for Putin. After all, it remains unclear what denazification would actually entail—whether regime change, full lustration, the ending of any pro-Western trajectory policies, a mix of these options, or something else entirely. Likewise, the call has a clear domestic component, with Putin able to sell the war as a battle against a new generation of supposed fascists and a reprise of Moscow’s victory in World War II.

The calls that Moscow must rescue ethnic Russians suffering in Ukraine, especially in the Donbas, also have significant salience for domestic audiences in Russia. For many Russians, the Donbas remains a traditionally Russian land and Moscow maintains a unique role in protecting Russians in neighboring nations—including beyond Ukraine. Given its salience, this line of argument would likely be employed again should Russia launch another invasion of a neighboring nation in the future, with potential usage from Estonia to Kazakhstan.

  1. Russia and Ukraine are actually “brotherly” nations, and Ukrainians are simply “confused” about their relationship as subalterns to Russia. This is primarily predicated on the idea that Ukraine is simply “Little Russia,” part of the “triune state” of Russia, Belarus, and Ukraine—and, naturally, not part of the West. The war is simply about restoring that Ukrainian status. It is also about restoring Russia’s colonial control of Ukraine and keeping Ukraine as an entity subservient to Russia.

Details

As with the narrative on Ukraine suffering a coup via fascists in 2014, the idea that Russia and Ukraine are brotherly nations—and that they are destined for embrace, with Russia lording as the “elder brother” over Little Russia—long predated Russia’s 2022 expanded invasion. Indeed, such a narrative stretches back to at least the middle of the nineteenth century, when young Russian aristocrats “discovered” Ukraine and began “to work intensely to uncover the region’s supposed original Russianness,” wrote Johns Hopkins University’s Eugene Finkel, whose 2024 book traced the origins of such efforts. No longer was Ukraine a separate polity with a distinct history; by the 1830s and 1840s, as Russian Slavophile writer Aleksei Khomiakov noted, Ukraine was “an organic and inseparable part of a single Russian nation.” Russia and Ukraine, alongside Belarus, formed a supposed triune state, in which all three nations were part of one greater Slavic nation headed by Russia.

It is an idea that, nearly two centuries later, remains largely unchanged—and which helped provide the outline for one of Moscow’s prime narratives about why it needed to launch its expanded invasion in 2022. This narrative formed much of the basis for Putin’s lengthy 2021 treatise on the topic, in which he detailed the supposed “historical unity of Russians and Ukrainians.” As Putin wrote:

I am confident that true sovereignty of Ukraine is possible only in partnership with Russia. Our spiritual, human and civilizational ties formed for centuries and have their origins in the same sources, they have been hardened by common trials, achievements and victories. Our kinship has been transmitted from generation to generation. It is in the hearts and the memory of people living in modern Russia and Ukraine, in the blood ties that unite millions of our families. Together we have always been and will be many times stronger and more successful. For we are one people.

If anything, Putin’s beliefs in the historical unity binding Russia and Ukraine have only grown despite the military setbacks and massive casualty rates continuing to climb. In late 2022, Putin announced the supposed “annexation” of further Ukrainian territory, including territory Moscow had not yet even conquered. As a means of getting around this awkward fact, Putin pointed to the supposed unity already extant between Ukraine and Russia—found, naturally, in the land he was now claiming as Russia’s. As Putin said, those in Ukraine were “our compatriots, our brothers and sisters . . . the native part of our united people.”

Russian President Vladimir Putin attends a pro-war concert at Luzhniki Stadium in Moscow, Russia. February 22, 2023. (Sputnik/Maksim Blinov/Kremlin via REUTERS)

Nor is it just Putin who has peddled such tropes. In a malicious, revelatory article originally posted on (and later removed from) RIA Novosti, one Russian writer laid out what Russian victory in Ukraine would look like. “Ukraine has returned to Russia,” the article begins. “It will be reorganized, re-established and returned to its natural state as part of the Russian world . . . [Russia, Belarus, and Ukraine] will now act in geopolitical terms as a single whole.” Thanks to the invasion, “Russia is restoring its unity” via a “de facto civil war” waged by “brothers.” And thanks to Moscow’s victory, “Russia is restoring its historical completeness, gathering the Russian world, the Russian people together—in all its totality of Great Russians, Belarusians and Little Russians [i.e., Ukrainians].”

Analysis

In this narrative, Ukraine and Ukrainians still exist in concept, but only as a nation and people subordinated to Russia and Russian sovereignty. It is, if anything, a vision that posits Ukraine as simply another Belarus: a state that retains nominal independence but is nonetheless tightly embraced by Moscow and subservient to the Kremlin’s demands. This, as Moscow sees it, is the natural state of things—and anything else would simply be a historical anomaly.

This narrative, of course, is chock-full of historic revisionism, outright fabrications, and warmed-over excuses for empire. As Finkel noted, Kyiv’s origins predate Moscow’s founding by centuries, and few if any Russian intellectuals ever considered Ukraine part of their history and identity until the middle of the nineteenth century. Moreover, this narrative grossly ignores what Ukrainians actually think—and blinded Moscow to just how fiercely Ukrainians would fight to preserve both their state and their nation moving forward.

  1. “Ukraine” does not actually exist but is a Leninist fabrication. This is predicated on the idea that Vladimir Lenin and other Soviet leadership were mistaken to draw any internal, republican borders within the Soviet Union—and that the entire “near abroad” is rightfully Russian. The war is about rectifying this Leninist mistake.

Details

This narrative flips the notion of a supposed triune state on its head. Instead of Ukraine being a constituent part of a greater Russia, there is no Ukraine whatsoever—and any claims of a separate Ukrainian nation, language, or identity are simply slander against the one, true, and indivisible Russia. It is a narrative that tips into the genocidal, giving Russia cover to try eliminating Ukrainian identity entirely.

As with other narratives mentioned above, the idea that Ukraine is not a separate polity but is simply a “project” meant to target and undercut Russia has a lengthy lineage. In the 1860s, Russian officials shunted the idea of Ukraine entirely to the side, claiming that the Ukrainian language “never existed, does not exist and cannot exist,” culminating in a tsarist edict banning the teaching of Ukrainian and marking the first instance of Russian authorities trying to stamp out the idea of Ukraine entirely.

The key inflection point in this narrative—that Ukraine is a mere fabrication, rather than a fraternal nation that has lost its way—came in the early 1920s, when Lenin and other Soviet higher-ups began outlining the borders of the new Soviet republics. Given the levels of support in Ukraine for Ukrainian nationhood, Soviet leadership granted Ukraine (and a number of other polities) republican status, effectively placing it on par with the Russian Soviet Federated Socialist Republic. For Putin and others, this decision was a “time bomb” that ultimately detonated in the Soviet Union’s dissolution and is a historic wrong that must be corrected.

We see elements of this narrative throughout Putin’s speeches and writings. In the same essay mentioned above about the supposed historical unity of Russia and Ukraine, Putin claims that “modern Ukraine is entirely the product of the Soviet era,” created “on the lands of historical Russia.” As he added when announcing the expanded invasion, “modern Ukraine was entirely created by Russia or, to be more precise, by Bolshevik, Communist Russia. This process started practically right after the 1917 revolution, and Lenin and his associates did it in a way that was extremely harsh on Russia—by separating, severing what is historically Russian land . . . When it comes to the historical destiny of Russia and its peoples, Lenin’s principles of state development were not just a mistake; they were worse than a mistake.”

As such, the time had come to rectify that “mistake”—even to the point of destroying and subsuming Ukraine entirely.

Analysis

Putin might play-act as a historian, but his reading of history is saturated in grievance and mythmaking, cherry-picking facts and concocting details of his own. The idea that Ukraine is a fabrication or some facile project is, of course, belied by the fact that Ukraine and Ukrainians continue to exist and continue to fight back against Russian forces.

Moreover, Putin’s shoddy history is easily dismissed by those who have actually studied the region. As acclaimed historian Serhii Plokhy noted, the idea that Ukraine exists on historical Russian lands is nonsensical. “Even a cursory acquaintance with the history of the Russian Revolution and fall of the Russian Empire that accompanied it indicates that the modern Ukrainian state came into existence not thanks to Lenin but against his wishes and in direct reaction to the Bolshevik putsch in Petrograd in October . . . of 1917,” Plokhy wrote. “The Bolsheviks tried to take control of Kyiv as well but were defeated, jumpstarting the process of the modern Ukrainian state-building.”

Putin is hardly the only Russian nationalist who has learned the hard way the peril of dismissing Ukrainian identity. During the Russian Civil War, the pro-tsarist White forces refused to grant Ukraine (among other nations) any political freedoms or sovereignty. They instead claimed they were fighting for “Russia, one and indivisible”—a cry that rallied few non-Russians and eventually doomed the White forces to defeat.

Russia’s global standing

  1. This war is primarily about beating back NATO and Western expansion. NATO “pledged” in 1990 that it would not expand its borders, and this war is simply about forcing NATO to uphold that pledge. This war is a “defensive” war, aimed at preventing Russian “encirclement.”

Details

Not all of the Russian narratives backing the expanded invasion center on Ukraine. In fact, a number claim that Ukraine is simply the latest flashpoint in a far broader struggle Russia is waging against a perfidious West, and the United States in particular. A case in point is the claim that the war in Ukraine is not just about toppling Kyiv’s “regime,” or even preventing Ukraine from joining NATO, but that it is about unwinding NATO’s post-1991 gains and preventing the wholesale encirclement of Russia by Western forces.

Such a narrative came to the fore in the weeks leading up to the expanded invasion in early 2022. In December 2021, the Kremlin moved from demanding that Ukraine simply acquiesce to Russian demands (especially foregoing NATO membership) to demanding that NATO deployments leave much of Eastern and Central Europe entirely. Moscow specifically called for the removal of NATO forces and weapons from countries such as Romania and Bulgaria, and formally called for NATO to pull back to its 1997 borders, effectively abandoning Poland, Czechia, the Baltics, and others—and effectively restoring military parity between the United States and Russia in Europe.

The Kremlin has justified these demands by claiming that the United States pledged in the early 1990s not to expand NATO eastward. Putin has regurgitated these claims multiple times, including after Russia first launched its invasion in 2014, when the Russian leader stated that Western leaders “have lied to us many times . . . This happened with NATO’s expansion to the east, as well as the deployment of military infrastructure at our borders.” According to Putin, all NATO enlargement following the Soviet dissolution is invalid and must be rolled back. Preventing Ukraine from NATO membership is simply the first domino in a far broader effort to push NATO out of all of its newest member states.

Analysis

Putin’s claims that the United States pledged not to expand NATO are ahistorical and fabricated. The United States never pledged any such veto. Even Mikhail Gorbachev, then ruling as Soviet premier, attested to this, saying that the “topic of ‘NATO expansion’ was not . . . brought up in those years.” Moreover, the key comment in question, in which Secretary of State James Baker floated the idea of NATO moving “not one inch east,” referred solely to NATO troops from West Germany moving into East Germany. The George H. W. Bush administration, however, never adopted this or any prohibition on NATO expansion as formal policy.

However, such a lie is a handy means of cultivating support among gullible audiences, both domestically and internationally, and helps present Russian aggression as being defensive in nature. Of course, this kind of framing—that invading a neighbor is not imperialism but is actually a defensive move—long predates Putin. It can be found in everything from the US decision to invade Mexico in the 1840s to Japan’s decision to invade much of Asia in the 1940s. This “defensiveness” was also the basis for much of the Soviet Union’s rationale for invading numerous neighbors, from Hungary in 1956 to Czechoslovakia in 1968 and beyond. Putin will almost certainly not be the last imperial leader to claim his country’s expansion is defensive in nature.

Thankfully, the Kremlin’s demands have been roundly dismissed by NATO and Western governments alike, and Ukraine remains dedicated to joining NATO. Yet the demands highlight how Russia has spun the war in Ukraine as a means not simply of thwarting NATO’s enlargement but of restoring a military parity between the United States and Russia on the European continent. It implies, in other words, an effective return to the Cold War military status quo within Europe and an unwinding of all the post-Cold War gains that have helped beat back malign Russian influence and military dominance in Europe, far beyond just Ukraine.

  1. This war is about the non-Western world standing up to Western bullying, hypocrisy, and decadence. Russia is at the vanguard of the non-Western world’s fight against Western “colonialism,” trying to restore “traditional values” that the West is attempting to destroy around the world.

Details

While the war is taking place in Ukraine, this narrative posits that the war is about far more than simple NATO expansion or Ukrainian nationhood. Instead, it is about finally standing up to Western predation and perfidy, and to the West’s attempts to spread supposedly liberal values around the world—including all those elements opposing so-called traditional values.

Russia’s efforts to transform itself into a bastion of these supposed traditional values dates back at least a decade, when the Kremlin first began positioning itself as the primary bulwark for those opposed to liberal democracy. These include those opposed to LGBTQ rights, those opposed to so-called “gender ideology,” and even those opposed to democracy writ large. This effort has been largely successful, with Russia and Putin widely viewed as the lodestar for these anti-democratic forces.

The war in Ukraine, then, is simply a continuation on this theme. Announcing the expanded invasion in 2022, Putin claimed that the West “sought to destroy our traditional values and force on us their false values that would erode us, our people from within.” Patriarch Kirill, one of the key spokesmen for Putin’s regime and the titular head of the Russian Orthodox Church’s Moscow Patriarchate, echoed Putin’s claims that the war was predicated on those in eastern Ukraine “refus[ing] to accept the so-called values that are being offered by” the West, including “the gay parade.” RT editor-in-chief Margarita Simonyan, one of the war’s biggest boosters, warned that Ukraine risked becoming “an LGBTQ capital or a venue for the Transgender Olympics.”

More broadly, the Kremlin has attempted to position the war as an effort to stand up to Western “neo-colonialism.” Ignoring centuries of Russian colonialism in Ukraine (and elsewhere), Putin has attempted to sell the war as a means of beating back Western colonial efforts. As he said when announcing the supposed annexations of multiple Ukrainian provinces in late 2022, “The West is ready to step over everything in order to preserve the neo-colonial system that allows it to parasitize, in fact, to plunder . . . Hence their aggression towards independent states, towards traditional values and original cultures[.]”

Analysis

It’s difficult to take seriously Russia’s claims that it is waging a war in Ukraine for traditional values, or that it has some kind of spiritual mission to beat back the encroachment of LGBTQ rights. After all, Russia is a country in which the rate of regular church attendance is in the single digits, while the country’s abortion rate remains higher than that of many other European nations. Moreover, the country routinely persecutes Christian denominations, even in Russia itself. The country is hardly a bastion of traditional values, despite Putin’s claims otherwise.

However, the claim that Russia is supposedly leading an anti-colonial war is perhaps the most farcical. Russia was a constituent part of the broader, ghastly story of European colonization, stealing lands and brutalizing populations from Eastern Europe and the Caucasus to North Asia and Central Asia—and even joining Great Britain, France, and Spain in colonizing North America. Claiming it was spreading “civilization” and “Christianity” to “heathen” groups of “savages,” Russia’s colonialist claims were indistinguishable from those in European empires elsewhere. In other words, Moscow was as much a European colonizer as London, Lisbon, Brussels, or Paris.

This was true not just in Chechnya, Kazakhstan, Sakha, or Finland, but also in Ukraine, where Moscow—during tsarist, Soviet, and now Putin eras—routinely engaged in colonial behavior, from ethnic cleansing to cultural genocide to mass murder, all while claiming non-Russian lands as its own. The war in Ukraine is indeed colonial, but with Russia once more in the role of colonizer.

  1. This war is about restoring Russia’s status as a “great power,” both in Europe and globally. It is primarily about ushering in a “multipolar” world, with other “civilization-states” such as China and India rising to parity with the United States.

Details

Arguably the broadest narrative propounded by Russian authorities is that the war in Ukraine is not about the status of certain Ukrainian provinces, or Ukrainian security arrangements, or even the size and status of NATO in Europe. It is instead about restoring Russia’s role as a supposed great power on par with a small number of other states that make up an exclusive club of nations dominating geopolitics. These nations include the United States, China, and potentially India, with Russia also seen as a natural member.

The Kremlin claims Russia’s rightful status as a great power has been dismissed by the West—and especially by the United States, which has preferred to oversee a unipolar world—but no more. In invading Ukraine, Russia has announced its permanent status as one of the supposed civilization-states in a new multipolar world. This is not to say that Russia is aspiring to global dominance, per se. Rather, Russia is aspiring to—and has already achieved—a role as one of the key geopolitical players internationally, regionally dominant and globally relevant. Ukraine remains firmly within Russia’s supposed sphere of influence and, as such, Russia should have the right to do whatever it wants within Ukraine with no outside interference.

This obsession with great-power status has long pervaded Putin’s rhetoric, infusing and inflaming Russia’s revanchism. In October 2022, when he announced Russia’s supposed annexation of four Ukrainian provinces, Putin claimed that Russia is “a great millennial power” and a “country-civilization” that will follow its own path. In March 2023, Putin signed a strategic blueprint outlining Russia’s “historically unique mission” as a “unique state-civilization.” As Uppsala University’s Igor Torbakov wrote, it was the first time that Russian leadership had “officially stated that Russia is a sui generis civilization.”

Much of this narrative has manifested in specific calls for a “new Yalta,” in which leaders in Moscow, Beijing, and Washington effectively carve up the world, Ukraine included. In such a scenario, Russia would be the modern equivalent of the United Kingdom: an empire that might not be quite as powerful or wealthy as the other two nations, but that nonetheless deserves a place at such a summit. “Putin has never hidden that his dream is a new Yalta . . . [to] establish a new world order,” writes journalist Mikhail Zygar. Russia’s Ukraine war—and its supposedly imminent victory—is merely the opening salvo in a far broader global reordering. As the much-maligned RIA Novosti article mentioned above claimed, the invasion of Ukraine meant that a “new world is being born before our eyes”—a world that Russia will help steer.

Analysis

This pretension to greatness hardly began with Putin. Years before Russia’s expanded invasion, the Kremlin and Russian intellectuals were long obsessed with “the pursuit of derzhavnost,” which scholar Seva Gunitsky translates as “both being a great power and being recognized as such by others.” Not only does this mean acting as a regional hegemon, but it also means being entitled to “an unquestioned sphere of influence.” This rhetoric—of Moscow’s “special mission” and its “historic destiny” as a “great power”—stretches back centuries and was evident in the Kremlin’s tsarist, Soviet, and post-Soviet history.

It is perhaps ironic, then, that little has done more to expose the hollowness of Putin’s claims than his invasion of Ukraine. Rather than restore Russia’s great-power status, the war has led not just to the degradation of the Russian economy and outright military disaster in Ukraine but to Russia’s weakening influence in the South Caucasus, the Middle East, Africa, and, of course, Europe more broadly. It has likewise forced Russia to rely on North Korea to shore up national security, and to lean on China to shore up Russia’s teetering economy.

The war has only accelerated Russian decline and undone, perhaps for good, the potential restoration of Russian greatness. Moscow might still maintain its status on things like the United Nations’ Security Council and might still be the only post-Soviet state with nuclear weapons. But the idea that Russia is, or will soon become, a great power is increasingly laughable—and a testament to what a disaster Putin’s rule has been for Russia.

Conclusion

Wars can often contain multiple narratives. The US invasion of Iraq, for example, was originally pegged to removing Iraq’s supposed weapons of mass destruction program before it shifted to fostering “democracy” for Iraqis. The US Civil War was originally launched to restore the sovereignty of the federal government before it shifted to eliminating slavery within the United States entirely. A war with multiple narratives does not necessarily portend either success or failure.

Rare are those wars, however, that push as many competing narratives as Russia has peddled in Ukraine. Indeed, it’s difficult to think of another war that has seen so many different justifications from the invading party. And it’s difficult to identify another war that has seen such a massive difference in scale of what those narratives are proposing, from simple territorial shifts to the entire reordering of the state of global affairs.

But as we’ve seen above, this is precisely what Russia has attempted with its invasion of Ukraine. From protecting pockets of Russians in the Donbas to ushering in an entirely new geopolitical era, from restoring a supposed Slavic unity to eliminating liberal values, the Kremlin’s justifications for its war have been breathtaking in their breadth.

They have also been a confused, muddled mess and a testament to just what a fiasco Russia’s entire war has been for Moscow. Instead of a clear-cut series of goals and aims, Russia’s leadership has flailed for excuses for its invasion, tossing idea after idea into the ether to see what might succeed. Such narrative confusion has stemmed, in large part, from Russia’s overall failures in Ukraine, forcing the Kremlin to reach for more and more justifications as the war drags on. At the same time, the confusion has played a significant role in Russia’s overall strategic failures in Ukraine and elsewhere; without a clear set of strategic goals, there’s little reason to think that tactical or battlefield successes would follow. Of course, much of this is also predicated on the Kremlin’s historical myopia as it pertains to Ukrainian history and Ukrainian nationhood; rather than a constituent part of some kind of Greater Russia, Ukraine is a distinct polity with a unique, separate history—a reality that hundreds of thousands of Russians have now died to learn. While Russia might continue to occupy sections of Ukrainian territory, the Kremlin has all but assured that a heavily armed Kyiv remains Russia’s greatest geopolitical foe for decades to come, if not longer.

For those looking forward, all this narrative confusion highlights one thing: there’s little reason to think Putin will be satisfied with simple recognition of Russian sovereignty over places such as Donetsk or Kherson. As Russian authorities have claimed, this war is about far more than the status of certain sections of eastern Ukraine, or even about Ukrainian membership in NATO. The Kremlin has far broader, and far more destabilizing, goals than simply dominating Luhansk and Zaporizhzhia, or even necessarily toppling Kyiv. Ukraine is but a stepping stone to Putin’s far more sweeping goals of rolling back US and allied interests, reaffirming Russian dominance over all of its neighbors (China and North Korea excepted), and creating a world in which the rights of smaller nations are subject to the whims of a handful of great powers. Given Putin’s ongoing obstinacy about winding down the war and finding a so-called “off-ramp,” it is clear that, for him, this war is about far more than simply the territorial status of parts of eastern or southern Ukraine.

It is, indeed, a reflection of the Kremlin’s obsession with derzhavnost—an obsession of which Ukrainians have done everything they can to disabuse Russia. And it reflects the fact that what can end this war is not the status of places like Crimea or Donetsk oblasts, but a full and outright defeat of Russia. Anything less would simply tempt the Kremlin to try again—with another effort to upend the global order and another war to try making Russia great again.

Read the full issue brief

About the authors

Casey Michel is an author and journalist who writes extensively on international corruption, kleptocracy, national security, and Russia policy. His writing has appeared in the New York Times, Foreign Affairs, Financial Times, Wall Street Journal, and many other outlets. His 2021 book, American Kleptocracy, was named by the Economist as one of the “best books to read to understand financial crime,” and his 2024 book Foreign Agents was named by Foreign Policy Magazine as one of the “biggest foreign-policy book releases of 2024.” His next book, United States of Oligarchy, will be released in summer 2026.

He is based in New York, and is currently sanctioned by the Russian regime for his work.

Related content

Explore the program

The Eurasia Center’s mission is to promote policies that strengthen stability, democratic values, and prosperity in Eurasia, from Eastern Europe in the West to the Caucasus, Russia, and Central Asia in the East.

The post Narrating the war: Analyzing Russia’s narratives for its invasion of Ukraine appeared first on Atlantic Council.

]]>
Democracy and stability in Africa: Why US leadership still matters https://www.atlanticcouncil.org/in-depth-research-reports/report/democracy-and-stability-in-africa-why-us-leadership-still-matters/ Fri, 19 Dec 2025 00:47:44 +0000 https://www.atlanticcouncil.org/?p=893855 The near- and long-term interests of African societies and key US stakeholders are bolstered by the advancement of democratic, accountable, and stable governance on the continent. A robust democracy assistance strategy in Africa is in line with long-standing US values that underpin America’s reputation and image on the continent, and is also instrumental to current US objectives. 

The post Democracy and stability in Africa: Why US leadership still matters appeared first on Atlantic Council.

]]>

Bottom lines up front

  • The United States is reevaluating democracy assistance in Africa at a time when democratic institutions, citizen aspirations, and regional stability depend on sustained support for accountable governance.
  • Strengthening democratic pathways, empowering citizens in democratic and authoritarian contexts, and investing in stabilization and local peacebuilding are essential to protecting African progress and advancing US interests.
  • Private philanthropy and the private sector must play a larger role in sustaining electoral integrity, supporting civil society, and fostering conditions that enable long-term democratic and economic gains.

This issue brief is part of the Freedom and Prosperity Center’s “The future of democracy assistance” series, which analyzes the many complex challenges to democracy around the world and highlights actionable policies that promote democratic governance.

Introduction

The political landscape in Africa defies generalization. Despite setbacks and challenges, democratic progress continues in Ghana, Malawi, and Senegal, among other countries. Next to these bright spots, military juntas have deepened their grip on multiple West African and Sahelian governments, long-standing authoritarian regimes remain in Rwanda, Uganda, and other countries, and conflict and war continues to upend lives and threaten the territorial integrity of the Democratic Republic of Congo (DRC) and Sudan. Numerous other countries are best described as hybrid regimes, combining democratic and authoritarian forms of governance and producing inconsistent outcomes for their citizens in terms of delivering public goods, securing basic rights, and promoting economic growth.

Against this backdrop, the United States is recasting its relationship with African governments and their constituencies. Department of State officials describe “trade, not aid” as the foundation of US policy in Africa. In doing so, they have named expanded access to critical minerals and energy resources, alongside the development of new markets for US exports, as signature priorities for the Trump administration on the continent. This shift has brought cascading effects on African nations. As the region with the largest historic inflow of US foreign assistance, deep and sudden cuts to the aid budgets of the US Department of State and the closure of the US Agency for International Development have disproportionately affected African countries.[2]

Previous US administrations—including the first Trump administration—promoted democratic governance and stability in Africa using a combination of diplomatic and development tools. In fiscal year 2023, for example, the US government spent more than $338 million on democracy, human rights, and governance (DRG) programming in Africa. Even more was spent in the final year of the first Trump administration, when DRG spending in Africa stood at more than $415 million.

Today, the outlook is very different. In addition to eliminating most democracy assistance to the continent in the early round of aid cuts, the administration has sought to defund the National Endowment for Democracy and proposed the elimination of nearly all DRG funds in its 2026 budget. Meanwhile, it has shifted away from criticizing foreign governments on democratic and human rights grounds.

Regardless of the direction of US government policy, recent history shows that both African societies and US national interests are best served by stable, democratic, and accountable systems of governance, which have proved more effective at delivering peace, expanding socioeconomic opportunity, and fostering market economies that attract domestic and international investment. Given this reality, the “dealmaking” intended to drive the administration’s foreign policy will find its greatest long-term success in countries with stronger and more democratic institutions.

This brief makes recommendations for how and why US stakeholders should work with democratic partners in Africa to seek democracy and stability-related outcomes. It includes specific recommendations directed at the US government for using democracy assistance as a tool to advance key African and American priorities. Recognizing that the near-term reality of reduced funding for US government democracy assistance will generate new shortfalls and challenges, this brief also identifies opportunities for other American institutions, namely private philanthropy and the private sector, to partner with key democratic actors and advance DRG practice in Africa.

Why prioritize democracy, good governance, and stability?

There are numerous practical reasons for the US government and constituencies to prefer and encourage democracy, good governance, and stability in Africa. Most importantly, it is what African publics want. Survey respondents on the continent consistently report a preference for democratic systems of government over all other options. The 2021–23 Afrobarometer survey found that, across thirty-nine surveyed countries, 66 percent of respondents prefer democracy over any other kind of government, while 78 percent oppose one-party rule and 66 percent oppose military rule. Despite some erosion in overall support for democracy over the past decade, popular support for democratic governance remains resilient in the face of social and economic headwinds and global momentum for authoritarian governments.

Despite challenges, democratic and institutionally stable regimes have yielded economic, political, and social benefits. The Atlantic Council’s Freedom and Prosperity Indexes show that globally, while gains often take time to accrue, democratizing countries see an average bump of 8.8 percent in gross national product per capita over a twenty-year period compared to their autocratic peers. Meanwhile, institutional instability and fragility remain especially damaging to socioeconomic well-being. Countries with the highest levels of fragility as defined by the Fragile States Index have seen slow or significantly negative economic growth, conflict, and recurrent humanitarian crises. Insecurity and crisis, in turn, create unstable markets, disrupt supply chains, and erode long-term investment for US industries.

From an American perspective, African countries with stable and democratic institutions have been reliable economic, political, and security partners. They are more inclined to establish and strengthen rules-based economic and political systems that protect US and other investors. In regions like the Sahel, as elaborated on below, democratic governments serve as key political and security allies, while undemocratic and especially unstable countries have invited foreign interference by geopolitical rivals and create risks related to radicalization.

Institutional stability will only become more important as the US government and corporations push to expand trade relations and close deals in capital-intensive sectors like mining. Moving forward, the limiting factor on investments that generate returns for African and American economies alike is not the ability of the US government to sign deals today, but its ability to encourage stable economic and political conditions that protect those investments in the years to come.

Priorities for democracy assistance

A sensible US foreign policy interested in achieving meaningful social, political, and economic gains for African partner societies and US stakeholders alike would make diverse investments in stable, democratic, and accountable governance on the continent. We identify three broad priorities that could power an effective democracy assistance strategy:

  1. Invest in countries on a democratic pathway.
  2. Ally with citizens, including in backsliding democracies and autocracies.
  3. Prioritize stabilization and local institutions that enable peace and security.

These priorities and the specific investments listed below are not meant to be comprehensive, but rather indicative of what a balanced and sufficiently ambitious US democracy assistance strategy could entail. The priorities could be applied across a wide set of countries and regions, or focus on specific geographies where the US government has direct economic and security interests, such as large population centers and economies like Nigeria and Kenya, or strategic regions like the Great Lakes, Horn of Africa, and Sahel. Recognizing that the US government is poised to reduce its investments in critical areas of intervention, we identify specific opportunities for private philanthropy and the private sector to play a leadership role in delivering and reenvisioning elements of a democracy assistance package moving forward.

Priority 1: Invest in countries on a democratic pathway

Reinforcing the economic, political, and security gains to democratic stability in Africa, the United States should continue to invest in the success of aspiring and longer-standing democracies on the continent. Democratic governments are better at protecting the rights and well-being of their citizens while creating hospitable conditions for secure, long-term investments and trade relations. Key democratic governments on the continent have set reform agendas with the potential to benefit their citizens and serve near- and long-term American economic and political interests. Furthermore, multiple democratic countries represent anchor security partners for the United States and critical bulwarks against instability, radicalization, and foreign interference in volatile regions such as the Sahel.

Take Senegal, for example. Senegal provides a case study for how a country that has made long-term democratic progress—and that overcame threats to its 2024 presidential election—is prioritizing economic and governance reforms that are responsive to the stated interests of its citizens. Like other recently elected governments on the continent, Senegal’s administration has prioritized anti-corruption, structural economic reforms, and poverty reduction, among other signature initiatives. Senegal’s President Bassirou Diomaye Faye led this effort by declaring his assets during the election and, once in office, announcing audits of the oil, gas, and mining sectors. The administration similarly proposed multiple transparency laws and released previously unpublished reports from anti-corruption institutions.

The extent and success of reform efforts in Senegal remains to be seen, but they have the potential to strengthen its citizens’ socioeconomic security and overall market economy. Alongside Ghana, Senegal remains a long-standing democratic partner in a region where the proliferation of military-led governments has put US security interests and assets at risk, as evidenced by the recent closure of US military bases in Niger. The U.S., therefore, has a direct stake in the success of governance-strengthening efforts in countries like Senegal.

The US government and other entities should make strategic investments in countries on a democratic pathway, like Senegal, to achieve results in high-priority areas of reform and strengthen key institutions, including in sectors of mutual interest to the US stakeholders and partner governments.

  • Prioritize support for reforms that are championed by government partners. External technical and financial assistance is most effective when supporting reform and governance-strengthening initiatives that are owned and led by government partners. Indeed, political commitment alongside bureaucratic capacity are among the interrelated factors contributing to the success or failure of reform. In countries seeking to entrench democratic and economic reforms, the US government can work with partner governments that see their political futures as tied to the success of reforms across a range of economic and social sectors, such as public health, transportation, and financial services where key benefits accrue to US constituencies. The US government can aid these reform efforts by providing technical assistance, technology transfers, and direct financial support, concentrating on sectors where the US has a strategic interest.
  • Continue social and capital investments in democratizing countries. The US government has used vehicles such as the Millennium Challenge Corporation (MCC) to invest in economic and social sectors in countries meeting basic governance benchmarks. This has included, for example, using cofinancing models to support upgrades of the energy sector in Senegal and the transport sector in Malawi. The MCC’s investment-led, government-to-government approach is suited to countries on a stable and democratic trajectory, where US and partner country investments are more likely to be secure. While its future remains uncertain, the MCC and institutions like the Development Finance Corporation can help democratizing countries generate capital for high-priority, high-impact sectors that can contribute to economic growth and social welfare. Looking forward, the US government can maintain investments in strategically important countries like Cote d’Ivoire and Zambia. It can also use its investments to crowd in funding to sectors of mutual interest for African and American businesses and other stakeholders.

The role of other actors: Private philanthropy must maintain support for free and fair electoral systems

The integrity of electoral institutions and, ultimately, the conduct of elections has an outsize influence on the trajectory on democratic consolidation. The US government has decades of experience supporting political parties, strengthening the infrastructure for independent election monitoring, and strengthening electoral management bodies (EMBs), which research shows is critically important to democratic trajectories, including re-democratization. Meanwhile, the current Department of State has backed away from electoral assistance programs and issued directives restricting embassies from criticizing foreign elections.

Given trends in US government policy, private philanthropy can help preserve US leadership in international electoral support. While the philanthropic sector cannot replace US government election funding—which included $48.9 million in support for unanticipated events like snap elections across twenty-eight African countries between 2022 and 2024—it can make high-impact investments that help preserve and build on democratic gains. These investments could include, for example, prioritizing targeted support for EMBs and the electoral monitoring capacities in countries working to consolidate their democratic progress.

Priority 2: Ally with citizens, including in backsliding democracies and autocracies

In pursuing a dealmaking-focused foreign policy, it will be tempting for the US government and private sector to “deal” primarily or exclusively with power-wielding political and economic elites. Doing so risks putting the United States at odds with African publics who express a preference for democracy and accountable governance, while potentially promoting corruption and distorting markets key to fair competition for US and other businesses.

Many African societies have tended to hold positive views of the United States and find resonance with its economic and political values. Recent research from Pew found that the some of the highest US approval ratings from foreign publics come from surveyed African countries. These findings mirror older Afrobarometer data showing that preference for the US development model outcompetes China’s by 11 percentage points across surveyed countries. This research suggests that views of the United States are influenced by its perceived commitments to democratic and free-market development approaches.

An effective foreign policy focused on long-term US interests must grapple with the reality that the political and socioeconomic interests of African citizens are not always served by their leaders. Many regimes tilt the electoral system in their favor, effectively silencing their electorates. Across a range of countries, civil society and human rights leaders face political repression for exercising their fundamental political rights. And too many large-scale investments in extractives and other sectors—including investments led by transactional Chinese state and corporate entities—have undermined the human rights and failed to serve the interests of local communities.

Allying with African citizenries does not mean forgoing economic and political dealmaking. Across regime types, citizens want to see expanded economic opportunity, social welfare gains, and security. Failure to prioritize the economic and political needs and interests of African societies, however, would put the United States on the wrong side of many of the youngest populations in the world, jeopardizing hard-won admiration on the continent. Democracy assistance offers practical tools for supporting and protecting key constituencies.

  • Invest in strengthened economic governance and business climates. African publics and the US government and corporations have a shared interest in strengthening business sectors that enable fair, rules-based market competition. The US government should invest in strengthened economic governance through targeted support to government and nongovernment actors, potentially focusing on sectors with heightened exposure for the United States. This could, for example, include supporting efforts to reduce child labor and forced labor from supply chains, thereby addressing significant human rights violations and leveling the economic playing field for US corporations that must adhere to international labor standards. Where there is state commitment to reform, the US government can support technical assistance to lawmakers and regulatory bodies to put in place and implement legal, policy, and regulatory frameworks that meet international standards. It can also support chambers of commerce, industry associations, and civil society organizations to promote transparent and accountable business practices and advance market-oriented reforms.
  • Prioritize anti-corruption and accountability. Support for anti-corruption efforts by committed government and citizen actors offers a clear opportunity for the US government to stand with African publics. In countries as varied as Gabon, Gambia, Liberia, and South Africa, more than 70 percent of Afrobarometer respondents report that corruption increased “somewhat/a lot” in the past year.” Corruption concerns have helped fueled democratic transitions in countries such as Ghana and Senegal, as well as large-scale protests in Kenya, Madagascar, and South Africa, among others. The US government could assist governments committed to anti-corruption efforts to advance e-governance that has been shown effective at reducing opportunities for corruption. The United States should also support civil society and independent media to conduct investigations, analyze public data, and advocate for public transparency and accountability, including to address regional challenges like cross-border illicit financial flows that harm US economic interests.

The role of other actors: Private philanthropy should prioritize emergency assistance to civil society and human rights institutions

With the near-term decline of the US government’s support to civil society in Africa and globally, private philanthropy is best placed to shore up critical gaps while shifting the terms of assistance for civic institutions. In particular, private foundations can prioritize funding for emergency assistance aimed at protecting individuals and organizations facing acute risks of political repression. The annual value of US government human rights programming in Africa was $21.6 million in fiscal year 2022, of which emergency assistance activities was only a part. The sums involved for sustaining core emergency assistance categories are within the capabilities of individual or coalitions of leading US philanthropies.

Private foundations can also adopt regional or global approaches to directly funding and supporting local civic institutions. This could include developing programs that facilitate horizontal relationships, learning, and mutual assistance among civic actors from Africa, the United States, and other regions grappling with common struggles related to conflict, democracy, and accountable governance in their societies.

Priority 3: Prioritize stabilization and local institutions that enable peace and security

Instability and conflict remain critical challenges across key regions and countries in Africa. The Fragile States Index shows that four out of the five most fragile countries (and sixteen out of the most fragile twenty-five countries) globally are in sub-Saharan Africa. Recent years have seen a rapid expansion in the scope and intensity of conflict in the region. This includes conflicts fueled or amplified by extremist groups in the Sahel, West Africa, and coastal East Africa. It also includes civil conflicts in Ethiopia, Sudan, and South Sudan, among other countries. The human and economic costs of conflict are vast. In 2023, the number of displaced persons in Africa approached 35 million, representing nearly half of the total number of displaced persons globally.

In the DRC and broader Great Lakes region of Africa, the Trump administration has shown a willingness to use its political capital to seek an end to a long-standing and worsening conflict that threatens its trade and investment interests. In late June 2025, the US government announced a peace deal between the DRC and Rwanda governments aimed at halting the conflict between state authorities and the March 23 Movement (M23) rebels. Questions remain about the ultimate effectiveness of the settlement given that M23 and other rebel groups are not direct parties to the agreement. The US government, however, has expressed commitment to its implementation, which it sees as necessary for enhanced American access to critical minerals, including cobalt, copper, and tantalum. As in other countries with active conflicts, the US government has cut important aid programs to the DRC that invest in the social infrastructure and critical institutions necessary for supporting and sustaining peace deals. The long-term durability of any peace, however, depends on empowered individual and institutional structures that can deliver foundational levels of governance, and social and economic benefits that can reinforce stability.

  • Maintain support to networks of peacebuilders at the local, regional, and national levels. Integrated networks of formal and informal peacebuilding institutions and individual activists are critical to monitoring, responding to, mitigating, and managing conflict, especially at the local level. Local peacebuilding committees and related structures have a track record of enabling community-level peace outcomes and social cohesion in countries like Burundi, Ethiopia, Ghana, and Kenya. Similarly, mutual aid groups are playing a key role in responding to the impacts of conflict in contemporary Sudan. The US government should prioritize cost-effective investments in the peace institutions and structures that monitor and strengthen peace settlements, especially in countries and regions where it invests in negotiation.
  • Prioritize stabilization and repairing local institutions. Where it pursues diplomatic solutions to conflict, the US government can help secure gains by investing in interventions that produce stability. The DRC shows how daunting the challenge of stabilization can be, with more than 2 million Congolese having faced displacement from the M23-driven conflict between January and June 2024 alone. Effective stabilization efforts require prioritizing humanitarian responses to meet the basic needs of families and communities experiencing displacement, return, and other traumas. It also must include supporting the reestablishment of local civil society and state institutions that can help deliver services, manage public goods, and resolve disputes.

The role of other actors: The private sector should foster multisector investments in peace and security

The long-term ability of private sector companies to operate and recoup investments in conflict-affected communities depends on durable peace and security. Direct investments in peace dividends (i.e., socioeconomic returns to peace) can help reinforce reductions in conflict. US and other private sector companies are optimally positioned to strengthen their local business environments by making social and economic investments that help communities and regions benefit from periods of relative calm while strengthening overall socioeconomic well-being. This can include making investments in local infrastructure, public goods, and service delivery capacities. Private sector actors, especially within the extractives sector, can also build on frameworks like the Voluntary Principles on Security and Human Rights and commit to business and human rights practices that reinforce good governance and security.

Committing to and growing who leads democracy assistance

During its first ten months in office, the Trump administration has removed long-standing infrastructure and funding for delivering democracy assistance globally, including in Africa. The near- and long-term interests of African societies and key US stakeholders, however, are bolstered by the advancement of democratic, accountable, and stable governance on the continent. Not only is a robust democracy assistance strategy in Africa in line with long-standing US values that underpin America’s reputation and image on the continent, but it is also instrumental to stated objectives of the current administration, such as expanding fair access to strong foreign markets and securing priority peace agreements.

Regardless of its ultimate policy, the US government is, at least for the time being, stepping back from traditional aspects of DRG programming. In this context, other institutional actors can do more. Private philanthropy and the private sector cannot replace US government democracy assistance, but they can make targeted, evidence-based, and cost-effective investments that protect important areas of intervention, such as emergency assistance for human rights defenders, institutional support for EMBs, and pro-peace investments in conflict-affected communities. These and other types of investments are affordable, and when well executed, they can positively influence the trajectories of individual democratic actors, institutions, and partner countries.

Private foundations are especially well positioned to pursue DRG investments while prioritizing direct support to African-based institutions. This can include forging mutual relationships among democratic actors grappling with common 21st-century democratic challenges in Africa, the United States, and beyond, to seed the sector with stronger horizontal ties and novel partnership approaches and new strategies for the future.

about the authors

Mason Ingram is vice president for governance at Pact, a nongovernmental organization that carries out development work around in the world in partnership with private sector organizations government agencies, including with USAID until the agency’s closure in 2025. Pact continues to receive funding from the US Department of State. Ingram has more than 15 years of experience designing, advising, and managing international development programs, with a focus on civil society and governance programming.

Alysson Oakley is vice president for learning, evaluation, and impact at Pact. Oakley also teaches courses on program design and evaluation of democracy assistance and conflict resolution interventions at Georgetown University. Oakley holds a PhD from Johns Hopkins University’s School of Advanced International Studies, and a bachelor of arts degree from Brown University.

Jack Higgins is a research assistant and MA candidate at Georgetown University’s College of Arts and Sciences.


The authors are grateful for consultations provided by experts on democratic governance in Africa, including Dr. Babra Ontibile Bhebe (executive director, Election Resource Centre), Bafana Khumalo (co-executive director, Sonke Gender Justice), Omolara Balogun (head, policy influencing and advocacy, West African Civil Society Centre), Jean-Michel Dufils (retired senior governance research expert and program manager), and Jon Temin (visiting fellow, SNF Agora Institute). 

Related content

The future of democracy assistance

This paper series provides an in-depth look at the many complex challenges to democracy around the world and highlights actionable policies that promote democratic governance.

Trackers and Data Visualizations

Jun 15, 2023

Freedom and Prosperity Indexes

The indexes rank 164 countries around the world according to their levels of freedom and prosperity. Use our site to explore twenty-eight years of data, compare countries and regions, and examine the sub-indexes and indicators that comprise our indexes.

explore the program

The Freedom and Prosperity Center aims to increase the prosperity of the poor and marginalized in developing countries and to explore the nature of the relationship between freedom and prosperity in both developing and developed nations.

The post Democracy and stability in Africa: Why US leadership still matters appeared first on Atlantic Council.

]]>
Engaging generative artificial intelligence in African development https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/engaging-generative-artificial-intelligence-in-african-development/ Thu, 18 Dec 2025 20:03:45 +0000 https://www.atlanticcouncil.org/?p=893977 From classrooms to farming communities, generative artificial intelligence holds great potential for Africa. The question is whether its promise of abundance will reach everyone—or only those already well-connected.

The post Engaging generative artificial intelligence in African development appeared first on Atlantic Council.

]]>

Executive summary

From classrooms to farming communities, generative artificial intelligence (gen AI) holds great potential for Africa. The key question is whether its promise of abundance will reach everyone—or only those already well-connected.

The technology should be regulated with both its strengths and weaknesses in mind, and approached with a healthy dose of skepticism toward corporate advocates; but ignoring the obvious value and use of gen AI makes little sense. Those concerned with development in Africa must engage with the technology and consider its potential for reducing poverty and strengthening education, alongside other priorities such as digitizing and preserving languages.

Gen AI poses real risks and requires guardrails, especially for young people. Yet disengagement carries risks of its own: if gen AI is not actively shaped and governed, the very youths and communities it could benefit—or harm without proper controls—risk being left behind. Not engaging with gen AI would be not only harmful but also patronizing. More conversation is needed between those inventing and implementing gen AI models and those who work in development assistance, including actors involved in shaping and advancing the UN Sustainable Development Goals (SDGs). Two of these SDGs—ending poverty and providing quality education—closely mirror gen AI’s promise, or boast, of future “abundance” and human or even superhuman intelligence. The SDG and gen AI camps must explore what each can realistically offer the other.

View the full issue brief

Related content

In partnership with

Explore the program

The Africa Center works to promote dynamic geopolitical partnerships with African states and to redirect US and European policy priorities toward strengthening security and bolstering economic growth and prosperity on the continent.

The post Engaging generative artificial intelligence in African development appeared first on Atlantic Council.

]]>
Beijing pressures Taiwan’s remaining diplomatic partners. Here’s what the US should do in response https://www.atlanticcouncil.org/in-depth-research-reports/report/maintaining-taiwans-international-space-to-enhance-deterrence-against-china/ Mon, 15 Dec 2025 19:30:00 +0000 https://www.atlanticcouncil.org/?p=893327 Taiwan’s shrinking circle of diplomatic partners plays a crucial role in deterring Chinese coercion, and the United States needs a more targeted strategy to help preserve this support and maintain cross-strait stability.

The post Beijing pressures Taiwan’s remaining diplomatic partners. Here’s what the US should do in response appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Taiwan’s official diplomatic partners play an important role in the island’s ability to directly engage the global community. Beijing is seeking to isolate Taiwan by peeling those partners away.
  • Countering Beijing’s isolation campaign could bolster deterrence by forcing China to question how big of an international outcry it could face if it violates Taiwan’s security.
  • This will require the United States to think seriously about the benefits it offers these partners and how it can team up with Taiwan to maintain the status quo.

Introduction

Taiwan occupies a fraught diplomatic position. Beijing claims sovereignty over the island, maintains a threatening presence around it, and seeks to push Taipei out of diplomatic circles to support its claims that only Beijing—and not the government in Taipei—can effectively represent the island. Taiwan, in contrast, seeks to maintain space for its democratically elected government to speak on its own citizens’ behalf and advocate for their interests in the international arena. From a deterrence perspective, the more Taiwan can advocate for its own interests with global stakeholders, the higher the international cost Beijing would pay for taking the island by force and, thus, the stronger the deterrence against doing so. Based on China’s own war plans,1 Beijing’s first step in a coercive move against Taiwan would be to establish global information control: cutting Taipei off from the global community and claiming that Beijing speaks for the island. Beijing is laying that groundwork now, working across multiple fronts to isolate Taiwan and create maneuvering room for coercion. Chinese diplomats are pushing Taiwan out of United Nations (UN) bodies, keeping it from joining multilateral meetings, and bullying Taiwan’s smaller partners to push them to distance themselves from the government in Taipei. Taiwan’s diplomatic partners are a particularly important battleground. At present, Taiwan only has twelve official diplomatic partners that maintain a formal diplomatic relationship with Taipei. Those relationships—and Taiwan’s other partnerships—play a critical role in maintaining deterrence.

Washington’s role in Taiwan’s diplomatic positioning is unique and complicated. The United States aims to thread a delicate needle: acknowledging that there is “one China” and the Chinese Communist Party (CCP) is the government in charge while also deterring any attempts to take the island by force, which includes assistance to bolster Taiwan’s self-defense capabilities. The United States has always sought to tread lightly on the issue of Taiwan’s diplomatic partners. Washington “flipped” its own formal diplomatic recognition from Taipei to Beijing in 1979. Encouraging other nations to do what Washington did not—maintain a formal diplomatic relationship with Taipei—is diplomatically awkward. But changing times might call for new approaches. Most of Taiwan’s remaining diplomatic partners lie in the Western Hemisphere and the Indo-Pacific, two priority regions for deterring Chinese initiatives that directly threaten US security interests. This is especially true for the Western Hemisphere, which is a top priority for Donald Trump’s second administration. In both regions, there are nations that play an outsized role in Taiwan’s global diplomatic presence and allied efforts to deter Chinese coercion toward the island. The United States should consider developing a more targeted strategy for supporting these nations and the role they play in cross-strait stability.

This report will assess how Taiwan’s diplomatic partners contribute to peace and stability in and around the island, and what the United States and its allies can do to maintain, and potentially even bolster, this critical aspect of deterrence. It draws on extensive case studies from the Pacific Islands and Latin America and the Caribbean, obtained through in-depth interviews with representatives from Taiwan and its partners in those regions.

Taiwan’s democratic awakening and its diplomatic space

Taiwan’s complicated diplomatic status is rooted in its history. In 1945, the Republic of China (ROC), which had served as the ruling government on the Chinese mainland since the end of the Qing Dynasty in 1911 and fought on the allied side in World War II, accepted Japan’s surrender in Taiwan and took over the island’s administration pursuant to Allied General Order No. 1. In 1949, the CCP defeated the ROC in mainland China and the ROC fled to Taiwan, but the civil war continued. At that time, most nations still maintained formal diplomatic relationships with the ROC, which occupied the “China” seat at the United Nations (claiming to represent all of China at the time, including Taiwan and Mongolia) from its island perch.

In the 1970s, as the CCP’s power grew, many countries began to support its claim as the sole legitimate government of China, shifting their diplomatic recognition from Taipei to Beijing.2 In 1971, recognizing that the ROC no longer enjoyed majority UN support to occupy the “China” seat, the ROC government in Taiwan preemptively left the United Nations as a formal nation-state member. In 1979, the United States switched its own diplomatic recognition from the ROC in Taipei to the People’s Republic of China (PRC) in Beijing. Since then, Washington has maintained an official diplomatic relationship with Beijing and an “unofficial” relationship with Taipei. However, this is based on an assumption that Beijing will not seek to take Taiwan by force. The 1979 Taiwan Relations Act (TRA) states that the US “decision to establish diplomatic relations with the People’s Republic of China rests upon the expectation that the future of Taiwan will be determined by peaceful means.”3 The United States also pledged in the TRA to “provide Taiwan with arms of a defensive character” and “maintain the capacity of the United States to resist any resort to force or other forms of coercion that would jeopardize the security, or the social or economic system, of the people on Taiwan.”4

In 1996, Taiwan held its first direct presidential election, marking the island’s official transition to democracy. Throughout the 1980s and 1990s, Taiwan’s growing democratization brought identity issues to the fore. Those who came to Taiwan in 19495 with the Kuomintang (KMT) brought ties from the mainland and largely supported the idea of a Chinese nation including both the mainland and Taiwan. By the 2000s, the KMT had begun to prioritize a close and peaceful relationship with Beijing. In contrast, Hoklo Taiwanese who immigrated to the island prior to 1949 were generally more suspicious of Beijing. They tended to support an independent Taiwan—separate from mainland China—and to identify with the Democratic Progressive Party (DPP).

As the island developed its own identity at home, Beijing steadily pushed Taiwan out of international spaces abroad. In 1969, Taiwan had seventy official diplomatic partners. By 1996, that number was down to thirty. Taiwan lost its membership in international organizations such as the World Bank and the International Monetary Fund. Successive democratically elected leaders in Taipei tried to find ways to thread a tricky diplomatic needle: maintaining Taiwan’s international presence without claiming to also represent mainland China or directly refute the need to declare a de jure independent nation of Taiwan, which would trigger conflict with the CCP. 6 From 1988 to 2000, then President Lee Tung-Hui (a KMT politician) positioned the island as the “Republic of China on Taiwan” in a bid to carve out space for Taiwan at the United Nations, separate from Beijing’s China but without declaring independence from Beijing. This became a compromise term within Taiwan, one that Taiwan’s pro-independence crowd and those who still believed in a single China under the ROC (including both the island and the mainland) could both accept politically. All of Taiwan’s presidential administrations (including the present one) have maintained this official position.7

From 2000 to 2008, then President Chen Shui-Bian’s DPP administration tried to use Taiwan’s then superior economic resources to cultivate new diplomatic partners. That effort was largely unsuccessful. From 2008 to 2016, under then President Ma Ying-Jeou’s KMT administration, Beijing agreed to a “diplomatic truce” in which it would not seek to poach Taiwan’s diplomatic partners and the Ma administration would refrain from asserting Taiwan’s sovereignty on the international stage. Beijing was willing to offer this olive branch because it correctly viewed the KMT as more accommodationist toward Beijing than the DPP. This approach preserved Taiwan’s partners but confused them regarding Taiwan’s status vis-à-vis Beijing.

Everything changed in 2016. The people of Taiwan elected DPP candidate Tsai Ing-Wen as president (2016–2024). Beijing despised Tsai because her electoral success represented a step back in China’s ambitions to “reunify” the island with the mainland and bring it under CCP control. The Chinese government responded with a scorched-earth approach that ratcheted up the pressure on Taiwan across all domains. Militarily, Beijing increased its military exercises around Taiwan and incursions into Taiwan’s air defense identification zone (ADIZ). On the diplomatic front, Beijing stepped up the old “three none policy,” which aims to leave none of Taiwan’s diplomatic partners standing, none of Taiwan’s international space intact, and Taiwan with none of the bargaining chips it needs to negotiate on equal grounds.8 In the multilateral space, Beijing began driving Taiwan out of arenas such as the World Health Organization that do not require nation-state status and that Taiwan had participated in up to 2016. The Chinese government also ramped up its campaign to pressure Taiwan’s remaining diplomatic partners to flip their recognition from Taipei to Beijing. From 2016 to 2023, the island’s diplomatic partners decreased from thirty to twelve. Even those nations that had already recognized Beijing as their official diplomatic partner (while maintaining unofficial relationships with Taiwan) faced intense Chinese government pressure to reduce or curtail their engagements with Taiwan.

Today, ten of Taiwan’s twelve remaining official diplomatic partners are located in two regions: the Pacific Islands and Latin America and the Caribbean.

Beijing is waging a campaign in these regions to further isolate Taiwan. In order to counter this campaign, it is critical to first understand how it has unfolded thus far. The campaign includes a mix of carrots and sticks. On the inducement side, China seeks to entice countries to switch their allegiance by offering an array of economic benefits: access to China’s market, infrastructure investments, loans, and more.9 China is very public about its inducements but tends to wield the sticks behind closed doors. This report draws on interviews with government officials and journalists from Taiwan and six of Taiwan’s remaining diplomatic partners, as well as two of its former diplomatic partners, to map the range of tools Beijing deploys in its campaign to isolate Taiwan.

The following sections utilize four case studies—Palau, St. Lucia, the Dominican Republic, and Honduras—to illuminate Beijing’s tactics.

Palau: Coercion and promises

Palau is one of Taiwan’s most important partners in the South Pacific, maintaining reciprocal embassies and direct engagement with Taipei. Taiwan has provided technical assistance to Palau since 1984, including agricultural and engineering assistance. Starting in 2017 (after the people of Taiwan elected a DPP presidential administration), the Chinese government launched a coercive campaign to push Palau to derecognize Taiwan. This has particular significance for the United States because Palau is a Compact of Free Association (COFA) member, granting basing access to the US military in exchange for US assistance. China’s success in flipping Palau would thus rob Taiwan of a diplomatic partner and also potentially undermine the US military’s ability to operate in the Indo-Pacific.

Prior to COVID-19, tourism contributed more than 40 percent of Palau’s gross domestic product (GDP), with 60 percent of tourists coming from the PRC.10 Beijing leveraged these ties for economic coercion against Palau. In November 2017, Beijing banned Chinese tour group travel to Palau as part of a broader coercion campaign against multiple Taiwan partner nations.11 To restrict tourism from all nations, Chinese-owned and operated hotels on Palau blocked bookings for months at a time, keeping rooms empty to prevent tourists from visiting the island and hiking up prices for airlines seeking accommodation for overbooked passengers. In 2024, the Chinese government declared Palau unsafe to travel.12 Beijing also banned Palau’s presence at the Pacific Asia Travel Association in Macau, despite Palau being a member.13

Palau—along with other Pacific Island countries—also faces Chinese government bullying in regional settings such the Pacific Islands Forum (PIF). In 2022, despite being barred from attendance, China attempted to attend the PIF Summit for the Suva Agreement, an agreement on how future PIF leadership will be elected and rotated between all members. The representative was removed but later demanded bilateral meetings with individual members and lobbied for China’s own draft version of the agreement on how to determine future PIF leadership. The attempt failed but a source in Palau was alarmed and saw Beijing’s attempted interference as an example of how Beijing could target Palau and other regional Taiwan partners on Taiwan-related issues during multilateral meetings.14

China has also increased maritime harassment near Palau’s territorial waters and submarine cables, with Chinese research vessels entering Palau’s exclusive economic zone (EEZ) without notification and getting within range of sensitive facilities on the island.15 Beijing times these incursions to coincide with storms, when the waves are too high for Palauan patrol boats to intercept them.

Due to these ongoing activities, there is substantial anti-China sentiment in Palau. Yet Beijing promises benefits if Palau switches recognition, including promises to “flood Palau with visitors” and satisfy “whatever Palau needs.”16

Thus far, local support remains lukewarm, driven by an inability to articulate the benefits of siding with China and the exact vision of such a future, as well as concerns around regional experiences such as China’s takeover of Sri Lanka’s Hambantota Port and the way unsustainable Chinese lending contributed to Tonga’s astronomical debt.17 There are also regional examples that do not instill confidence, including an instance in which Chinese firms bought a lease for land development in Palau but never followed through, China’s unfulfilled promise to Kiribati for an airstrip, and the opacity of Kiribati’s dealing with Beijing.18 One source indicated that, while loan-based projects offered by Taiwan have negotiated fixed interest rates, China tends to manipulate interest rates and is reluctant to provide grants, share expertise, or address local concerns.19 In addition, China tends to extend the grace period of repayment without extending the maturity, resulting in a spike in repayment amounts for the last few years and placing enormous pressure on island governments.20

A diplomat from one of Palau’s Pacific neighbors also complained that while they regularly tried to talk to China about their own development needs, Beijing rarely listened. Instead, China came back with its own economic development concepts, designs, engineers, and contractors, and was not open to consultation.

While local experts estimate that about one-third of Palauans might consider switching recognition to China in the future, Palau President Surangel Whipps, Jr., is strongly anti-China, declaring “Palau is already at war with China.” This moment, in which China has adopted a “biding its time” approach to neutralizing Palau, presents a good opportunity to reassess Taiwan and the United States’ strategy for empowering Palau and blocking further PRC encroachment into the Pacific.

St. Lucia: Coercion and unfulfilled promises

The island nation of St. Lucia is a unique case in that it initially flipped diplomatic recognition from Taipei to Beijing in 1997 but flipped back to Taipei in 2007. Those flips followed electoral shifts: the St. Lucia Labor Party (SLP) came to power in 1997 (triggering the first flip) and the United Workers’ Party (UWP) in 2007 (triggering the second). Along the way, China’s unfulfilled economic promises grew stale. When the SLP regained power in 2011, coinciding with China and Taiwan’s diplomatic truce under Ma and the KMT, the SLP decided that sticking with Taiwan was in St. Lucia’s best interest.

St. Lucia’s initial switch to Beijing was partially motivated by then Foreign Minister George Odlum’s desire to jumpstart major infrastructure projects. Beijing promised St. Lucia a fifteen-thousand-seat football stadium and a national mental health hospital. However, Beijing lost interest in these projects after it achieved St. Lucia’s diplomatic switch. Both projects became emblematic of unmet promises. After signing a memorandum of understanding (MoU) to develop the stadium, China determined—without consulting St. Lucia—that the island did not require such a large stadium. Beijing unilaterally downgraded the plan to a smaller, 7,000–8000-seat stadium. Sources interviewed for this report expressed great displeasure with the downgrade and the fact that St. Lucia was not consulted. The electronic scoreboard for the smaller stadium stopped working a week after installation and the steel railing around the audience seating area began to crumble from rust soon after. The St. Lucian government considered demolishing the stadium, but ultimately decided to turn its clubhouse into an outpatient area for a local hospital. Chinese contractors never finished the national mental hospital; the project dragged on in a ten-year design and construction process.

By 2007, St. Lucia decided it had made a mistake in switching to Beijing and that Taiwan’s previous assistance was more valuable than Beijing’s unfulfilled promises. Once the UWP regained power, the pro-Taiwan John Compton cabinet orchestrated a switch back to recognizing Taiwan. Beijing responded by dismantling the partially constructed national mental hospital. Chinese firms took everything that was remotely useful from the site—including parts from unfinished elevators, cables, and other materiel—for transport back to China. They then salted the earth around the hospital so nothing could grow there. The hospital, however, was later completed with Taiwan’s assistance after the 2007 switch.

The 2008–2016 diplomatic truce between China and Taiwan (during the time when Taiwan elected KMT presidential administrations and Beijing sought better relations with the island) limited China’s overt retaliatory actions against St. Lucia. However, covert efforts continue. Of particular concern, Beijing appears to be leveraging regional settings such as Caribbean Community (CARICOM) meetings to pressure its own partners in the Caribbean to induce or coerce Taiwan’s regional partners to switch recognition.21 These forums are intended to focus on economic issues, but the nations that recognize Beijing periodically bring up Taiwan’s recognition in ministerial meetings. When pressed, representatives from those nations have admitted that they are doing so due to Chinese pressure.

From St. Lucia’s perspective, Taiwan has proven to be a steady partner. Following its disastrous infrastructure deals with the PRC, St. Lucia pivoted to focus on developing existing agricultural industries such as bananas and watermelons, two products that Taiwan’s agricultural experts have a strong technical background in. As a small island developing country, St. Lucia prioritizes education and healthcare, and Taiwan’s more flexible and responsive aid and scholarship programs were well received by the local population. Taiwan’s International Cooperation and Development Fund (ICDF) and its Ministry of Foreign Affairs join forces to offer roughly forty scholarships exclusively for St. Lucian students to study in Taiwan every year, predominantly for undergraduate degrees. Taiwan’s first post-2007 ambassador also pioneered and paid for local irrigation cannels that subcontract local labor for construction. While relations between St. Lucia and Taiwan remain strong, this moment calls for Taiwan and the United States to organize a “best fit” plan to integrate St. Lucia into the United States’ and Taiwan’s industrial and agricultural supply chains.

The Dominican Republic: Flip leads to frustration

The Dominican Republic established diplomatic relations with the PRC in 2018 and cut relations with Taiwan. The sources consulted for this case study—who include high-ranking public officials, former cabinet members, and industry association leaders—said hopes were high about the advantages of strengthening relations with China. They also agreed that these hopes have not been realized, and that the Dominican Republic is generally frustrated with the results.

China began engaging the Dominican Republic (DR) in the 1990s, when the latter was still a Taiwan diplomatic partner, signing an economic and diplomatic cooperation agreement with Santo Domingo in 1993 and opening commercial offices in the Dominican Republic. Diplomatic collaboration between Santo Domingo and Beijing widened in the 2000s, including mutual support when either nation applied for seats in UN offices and councils.

In 2005, Beijing decided to launch a pressure campaign to push the Dominican Republic to flip its official diplomatic partnership from Taipei to Beijing. Then Foreign Minister Carlos Morales Troncoso met then PRC Vice President Zeng Qinghong to discuss plans for President Leonel Fernández’s to visit China. At that meeting, Zeng claimed that the Dominican Republic had committed to establishing diplomatic relations with the PRC when signing the 1993 economic agreement, and that the PRC was increasingly upset that the commitment hadn’t been honored. Zeng also said that a friend of Taiwan was an enemy of China. He reminded the foreign minister that, without formal diplomatic relations between the PRC and the Dominican Republic, the PRC could not receive the DR president as a head of state and thus the president’s planned visit to China could not proceed as planned.

Taiwan tried to keep the Dominican Republic onside with new investments and commitments. In 2018, then President Danilo Medina announced the Dominican Republic would cut relations with Taiwan and pivot to the PRC. Administration officials publicly denied it would take place until they suddenly announced it. The private sector generally welcomed the change. A national business association publicly praised it, noting that major Dominican importers of machinery and other goods had created sustained pressure for flipping to China. Meanwhile, the PRC helped the Dominican Republic’s effort to attain a UN Security Council nonpermanent seat. This was something the Dominican Republic failed to secure several times between October 2001 and 2018 but—only thirty-eight days after switching diplomatic recognition—it succeeded, backed by Beijing’s lobbying, winning the General Assembly vote with 184 out of 190 ballots.

However, expectations soon soured. Business leaders have been especially disappointed with the PRC’s commercial penetration via stores that sell all kinds of cheap goods—sometimes in direct competition with Dominican products—and use Chinese clerks and Haitian laborers instead of employing Dominican nationals. This dislocated Dominican commercial institutions and disrupted all levels of commerce. Chinese companies also evade local regulatory guidelines. When tax and customs authorities attempt to audit PRC businesses for tax evasion, these businesses have been known to evade enforcement by relocating or opening another operation with a different name and commercial registration.

There are also concerns about illegal mining. PRC mining companies have exported bauxite at suspiciously high volumes and prices because their exports actually contain higher-value titanium dioxide and rare earths. PRC companies have acquired copper mine rights from the Dominican Mining Corporation (CORMIDOM) and there are rumors of Chinese operations in the Falcondo ferronickel project. At present, DR officials do not seem to be seriously considering flipping back to Taiwan as St. Lucia did. However, there is growing DR interest in welcoming Taiwan to establish a commercial representative office in the Dominican Republic, which would be consistent with how most nations balance official relations with China and unofficial relations with Taiwan. Dominican officials state that, when the Medina government negotiated the pivot, it did not accept Beijing’s demands for an exclusivity clause preventing relations with Taiwan. They point out that all of China’s BRICS (Brazil, Russia, India, China, and South Africa) partners—as well as Japan, South Korea, and the United States—maintain unofficial relations with Taiwan.

Case study: Honduras

Honduras established diplomatic relations with what was then the government of China in 1941, when the ROC government still resided on the mainland. Tegucigalpa continued diplomatic relations with Taiwan until March 2023, when the new government under Xiomara Castro severed ties, established formal relations with the PRC, and announced that Honduras recognized “only one China in the World” with Beijing its sole and legitimate government.22 Castro made switching diplomatic relations part of her campaign for office, in contrast with her predecessor Juan Orlando Hernández (2014–2022). The shift reflected growing economic pressure, including Honduras’s high external debt, Taiwan’s refusal to forgive a $2.45-billion loan, and enticements such as the lure of a free trade agreement with China and promised Chinese investment in a hydroelectric dam that Taiwan was unable to match.23 Conversations with a Honduran journalist confirmed this account: the Honduran government issued “a kind of diplomatic ultimatum to Taiwan” to renegotiate Honduras’s debt with Taiwan and support public infrastructure construction.24

While Honduras tried to negotiate better concessions from Taiwan, China’s tactics included a combination of threats and enticements that influenced the Honduran government’s decision.25 Two years after the switch, a closer look at the actual fallout illuminates some of the short- to medium-term impacts.

In July 2023, following the flip, China and Honduras began negotiating a free trade agreement (FTA) that promised to reduce or eliminate tariffs and improve access to the Chinese market for Honduran exports. Early negotiations also laid out a framework around “comprehensive and in-depth” consultations on trade in services as well as investment protections and rules.26 While still ongoing, the FTA negotiations reached an “early harvest” agreement that both countries signed in early 2024.27 Honduras hasn’t joined the Belt and Road Initiative (BRI) but signed two MoUs—one in June 2023 and a second in December 2024—as part of the process to join.

To many Hondurans in the business sector, the results of the FTA have been meager so far and private-sector sources interviewed for this report have complained about not being sufficiently represented in the FTA negotiation committee.28 Shrimp producers and exporters were the main losers from the diplomatic pivot. Cutting ties with Taiwan—the industry’s principal buyer—devastated the sector, and exports fell by 67 percent after Honduras switched recognition and Taiwan terminated the Honduras-Taiwan FTA.29 Interviewed sources framed this loss within a broader concern about replacing a trade partner with which Honduras maintained a positive balance (Taiwan) with one with which it holds a large deficit (the PRC).

Since the pivot to the PRC, local businesses in Honduras’s main cities have grown increasingly uneasy about the growing number of Chinese-owned establishments competing with them. One source cited rising Sinophobia among local shop owners as a concern. Labor law compliance has also drawn attention, and recent reporting revealed that Chinese construction companies employ a higher percentage of Chinese workers than Honduran regulations allow.30

While the Castro government will leave office at the end of January 2026, and both candidates vying for the presidency vowed to reengage Taiwan, the way the Castro government engaged with China is illustrative for other countries in the region. Both local sources cited above warned that information about negotiations between the Castro government and the PRC is worryingly opaque. There is little public knowledge about the content of the ongoing FTA talks, and business leaders report feeling inadequately represented.31 They also noted that only one of the seventeen diplomatic agreements signed between the PRC and Honduras in 2023 has been even partially implemented. One local journalist interviewed for this report said analysts have cautioned that China is a demanding creditor—unlike development partners that offer flexible debt renegotiation—and warned that access to public resources and strategic infrastructure could be jeopardized if Honduras misses payments. He added that the lack of transparency and anti-corruption oversight in Chinese credit lines is also troubling.

Another local journalist observed that while PRC-funded projects to improve education and build agricultural schools have progressed, they remain incomplete. Meanwhile, Taiwan’s scholarship program has been suspended. Honduran students still studying in Taiwan receive inadequate support, and the PRC has yet to meaningfully replace this program as promised.

Finally, local journalists expressed concern about Chinese censorship and surveillance. The Chinese embassy issued a press release condemning critical coverage of the shrimp export collapse by Honduran outlet El Heraldo. The embassy demanded that the newspaper refrain from referring to Taiwan as separate from mainland China, claiming such phrasing violated the “one China” policy. Although the press release was later removed from the embassy website following public backlash, local journalists interpreted it as an attempt at censorship. These concerns compound existing fears about surveillance, especially after the national telecommunications company signed an agreement with Huawei to provide police monitoring technology and security camera systems—an arrangement that could enable Chinese government espionage and raises national security concerns.

Lessons and recommendations for Taiwan, its partners, and the United States

A closer look at China’s engagement with Taiwan’s current and former partners reveals a concerning pattern. China consistently targets Taiwan’s partners with diplomatic and economic pressure urging them to switch their official recognition to Beijing. Once that happens, China’s interest in and support for the target nation appears to diminish, as reflected by the lack of follow-through on promises made to countries in the years following a switch. As a result, these countries face economic loss on two fronts. They forgo the benefits they previously gained working with Taiwan, and the engagement with Beijing either fails to meet their expectations or, as in the Dominican Republic’s (and potentially Honduras’s) experience, brings new models of commerce that undercut local production and the local tax base. As a journalist in one of these countries put it, there was “no golden pot at the end of the rainbow.”32

This pattern presents an opportunity for Taiwan to proactively engage its remaining diplomatic partners to prevent economic and diplomatic disengagement. It also serves as a warning to countries considering switching recognition. Lastly, given that most of Taiwan’s partners are in Latin America and the Caribbean and the Indo-Pacific—two regions of utmost strategic importance to the United States—these case studies also present opportunities for the US to reengage with Taiwan on jointly maintaining those partnerships.

Taiwan

The interviews and case studies conducted for this report suggest five key recommendations for Taiwan.

Clarify exactly what Taipei gains from diplomatic partnerships. If certain relationships are a high priority, invest to maintain them.

Taiwan lacks a clear strategy for leveraging diplomatic partners as deterrence against China. It needs one. If certain nations are critical for Taiwan’s international presence and voice, Taipei should prioritize and invest in them. Many diplomatic partners expressed confusion over Taiwan’s stance on sovereignty and cross-strait issues. More communication is needed if these partners are to support Taiwan’s diplomatic standing. Alternatively, if commercial engagement suffices for deterrence and diplomatic recognition is less important, Taiwan should shift its resources accordingly and focus on those nations that are a priority for other reasons, regardless of their diplomatic stance.

Highlight China’s broken promises.

Based on the case studies above, when China uses inducements to bring about a flip in recognition, these promises often fall short. Taiwan should share these examples widely with current partners.

Offer what Taiwan can, and coordinate with the United States and likeminded countries.

Countries’ needs differ depending on their unique circumstances and levels of development. Aid should match Taiwan’s strategic goals of preserving diplomatic space and imposing costs on China, and should include some of Taiwan’s competitive advantages—bespoke aid and technological assistance that addresses specific needs of small island countries. Taiwan should also leverage US and allied efforts to counter Chinese influence, collaborating on solutions such as integrating Taiwan’s current and prospective diplomatic partners into trusted supply chains where doing so makes economic sense for all parties.

In the case of St. Lucia, while a US-Taiwan joint assistance effort has been discussed since 2018, little concrete cooperation has materialized. Taking inspiration from Taiwan’s recent efforts to integrate Guatemala into the US-Taiwan semiconductor supply chain, and from the second Trump administration’s focus on the Western Hemisphere, the United States and Taiwan should leverage their respective technical expertise and available resources to elevate St. Lucia’s economic position by integrating it into global supply chains or channeling transnational tourism such as cruise ships to St. Lucia, among other strategic partners in the region.

The Dominican Republic needs support with both agriculture and housing, two areas where targeted assistance from Taiwan would be very welcome. Taiwan could contribute significantly through academic and scientific collaboration and commercial partnerships around advanced mechanization, modernization, and automation of the Dominican Republic’s agriculture sector. With regard to housing, Taiwan could bring its expertise in construction of large housing complexes to the Dominican Republic. With a historical housing deficit exceeding 1 million units, the Dominican Republic desperately needs capabilities to assist in this area (and Beijing is not delivering on this front, creating an opportunity to build other partnerships).

Increase capacity building and law-enforcement cooperation.

In Palau, the Global Cooperation Training Framework (GCTF) interventions have received high praise for their contribution to capacity building in cybersecurity and investigating artificial intelligence (AI)-related criminal activities. However, additional efforts in training and equipment are needed to ensure the Palau government has what it needs to ensure transparency and independence from Chinese maritime coercion.

Similarly, in the Caribbean, St. Lucia relies heavily on foreign assistance for both its current stability and future development. Capacity building programs such as those provided by the GCTF received universal praise from sources interviewed for this report. These workshops covered topics from empowering local women to start businesses to maritime disaster prevention to counter-narcotics. Drug trafficking through the region, specifically the gun violence associated with narcotic activities, poses a significant threat to St. Lucia’s major industry of tourism. Additional joint efforts by the United States and Taiwan in this area should prove beneficial to trilateral interests. The United States is St. Lucia’s main source of tourism, so these efforts would also directly benefit the United States by keeping Americans safe and reducing trafficking into the United States.

Maintain a principled approach to diplomatic outreach.

While the PRC pressures its regional partners to exclude Taiwan and counter US influence, the United States and Taiwan should leverage regional settings to highlight their principled approach. Two cases highlight these contrasting approaches. In 2017, Hurricane Maria devastated the Commonwealth of Dominica. Dominica requested aid from Taiwan through the Organization of Eastern Caribbean States (OECS) and Taipei agreed, even though Taiwan does not have an official diplomatic relationship with Dominica. In contrast, when Taiwan’s diplomatic partner St. Vincent and the Grenadines experienced a volcano eruption in 2019 and requested assistance from China through the OECS, Beijing refused to provide aid on account of the country’s diplomatic ties with Taiwan. Beijing’s actions affirmed its political priorities over humanitarian ones and provided an opportunity for the United States and Taiwan to demonstrate their more principled stance.

For Taiwan’s partners

Lessons from countries that switched to China include the following:

View China’s promises with caution.

Honduras swapped a positive trade balance with Taiwan for a trade deficit with China, while Chinese-owned establishments undercut local Honduran businesses. Similar patterns emerged in the Dominican Republic, where Chinese stores sell cheap consumer products that compete with domestic production rather than transform the Dominican productive structure or integrate PRC firms into export-oriented or domestic manufacturing.

Honduran shrimp farmers suffered greatly, with exports declining by 67 percent after Honduras switched its recognition to China and Taiwan terminated its FTA. St. Lucia saw China fail to address World Trade Organization (WTO)-related losses stemming from the “banana wars,” a long-running trade dispute (1993–2009) between the European Union (EU), the United States, US-based banana companies (e.g., Chiquita, Dole), Latin American banana-producing countries (Ecuador, Guatemala, Honduras), and Caribbean small-island exporters, including St. Lucia.

Two years after the switch, China had only implemented one of the seventeen agreements it signed with Honduras. In the Dominican Republic, the expected and hoped for influx of Chinese investment and construction never materialized. Instead of producing aluminum at a plant in the Dominican Republic, Chinese investors imported aluminum from China and labeled it as locally made. In St. Lucia, construction of the national mental health hospital dragged on for ten years and was finished only after Taiwan stepped in.

For the United States

Partner with Taiwan to support local needs including disaster relief.

The United States should consider helping to sustain Taiwan’s official diplomatic relations as a means to uphold the international status quo and deterrence. To that end, it could deepen cooperation between the US Development Finance Corporation (DFC) and Taiwan’s International Cooperation and Development Fund (ICDF), providing infrastructure and economic growth programming to Taiwan’s partners. Expanding the MoU between the American Institute in Taiwan (AIT), the Taipei Economic and Cultural Representative Office in the United States (TECRO), and the DFC would leverage the DFC’s financial tools and the ICDF’s trusted presence.33 Additionally, the increased US military presence and base access in the Western Hemisphere can also provide, in conjunction with Taiwan’s ICDF and NGOs such as Tzu Chi, increased capacity for disaster relief for Taiwan’s diplomatic partners in the region.

Moreover, future friendshoring and nearshoring efforts targeting Taiwan’s partners should ideally be done in coordination with the United States and its allies. Current joint US and Taiwanese efforts to include Guatemala in the semiconductor supply chain could be a template for these future endeavors.34 Future joint initiatives could focus on resilient infrastructure, renewable energy, and digital transformation—areas in which both Washington and Taipei seek to counterbalance Beijing’s state-led investments under the BRI.

Increase technical support and leadership for strategic local communities.

Technical support and aid from the United States and Taiwan are both visible and popular in Palau but are seen as underwhelming. The US military recognizes Palau’s strategic significance for future conflicts with China and conducts air defense exercises there, firing PATRIOT missiles from Palau into the surrounding ocean. Local residents know a single training round costs around $1.5 million. They see a disparity between what the United States spends firing missiles from the island versus its meager investments in the infrastructure assistance Palau urgently needs. Working with local communities to identify and fill targeted local infrastructure needs would go a long way toward winning local hearts and minds.

Similarly, a coalition of Pacific countries that includes the United States could help to counter China’s playbook in the Pacific. China often bullies individual smaller countries in bilateral meetings on issues concerning the United States and Taiwan, while playing them against their neighbors. And with enough countries in its pocket, China can then manufacture regional consensus in regional multilaterals against US and Taiwanese interests. To that end, the United States and Taiwan should leverage the close-knit nature of Pacific communities, counter China’s attempts to monopolize regional meetings, and strengthen US-Pacific ties through subnational diplomacy (such as close ties between American Samoa, Guam, Hawaii, and Pacific countries). Holding future regional forums on US territories that discuss regional affairs and collaboration would counter China’s influence playbook by leveraging the US presence and stake in the Pacific, something China sorely lacks.

Conclusion

Maintaining Taiwan’s diplomatic relationships is not a sentimental task; it is a matter of strategic deterrence for both Taipei and Washington. Beijing does not execute a global diplomatic campaign without a purpose. It is systematically targeting Taiwan’s partners in a bid to isolate the island and provide more maneuvering room for potential future Chinese coercion against Taiwan. Slowing that progression could provide a countervailing force, causing China to question how big of an international outcry it could face if it violates Taiwan’s security. And there are weaknesses at the center of Beijing’s approach. From Honduras and St. Lucia to the Dominican Republic and Palau, these case studies reveal a consistent pattern: China couples high-visibility promises with diplomatic and economic coercion but often underdelivers once it achieves its goal of flipping recognition. Moreover, countries often find themselves more economically vulnerable and more exposed to opaque governance and policies after the switch, since China rarely discloses financial details of its loan or investment, nor does it require their partner countries to do so for their populace. By contrast, Taiwan’s engagement—while often under-resourced and strategically under-articulated—tends to be steadier, better at addressing actual needs, more reliable, and better aligned with partner countries’ long-term development goals.

For Taipei, there is an urgent need to clarify Taiwan’s diplomatic and strategic objectives with partner countries. If there are material benefits to having more diplomatic partners or keeping certain nations onside, then Taiwan should invest in these nations accordingly, share “buyer beware” lessons learned from recent switchers, and coordinate with the United States and likeminded partners and democracies to address the needs that Taiwan cannot meet alone.

For Taipei’s partners, the pattern of China’s behavior suggests the need to carefully weigh Beijing’s short-term inducements (and any political wins they might produce for local officials) against long-term structural economic imbalances and overreliance on the PRC, as well as recognizing the strategic value of ties with Taiwan, especially vis-á-vis the United States.

For Washington, there is an urgent need to make its own assessments about exactly what Taiwan’s diplomatic partners mean for the island’s peace and stability. If these relationships bolster deterrence, then the United States has an interest in maintaining the status quo. Given China’s campaign to further undermine it, that requires countering China’s actions to peel Taiwan’s partners away one by one. That will require the United States to think seriously about the benefits it offers these partners and how it can team up with Taiwan to offer a stronger economic deal. The United States already has a joint partnership agreement with Taiwan on development activities in third-party countries, via the DFC-ICDF Memorandum of Understanding on Advancing Private Sector Investment Opportunities signed in 2024. The State Department should consider putting current Taiwan diplomatic partners on the list for targeted projects next year, when the United States and Taiwan will likely convene their next Economic Prosperity Partnership Dialogue.

For decades, the United States has coasted on the issue of Taiwan’s formal diplomatic partners, standing back and watching China execute flips, but largely staying on the sidelines due to discomfort around the fact that the United States itself flipped recognition in 1979. Washington must recognize that coasting will result in the number of Taiwan’s official partners diminishing further. If Washington and Taipei decide that is not a concern, then coasting can continue. If, however, both sides agree this is a key element in deterrence, then both sides will need a much more targeted diplomatic approach. China stopped coasting in 2016 and hasn’t slowed down since.

Correction: A previous version of this report misstated the nature of Taiwan’s diplomatic positioning under former President Lee Tung-Hui. The Lee administration avoided declaring de jure independence, which would trigger a conflict with the CCP, but it did refute Beijing’s claim to represent the island.

About the authors

Acknowledgements

This report is the culmination of a year-long research project made possible through the generous support of the Taipei Economic and Cultural Representative Office in the United States (TECRO).

Explore the program

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

1    Dean Cheng, “The Three Warfares”: Informationized Warfare at the Strategic Level, 中華民國國防部, https://www.mnd.gov.tw/File/32443.
2    This took place ahead of the passage of UN Resolution 2758 expelling then ROC President Chang Kai-Shek and his representatives from the United Nations.
3    “Taiwan Relations Act (Public Law 96-8, 22 U.S.C. 3301 et Seq.),” American Institute in Taiwan, March 30, 2022, http://www.ait.org.tw/taiwan-relations-act-public-law-96-8-22-u-s-c-3301-et-seq/.
4    Ibid.
5    Political allegiances for the indigenous tribes however were mostly toward KMT, largely due to KMT taking over Japanese institutions serving and controlling pacified tribes after the Japanese left Taiwan. “Will Indigenous People Continue to Support KMT? BBC News Mandarin, Feb 22, 2016, https://www.bbc.com/zhongwen/trad/china/2016/02/160222_taiwan_kmt_aboriginal.
6    Beijing perceives itself as the legitimate successor nation to the ROC and argues that Taiwan was part of China’s Qing Dynasty until the unjust Treaty of Shimonoseki ceded Taiwan to Japan, a situation that was rectified through the return of Taiwan to ROC in 1945, with the PRC becoming the successor nation of the ROC in 1949.
7    The term went through many iterations from 1995–2025, including the Republic of China on Taiwan, Republic of China is Taiwan, Republic of China in Taiwan, and Republic of China Taiwan.
8    “Multilateral Diplomacy to Break China’s Three None Policy,” Liberty Times, May 21, 2006, https://news.ltn.com.tw/news/politics/paper/72648.
9    For a more detailed explanation, see: William Piekos, “How Beijing Uses Inducements as a Tool of Economic Statecraft,” Atlantic Council, March 24, 2025, https://www.atlanticcouncil.org/in-depth-research-reports/report/how-beijing-uses-inducements-as-a-tool-of-economic-statecraft/.
10    “2023 Investment Climate Statements: Palau,” US Department of State, December 2, 2025, https://www.state.gov/reports/2023-investment-climate-statements/palau.
11    “中國禁團遊帛琉 帛琉大使:爭取多元客源 中央社 CNA, 中央通訊社,” Central News Agency, December 16, 2017, https://www.cna.com.tw/news/aipl/201712160106.aspx; “China Issues Travel Warning for Palau Following Hack Accusation,” Bloomberg, June 13, 2024, https://www.bloomberg.com/news/articles/2024-06-13/china-issues-travel-warning-for-palau-following-hack-accusation.
12    China Warns Citizens of Travel Risks in Palau,” Island Times, June 14, 2024, https://islandtimes.org/china-warns-citizens-of-travel-risks-in-palau/.
13    Julian Ryall, “Palau President Speaks on China and Geo-political Realities,” Marianas Business Journal, September 27, 2024, https://www.mbjguam.com/palau-president-speaks-china-and-geo-political-realities; “Palau President Accuses China of ‘Weaponizing Tourism,’” Agence France-Presse, August 15, 2024, https://www.abs-cbn.com/world/2024/8/15/palau-president-accuses-china-of-weaponizing-tourism-2206.
14    Jessica Collins, “What Happened at the Pacific Islands Forum,” Interpreter, Lowy Institute, July 27, 2022, https://www.lowyinstitute.org/the-interpreter/what-happened-pacific-islands-forum.
15    Andrew Harding, “Probing Palau’s Waters: Chinese Ships Are Increasingly Active in the Pacific,” Heritage Foundation, July 17, 2023, https://www.heritage.org/global-politics/commentary/probing-palaus-waters-chinese-ships-are-increasingly-active-the-pacific; Charles Engelbrecht, “The Palau Spy Ship Incident: A Deep Dive,” Domino Theory, June 13, 2023, https://dominotheory.com/the-palau-spy-ship-incident-a-deep-dive/.
16    Tristan Hilderbrand, “China Pressures Palau to Cut Ties with Taiwan,” RTI News, August 16, 2024, https://www.rti.org.tw/en/news?uid=3&pid=8510.
17    Jonathan E. Hillman, “Game of Loans: How China Bought Hambantota,” Center for Strategic and International Studies, April 2, 2018, https://www.csis.org/analysis/game-loans-how-china-bought-hambantota; Doug Dingwall and Marian Kupu, “Pacific Island Nations Owe ‘Astronomical’ Debts to China. Can They Repay?” ABC News, July 27, 2024, https://www.abc.net.au/news/2024-07-28/pacific-island-nations-owe-astronomical-debts-to-china/104140248.
18    Jonathan Barrett, “Kiribati Says China-Backed Pacific Airstrip Project for Civilian Use,” Reuters, May 13, 2021, https://www.reuters.com/world/asia-pacific/kiribati-says-china-backed-pacific-airstrip-project-civilian-use-2021-05-13/; Christine Rovoi, “‘Lack of Transparency’: Kiribati Opposition Leader Wary of Govt’s Dealings with China,” PMN News, November 4, 2024, https://pmn.co.nz/read/pacific-region/kiribati-govt-s-lack-of-transparency-with-china-a-concern-opposition-leader.
19    Dingwall and Kupu, “Pacific Island Nations Owe ‘Astronomical’ Debts to China. Can They Repay?”
20    Riley Duke, et al., “Lowy Institute Pacific Aid Map: 2025 Key Findings Report,” Lowy Institute, 2025, https://pacificaidmap.lowyinstitute.org/downloads/Lowy-Institute-Pacific-Aid-Map-Key-Findings-Report-2025.pdf.
21    The CARICOM countries with diplomatic relations to China are Antigua and Barbuda, the Bahamas, Barbados, Dominica, Grenada, Guyana, Jamaica, Suriname, and Trinidad and Tobago. St. Lucia, St. Vincent and Grenadines, and St. Kitts and Nevis are Taiwan’s regional partners.
22    “Honduras Breaks Diplomatic Ties with Taiwan,” Deutsche Welle, March 26, 2023, https://www.dw.com/en/honduras-breaks-diplomatic-ties-with-taiwan/a-65123318.
23    “Taiwan Recalls Ambassador as Honduras Switches Ties to China,” Associated Press, March 23, 2023, https://apnews.com/article/china-taiwan-honduras-us-diplomatic-ties-87bdfd07bc39d82fbec22b92785fea3d; Piekos, “How Beijing Uses Inducements as a Tool of Economic Statecraft.”
24    Anonymous Honduran journalist, interview with authors, October 31, 2015.
25    For a deeper dive into the incentives, see: Piekos, “How Beijing Uses Inducements as a Tool of Economic Statecraft.”
26    Gustavo Palencia, “China, Honduras Launch Negotiations over Free Trade Agreement,” Reuters, July 4, 2023, https://www.reuters.com/world/china-honduras-launch-negotiations-over-free-trade-agreement-2023-07-04/; “Honduras and China Are Advancing in Negotiations for the Signing of an FTA,” Fundación Andrés Bello, June 5, 2025, https://fundacionandresbello.org/en/news/honduras-%F0%9F%87%AD%F0%9F%87%B3-news/honduras-and-china-are-advancing-in-negotiations-for-the-signing-of-an-fta.
27    “China and Honduras Sign FTA Early Harvest Arrangement,” Ministry of Commerce, People’s Republic of China, February 7, 2024, https://english.mofcom.gov.cn/News/SignificantNews/art/2024/art_2e1c541a25004f4192ec52b811a94fe4.html.
29    Alonso Illueca, “Betting on Beijing: How a Diplomatic Switch Sank Honduras’s Shrimp Exports,” China Global South Project, August 15, 2025, https://chinaglobalsouth.com/analysis/honduras-shrimp-industry-china-pivot/.
30    “Albañiles, Carpinteros y Chef son Los Chinos que Trabajan en el Hospital del Sur,” El Heraldo, September 18, 2025, https://www.elheraldo.hn/elheraldoplus/investigaciones/albaniles-carpinteros-chinos-hospital-del-sur-MA27417913.
31    Ibid.
32    Anonymous journalist, interview with authors, October 31, 2025.
33    “DFC-Taiwan Collaboration on Advancing Private Sector Investment Opportunities,” US International Development Finance Corporation, press release, February 22, 2024, https://www.dfc.gov/media/press-releases/dfc-taiwan-collaboration-advancing-private-sector-investment-opportunities.
34    Wen and Teng, “Taiwan, Guatemala Sign Deals on Chip Cooperation, Political Consultation.”

The post Beijing pressures Taiwan’s remaining diplomatic partners. Here’s what the US should do in response appeared first on Atlantic Council.

]]>
Inside Trump’s peace plans   https://www.atlanticcouncil.org/in-depth-research-reports/report/inside-trumps-peace-plans/ Fri, 12 Dec 2025 19:45:00 +0000 https://www.atlanticcouncil.org/?p=890306 From Rwanda to Cambodia, US President Donald Trump’s peace efforts mix economic pressure, trade deals, and high-profile ceremonies. His unorthodox style produces rapid results—but can it achieve lasting peace?

The post Inside Trump’s peace plans   appeared first on Atlantic Council.

]]>
US President Donald Trump has focused much of his second-term foreign policy on the idea that he is a peacemaker, and his administration’s 2025 National Security Strategy states that he has been personally involved in resolving eight conflicts within the first eight months of his second term. He has openly campaigned for the Nobel Peace Prize, and he was recently awarded the newly minted FIFA Peace Prize for his “unwavering commitment to advancing peace and unity.” 

But what results have Trump’s peace efforts yielded so far—and where do the agreements that the US administration has facilitated over the past months stand today? This series takes stock of Trump’s peace deals across the world, highlights the patterns, tools, and strategic choices that characterize them, and assesses whether they can deliver stability over the long run.

From negotiations with the Democratic Republic of the Congo and Rwanda to talks with Cambodia and Thailand, several cross-cutting themes emerge. Trump uses economic tools such as trade deals, tariff pressure, and targeted incentives to bring parties to the table and further US interests, while highly visible announcements and signing ceremonies serve to reduce tensions and lock parties into deals.

With this unorthodox style, Trump aims to position the US economy as a driver of cooperation abroad while simultaneously securing domestic wins, such as beneficial agreements on critical minerals. His style produces rapid outcomes and creates political openings that might otherwise be unattainable. However, it also runs the risk of substituting short-term gains for long-term peace.

Matthew Kroenig is vice president and senior director of the Atlantic Council’s Scowcroft Center for Strategy and Security and the Council’s director of studies.

Bailey Galicia is a program assistant with the Atlantic Council’s Scowcroft Center for Strategy and Security.

Read our expert analysis

Explore the program

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

The post Inside Trump’s peace plans   appeared first on Atlantic Council.

]]>
It’s all about Hamas’s disarmament https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/its-all-about-hamass-disarmament/ Fri, 12 Dec 2025 19:45:00 +0000 https://www.atlanticcouncil.org/?p=893369 A US-brokered cease-fire ended the Israel-Hamas war, but the next phase depends on the group’s disarmament. Until that happens, Gaza’s reconstruction, regional diplomacy, and political future hang in the balance.

The post It’s all about Hamas’s disarmament appeared first on Atlantic Council.

]]>
This article is part of the Scowcroft Center for Strategy and Security’s series Inside Trump’s Peace Plans, which assesses the patterns, tools, and strategic choices that characterize Trump’s peace deals, and evaluates whether they can deliver lasting results. 

US President Donald Trump’s successful negotiation of a cease-fire that ended the fighting in Gaza and secured the release of Israeli hostages was a significant diplomatic success.

Driven by exhaustion on both sides and the effective application of US leverage following Israel’s strike against Hamas leaders in Doha, the deal featured Israel and Hamas agreeing to terms that both had long resisted: Israel ending fighting without a guarantee of Hamas’s removal from power, and Hamas releasing all hostages without securing Israel’s full withdrawal from Gaza.

Although Hamas has not yet released all of the bodies of deceased hostages and occasional exchanges of fire continue, the cease-fire is likely to hold in the near term. Hamas needs time to recover from the blows it has endured, and Israel is unlikely to defy Trump as he seeks to claim this win and bolster his campaign for a Nobel Peace Prize.

But phase two of Trump’s twenty-point plan will be far more difficult, with multiple obstacles to implementation.

Gaza’s future hinges on who governs

The core elements of phase two are Hamas’s disarmament, the reconstruction of Gaza, the establishment of an interim Palestinian technocratic government under an international “Board of Peace” chaired by Trump, the deployment of an international stabilization force, and the gradual return of a reformed Palestinian Authority (PA) to governance in Gaza.

All of these objectives hinge on Hamas’s disarmament. That fact has been made irrefutable by videos circulating on social media showing Hamas using its weapons to engage in retribution killings against Palestinians who have resisted the group’s authority—a gruesome method of tightening its grip on the roughly 47 percent of Gaza it still controls.

Following the October 7, 2023, Hamas attacks, I led a State Department task force on “day-after” planning for Gaza. We immediately established as one of our core planning assumptions that unless Hamas was defeated, disarmed, and removed from power, there would be no “day-after.” Following the worst attack on the Jewish people since the Holocaust, neither Israel’s leaders nor its citizens would accept Hamas emerging from another war battered but intact—still armed, still clinging to power, and still preparing for the next round of fighting.

There were also pragmatic reasons for our assessment. The postwar gains we envisioned—Gulf-funded reconstruction, an international security force, and PA involvement in governance—would all be impossible if Hamas remained armed and in control.

No stabilization without disarmament

Since these objectives also form the foundation of phase two of Trump’s plan, it is no surprise that his administration is already confronting those very challenges. Gulf states are reluctant to fund reconstruction in Gaza without a long-term solution to the conflict. Meanwhile, the countries expressing some willingness to deploy stabilization forces—including Indonesia, Azerbaijan, Egypt, the United Arab Emirates, Jordan, and Morocco—have made clear that they will not engage Hamas directly and would prefer to deploy only after the group has been fully dismantled. The PA’s track record does not inspire confidence in this regard either; after all, it was routed from Gaza by Hamas in a brief civil war in 2007.

Disarming Hamas must therefore be the overriding priority. Without it, the conflict will likely remain in suspended animation, recovery will stall, and Gaza will drift toward renewed war.

Leaving disarmament solely to the Israel Defense Forces (IDF) is, at best, a flawed strategy. While the risk of further hostage killings has been removed, other concerns persist: rising civilian and IDF casualties, deepening international isolation of Israel, and the risk of a full-scale Israeli occupation of Gaza—all of which would severely damage US and Israeli national interests and undermine prospects for expanding regional integration.

Qatar and Turkey could play a crucial role

The most viable alternative is the same tool Trump used to persuade Hamas to release all hostages after the Doha strike: leverage over Qatar and Turkey. While Trump pressed Israel to agree to a cease-fire, he used Qatar’s fear of regional escalation—and its long-standing financial ties to Hamas—to pressure the group’s leadership.

Trump also brought in Turkey, which had been largely absent from the Biden administration cease-fire efforts. Trump’s relationship with Turkish President Recep Tayyip Erdoğan—who shares Hamas’s Muslim Brotherhood ideology and has allowed its leaders to live and even operate on Turkish soil—proved pivotal in persuading the group to accept the deal.

Trump leaned heavily on his transactional instincts, declaring a security guarantee for Qatar, signaling openness to an F-35 fighter jet program for Turkey, and, according to reports, easing US legal action against the country’s state-owned Halkbank, which faces charges related to helping Iran evade sanctions.

Qatar and Turkey have proven that, when properly motivated, they can exert decisive influence over Hamas. Trump should once again leverage both, using fresh incentives to press Hamas to surrender its arms to an agreed third party. A critical mass of Hamas fighters and remaining leaders could then accept safe passage into exile, allowing an international stabilization force and technical experts to safely decommission Hamas’s remaining tunnel networks. The United States and Israel have already struck a tentative agreement to allow safe passage for approximately two hundred Hamas terrorists currently in tunnels under Rafah, which, if implemented, could serve as a test case for a much larger effort across Gaza.

The road to recovery

There is precedent for this. In 1982, US diplomats helped arrange the peaceful departure of some fourteen thousand Palestine Liberation Organization personnel from Beirut while the Israeli military besieged the city. A similar effort, coordinated with and financed by key Arab states, could open the door to genuine recovery and a peaceful future for Gaza.

More than Gaza’s future is at stake. Significant opportunities to expand Middle East integration remain as well. With Iran and its proxy network profoundly weakened by Israeli and US strikes, a strengthened coalition of Israel, the United States, and Arab partners would advance the interests of all parties. A Hamas refusal to disarm, however, would freeze Gaza’s recovery and undermine progress toward Israeli-Saudi normalization, or even more modest steps such as renewing and expanding the Negev Forum—a regional cooperation framework comprising Israel, the United States, the United Arab Emirates, Bahrain, Morocco, and Egypt—improving Israeli-Indonesian ties, or completing a non-aggression pact between Israel and Syria.

Hamas leader Yahya Sinwar’s motivation to launch the October 7 attacks included a desire to derail Israel-Saudi normalization. Hamas must not be allowed to continue obstructing this brighter regional future. The United States must marshal all its partners in the region to ensure that the group’s disarmament becomes a shared, non-negotiable priority.


Daniel B. Shapiro is a distinguished fellow with the Scowcroft Middle East Security Initiative. He served as US ambassador to Israel from 2011 to 2017, and most recently as deputy assistant secretary of defense for the Middle East. 

Related content

Explore the program

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

The post It’s all about Hamas’s disarmament appeared first on Atlantic Council.

]]>
In Southeast Asia, the promise and pitfalls of tariff diplomacy are on full display  https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/in-southeast-asia-the-promise-and-pitfalls-of-tariff-diplomacy-are-on-full-display/ Fri, 12 Dec 2025 19:45:00 +0000 https://www.atlanticcouncil.org/?p=893437 US President Donald Trump’s high-profile intervention in the Thai-Cambodian border dispute delivered a cease-fire, but its violation exposes the fragility of tariff diplomacy and raises questions about the durability of coercive US diplomacy in the region.

The post In Southeast Asia, the promise and pitfalls of tariff diplomacy are on full display  appeared first on Atlantic Council.

]]>
This article is part of the Scowcroft Center for Strategy and Security’s series Inside Trump’s Peace Plans, which assesses the patterns, tools, and strategic choices that characterize Trump‘s peace deals—and evaluates whether they can deliver lasting results. 

Back in July, US President Donald Trump played a key role in brokering a cease-fire between Thailand and Cambodia—a diplomatic effort that earned him a Nobel Peace Prize nomination from Cambodia and a starring role at an elaborate cease-fire signing ceremony during the Association of Southeast Asian Nations (ASEAN) summit in Kuala Lumpur in October. The timing of Trump’s intervention, combined with his use of tariffs as economic leverage, was instrumental in securing the initial cease-fire agreement. Although the truce was fragile and unraveled within a few months, it nonetheless prevented a dangerous escalation and created space for ASEAN-led mediation to briefly take hold.

Trump’s “victory lap” in Kuala Lumpur served both as a boost to his self-proclaimed campaign for the Nobel Peace Prize—earning him a nomination from Phnom Penh—and as a reminder to Southeast Asian nations that the United States remains a key player in shaping regional dynamics and promoting regional stability. Yet his visit also underscored the region’s growing unease over the United States’ retreat from its traditional role as a reliable economic partner and champion of free trade. Trump’s role in the Thailand-Cambodia conflict highlights a new US embrace of economic coercion, transactional bargaining, and exclusionary dealmaking. His abrupt departure from Kuala Lumpur—skipping the East Asia summit—followed by his early exit from South Korea just before the Asia-Pacific Economic Cooperation (APEC) Leaders’ Meeting, left China in the spotlight to promote its role as the region’s most dependable partner for free trade, infrastructure investment, and development assistance.

Recent events have more starkly called into question the effectiveness of Trump’s tariff-driven diplomacy. The Thai-Cambodia peace process quickly unraveled in November after Thai soldiers were injured by a landmine, sparking renewed fighting and causing Cambodian casualties along the border. Trump again sought to mediate with phone calls to both leaders, but this time Thailand’s Prime Minister Anutin Charnvirakul publicly dismissed the threat of economic coercion, saying “I no longer care” about trade and tariff negotiations: “If we can’t sell to this country, we’ll find others. How can we put our lives in the hands of one country?”

On December 8, the situation worsened dramatically when Thailand carried out air strikes on Cambodian military sites it claimed were stockpiling long-range Chinese-made rocketsHundreds of thousands of civilians fled the ensuing violence, and the cease-fire crumbled—underscoring how fragile the truce always was. The latest turn of events came on December 12, when in a Truth Social post, Trump announced that he had again spoken with both Anutin and Manet and secured their agreement to halt all shooting. It remains far from certain, however, whether this new pledge will hold amid ongoing tensions. In all, the crisis lays bare the limits of tariff-based diplomacy in resolving conflicts rooted in nationalism, territorial rivalry, and domestic political pressures.

Bitter conflict over an ancient temple and colonial map

The Thai-Cambodia border dispute centers on Preah Vihear, an ancient Khmer temple perched atop a sheer escarpment along a poorly demarcated stretch of the frontier. The roots of the conflict stretch back centuries to the rivalry between the Khmer Empire and the Kingdom of Siam. In the modern era, the dispute rests on a colonial-era treaty and a French-drawn map whose ambiguities have fueled competing territorial claims.

Cambodia brought the case to the International Court of Justice, which ruled in 1962 that Preah Vihear lay on Cambodian territory. But the court did not decide who owned the surrounding plateau—an area far larger and strategically more significant than the temple. That unresolved question, combined with Thailand’s persistent rejection of the French map that informed the ruling, has left the Preah Vihear region a recurring flashpoint.

The last major clashes erupted from 2008 to 2011 after the United Nations Educational, Scientific and Cultural Organization listed Preah Vihear as a Cambodian world heritage site, a move that inflamed nationalist sentiment on both sides. For Cambodians, the temple is a potent symbol of Khmer identity, and political leaders have often invoked heritage and historical grievances to boost their popularity. Thai leaders who have sought compromise have faced backlash from nationalist groups, and the Thai military has at times exploited the issue to bolster its domestic standing and assert leverage over civilian authority. As a result, the dispute over Preah Vihear remains not only a legal matter but also a deeply emotional and politically combustible issue in both countries.

Escalating border clashes and the search for a cease-fire

The latest crisis erupted in late May 2025, when a Cambodian soldier was killed in a border skirmish, triggering a full-blown diplomatic confrontation and rapid troop buildups on both sides. Fighting escalated dramatically in late July, with heavy artillery exchanges, cross-border incursions, and sporadic air strikes. The human and economic toll mounted quickly: at least thirty-eight people were killed, more than 300,000 displaced, and cross-border trade ground to a halt.

ASEAN was initially caught off guard by the rapidly escalating conflict. As the fighting intensified, Malaysia—serving as ASEAN chair—stepped in to try to broker a cease-fire. Malaysian Prime Minister Anwar Ibrahim worked diligently behind the scenes, coordinating closely with the United States and China to open channels for talks. But these efforts were rebuffed by Thailand, which has long resisted third-party involvement in the dispute.

It was at this critical juncture that Trump’s personal intervention helped break the impasse. On July 26, he called Cambodian Prime Minister Hun Manet and Thailand’s acting Prime Minister Phumtham Wechayachai. His message was blunt: sign a cease-fire or face consequences in ongoing trade negotiations. The threat carried weight because US tariffs were set to rise sharply for Cambodia, Thailand, and most other Southeast Asian countries unless they reached trade agreements before the “Liberation Day” tariff deadline on August 1.

Within twenty-four hours, both governments agreed to meet in Kuala Lumpur, and on July 28 they signed an unconditional cease-fire. Trump announced on social media that he had “saved thousands of lives” and declared himself the “President of PEACE.” Manet seized the moment to curry favor with Trump by nominating him for the Nobel Peace Prize, citing his “extraordinary statesmanship” and “visionary and innovative diplomacy.”

Eager to secure Trump’s attendance at the ASEAN summit in October, host country Malaysia invited him to preside over a formal cease-fire signing ceremony. The event was carefully choreographed to spotlight the US president’s role in brokering the deal and the commitments made by Thailand and Cambodia to continue pursuing peace. China was pointedly excluded from the ceremony as a result of US demands for Trump’s participation. Cambodia’s Manet used the moment to remind Trump of his Nobel Peace Prize nomination, Thailand’s Anutin publicly thanked the president for his “personal dedication” to peace, and Malaysia’s Anwar praised Trump for his “tenacity and courage.”

A fragile peace—and its collapse

Despite the July cease-fire, the situation on the ground remained volatile. Violations persisted through August and September. The fragile truce was vulnerable to ultranationalist provocations, inflammatory disinformation circulating on social media, and the absence of any credible monitoring mechanism. Still, the cease-fire had prevented a return to all-out fighting and created space for negotiators to craft a more durable framework to resolve the underlying border dispute.

The agreement signed at the ASEAN summit added several new commitments: withdrawal of heavy weapons from the front line, monitoring by ASEAN observers, and repatriation of Cambodian prisoners of war. The hope was that once these steps were taken, the two countries would tackle the far more difficult process of technical border demarcation, which has remained stalled for years. Yet the most critical ingredient for any lasting settlement is sustained political will at a time when both governments face potentially volatile political situations at home. As Thai analyst Thitinan Pongsudhirak cautioned in October, leaders in both countries “appear intent and incentivized to stoke the flames of nationalism for domestic political gains.”

The rapid unraveling of the peace process in November and December proved these warnings prescient. Just two weeks after the Kuala Lumpur signing, Thailand announced that it would suspend participation in the peace process after four Thai soldiers were wounded, one critically, by a landmine that Thailand claimed was planted by Cambodia after the October peace accord had been signed—an allegation Cambodia denied. The crisis escalated dramatically on December 8, when Thailand launched airstrikes on Cambodian military targets, asserting that Cambodia had mobilized heavy weaponry and repositioned combat units. Fighting spread quickly into civilian areas, causing dozens of casualties and forcing hundreds of thousands to flee, with both sides accusing the other of breaking the truce. Anutin has taken a firm public stance, rejecting ASEAN-led mediation and US tariff pressure in favor of handling the dispute bilaterally with Cambodia. Then came Trump’s December 12 announcement that Anutin and Manet agreed to halt “all shooting” once again.

The confrontation has also offered Anutin a platform to project strength and nationalism at home at a time of economic anxiety and political turbulence in Thailand. This week, Anutin dissolved parliament, setting up a general election in early 2026.

Strategic takeaways for Southeast Asia

Southeast Asia broadly welcomed US involvement in the Thailand-Cambodia crisis and Trump’s visit to the region. After years of sporadic presidential attendance at ASEAN-centered summits under both Trump and former US President Joe Biden, Trump’s presence at the Kuala Lumpur meeting was well received and gave a diplomatic boost to Malaysia and ASEAN.

Yet the downsides were equally clear. The fact that Trump skipped both the East Asia summit and the APEC Leaders’ Meeting reinforced the perception that US engagement remains intermittent and unpredictable. In contrast, Chinese President Xi Jinping seized the opportunity to present China as a stable and reliable partner—championing multilateralism, expanding trade, and financing infrastructure from Laos to Indonesia.

Trump’s use of economic leverage—conditioning tariff relief on cease-fire cooperation—was undeniably effective in bringing Thailand and Cambodia to the negotiating table. But the collapse of the peace process just two weeks after the comprehensive cease-fire was signed also showcases the limits—and potential counterproductive effects—of coercive tariff diplomacy when issues of sovereignty and nationalism are at stake. Tariff pressure may even have backfired, giving the Thai prime minister an opportunity to demonstrate resolve and bolster his nationalist image at a politically opportune moment at home.

More broadly, Trump’s tariff-centric approach sends a highly visible and deeply troubling signal to the region. The United States, once seen as an engine of growth and leader of the liberal trade system, increasingly appears transactional and willing to weaponize trade for political ends. Ironically, that has long been the critique of Chinese engagement in Southeast Asia. Now, with Beijing positioning itself as a defender of free trade and regional multilateralism, the United States risks flipping the script—mirroring the coercive tactics it once condemned.

Meanwhile, China—though still resorting to economic coercion—has deepened its economic engagement, signing free trade agreements, financing ports, railways, and power plants through the Belt and Road Initiative, and expanding development assistance. The United States, by contrast, has dismantled the US Agency for International Development, retreated from ambitious trade deals, and remained a modest player in infrastructure development.

If the United States hopes to re-establish itself as Southeast Asia’s preferred strategic partner, it will need to pair high-level diplomacy and security cooperation with long-term economic engagement—demonstrating that US leadership is durable, reliable, and aligned with Southeast Asia’s long-term development priorities.


Amy Searight is a nonresident senior fellow in the Indo-Pacific Security Initiative at the Atlantic Council’s Scowcroft Center for Strategy and Security and senior adviser at Vriens & Partners. She previously served as US deputy assistant secretary of defense for South and Southeast Asia.

Related content

Explore the program

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

The post In Southeast Asia, the promise and pitfalls of tariff diplomacy are on full display  appeared first on Atlantic Council.

]]>
From the DRC to Sudan, Trump’s disruptive moves could revive stalled negotiations https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/from-the-drc-to-sudan-trumps-disruptive-moves-could-revive-stalled-negotiations/ Fri, 12 Dec 2025 19:45:00 +0000 https://www.atlanticcouncil.org/?p=893446 Across Africa, US President Donald Trump’s unorthodox diplomacy is unsettling old patterns—reviving talks between the Democratic Republic of the Congo and Rwanda and injecting new momentum into Sudan mediation. The gains may be fragile, but the openings are real.

The post From the DRC to Sudan, Trump’s disruptive moves could revive stalled negotiations appeared first on Atlantic Council.

]]>
This article is part of the Scowcroft Center for Strategy and Security’s series Inside Trump’s Peace Plans, which assesses the patterns, tools, and strategic choices that characterize Trump’s peace deals, and evaluates whether they can deliver lasting results. 

The Trump administration’s global push for peace is aimed both at ending wars and at improving the president’s chances of winning a Nobel Peace Prize. Regardless of the motivations, the diplomatic energy the administration is expending to resolve conflicts in Africa is creating movement and shaking up systems in a way that could break stalemates or at least disrupt patterns of violence for short-term gains.  

US President Donald Trump’s proclivity for dealmaking and leveraging influence may not generate long-term solutions, but the administration’s disruption of the conflict between the Democratic Republic of the Congo (DRC) and Rwanda represents an unorthodox approach to creating negotiation space. Stepping into this space created by Trump’s style could offer an opportunity to forge new short-term paths to peace.

Unconventional moves, unforeseen results? 

Building on the diligent efforts of the Joe Biden administration, the Trump team gave significant political weight to the DRC-Rwanda negotiations early in the term by tapping Massad Boulos, the US senior advisor for Africa—and father-in-law of the president’s daughter Tiffany Trump—to lead the talks. This resulted in a “declaration of principles” in April, followed by the “Washington Accord” in June, both signed by the countries’ foreign ministers. Then, on December 4, the presidents of the DRC and Rwanda signed the “Joint Declaration” in Washington, with Trump and leaders from Qatar, Kenya, Angola, Togo, Burundi, Uganda, and Nigeria witnessing.  

This peace agreement was violated just four days later, and the Rwandan-backed M23 militia continues to gain ground in eastern DRC. Burundi’s involvement in the conflict is also increasingly concerning. However, the US administration’s diplomatic investment has created international momentum for peace, providing the parties and regional actors more room to maneuver in their respective domestic politics. For the DRC, the political push from the White House has generated a buzz of activity in the critical-minerals sector, as exemplified by myriad recent forums in Washington policy circles and the interest of several companies in capitalizing on the “peace.” Similarly, Rwanda, which has long faced criticism for greenwashing and sportswashing its reputation for human rights abuses and autocracy, has had the opportunity to burnish its image as a promoter of peace on the global stage by signing this series of high-profile agreements. In that sense, both countries are already benefiting from Trump’s political signaling, though the stickiest details of a long-term solution remain unaddressed.   

In Sudan, US foreign policy faces its toughest test 

The same may be true in Sudan, where Trump recently announced that he intends to focus on resolving the crisis after meeting with Saudi Crown Prince Mohammed bin Salman. While there might be a short-term gain, the US approach is unlikely to deliver a sustainable political path toward an enduring peace. Still, Boulos’s engagement on Sudan could inject some much-needed energy into a stalled mediation process led by the United States, Saudi Arabia, Egypt, and the United Arab Emirates (UAE). A lasting resolution to the conflict in Sudan, where the world’s largest humanitarian disaster is unfolding, would be a real feather in Trump’s cap.  

Most Sudan watchers have argued that any solution must start with the United States exerting political pressure on the UAE to terminate its support for the Rapid Support Forces (RSF), a Darfur-based paramilitary group. In January, the outgoing Biden administration determined that the RSF has committed genocide, and continued Emirati support has allowed the group to perpetrate more atrocities, such as those widely reported during its late October siege of the Sudanese city of El Fasher. However, the UAE is an important US ally and a key strategic partner in other global conflicts—from the war in Gaza to countering the Houthi threat in Yemen. Using US leverage to squeeze Abu Dhabi on Sudan has therefore proven politically impractical.  

If Trump were to pull it off, an Emirati pivot on Sudan would indeed result in a power shift on the battlefield. Still, spearheading an effort for lasting peace would require another seismic political shift. The US administration would also need to elevate legitimate Sudanese political actors who could lead this fractious and war-ravaged country—and that is no easy feat. After all, neither of the two main belligerents, the Sudanese Armed Forces or the RSF, maintains any political legitimacy, as Michelle Gavin of the Council on Foreign Relations argues. If Trump or Boulos could pick up those two giant rocks—Emirati support for the RSF and legitimate Sudanese political leadership—and move them even inches forward, that would represent real progress that evaded the Biden administration. 

Small wins can produce big diplomatic yields 

As Trump continues his pursuit of a Nobel Peace Prize, there are myriad other conflicts across the African continent that may receive a burst of diplomatic attention as his administration seeks to unlock sustainable paths to peace. The Ethiopia-Egypt-Sudan dispute around Nile River water access and the Grand Ethiopian Renaissance Dam (GERD) may be one of those cases. Although it should be acknowledged that Trump has previously overstated his claim of resolving the conflict, he could still theoretically pull off an agreement, as argued by Allison Lombardo and Peter Quaranto. While Ethiopian Prime Minister Abiy Ahmed has little motivation to strike a deal on the GERD, Egypt might be more amenable to negotiations.  

During his July 2025 travel to North Africa, Boulos continued discussions with Egyptian President Abdel Fattah el-Sisi on both the GERD and on emerging space to possibly broker a deal on Libya. There may yet be developments in this arena as the US administration seeks to create opportunities for energy-sector deals for US companies.   

The administration is also pursuing solutions to several other security challenges in Africa, including the metastasizing terrorist threats in Mali and across West Africa. Here, the United States has been increasingly sidelined, with regimes from Burkina Faso to Niger pivoting to Moscow. However, there is an opportunity to redirect Sahelian states’ attention away from Russian patrons if the United States steps up with its own counterterrorism support. 

In northern Somalia, a new collaboration between Somaliland and Puntland may provide a vehicle for the United States to advance locally driven counterterrorism solutions aimed at containing or degrading threats posed by the Somali affiliate of the Islamic State of Iraq and al-Sham, al-Shabaab, and even the Houthis operating in the Red Sea region. Likely with a lighter touch than was needed to advance DRC-Rwanda negotiations, the Trump administration could make near-term counterterrorism gains that may open space for partner governments—including Western allies, Turkey, the UAE, and Qatar—to share burdens and claim political and diplomatic wins. 

It is easy to criticize the administration’s nontraditional approach to peace promotion, particularly when paired with sizable tariffs, visa bans, and misleading narratives about marginalized groups in South Africa and Nigeria. However, the reality is that the political disruption that Trump’s style can generate, combined with his unpredictable decision-making and pursuit of the Nobel Peace Prize, has shifted political thinking about what is possible in the DRC and Rwanda. With sustained and credible engagement, similar diplomatic openings could emerge in Sudan, Libya, and other terrorism hot spots in Africa. In many of these cases, small victories may prove more valuable than prolonged stalemates. 


Maureen Farrell is a nonresident senior fellow at the Atlantic Council’s Scowcroft Center for Strategy and Security and vice president for global partnerships at Valar, a Nairobi-based strategic advisory and risk firm. She previously served as the deputy assistant secretary of defense for African affairs and director for African affairs at the US National Security Council. 

Related content

Explore the program

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

The post From the DRC to Sudan, Trump’s disruptive moves could revive stalled negotiations appeared first on Atlantic Council.

]]>
The Russian economy in 2025: Between stagnation and militarization  https://www.atlanticcouncil.org/content-series/russia-tomorrow/the-russian-economy-in-2025-between-stagnation-and-militarization/ Fri, 12 Dec 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=891833 The latest report in the Atlantic Council's Russia Tomorrow series examines the Russian wartime economy.

The post The Russian economy in 2025: Between stagnation and militarization  appeared first on Atlantic Council.

]]>

Russia’s full-scale invasion of Ukraine in February 2022 challenged much of the common Western understanding of Russia. How can the world better understand Russia? What are the steps forward for Western policy? The Eurasia Center’s new “Russia Tomorrow” series seeks to reevaluate conceptions of Russia today and better prepare for its future tomorrow.

Table of contents

In the three and a half years since Russia launched its full-scale invasion of Ukraine, its economy has continued to grow, supported by increased militarization. This resilience is a far cry from Western governments’ prognosis in the early days of the war that sanctions would crash the Russian economy. Sky-high energy prices and hesitation on the part of Western leaders to push for stronger enforcement of sanctions kept the Russian economy afloat in 2022. Meanwhile, deepening economic integration with China has helped supplant the void left by the loss of the European Union (EU) as a market. Overall growth, however, is slowing markedly in 2025 as Russia is increasingly feeling the pressure of “guns versus butter,” the inherent tension between military and social spending. 

Fortunately for Ukraine and its Western partners, topline gross domestic product (GDP) figures tell only part of the story. The Russian economy has been overheating—demand is outpacing supply and economic activity is growing at an unsustainable rate—since late 2023. Stubbornly high inflation has forced the Central Bank of Russia (CBR) to raise interest rates to a peak of 21 percent.1 In part, higher inflation (and growth) figures have been driven by Moscow’s wartime spending spree, often described as military Keynesianism. This has been exacerbated by an exceptionally tight labor market by Russia’s standards. The unemployment rate sits at just above 2 percent, less than half of its pre-pandemic levels—which, in addition to boosting inflation even higher, betrays the economy’s limited room left to grow. Demand has been pushed up by government spending beyond the point at which supply can keep up, whether through investment, labor, or productivity gains.

The sanctions landscape has, rather unsurprisingly, become more fractured since President Donald Trump’s return to the White House in 2025. While Ukraine’s partners in Brussels and London have applied additional economic pressure on Moscow, Washington had entirely refrained from doing so until October, when Trump announced sanctions on Russia’s two largest oil producers, Rosneft and Lukoil. On one side of the Atlantic, sanctions—which require constant monitoring and updating to remain relevant—have seemingly been reduced from a tool of economic statecraft designed to inflict costs for and deter bad behavior to a bargaining chip. On the other, the European Union and United Kingdom have continued to expand their sanctions regimes, including by lowering the price cap they impose on Russian oil, but are unable to replicate the reach that the United States Treasury Department has thanks to the dominance of the US dollar and the US ability to enforce secondary sanctions.

The Russian economy is, therefore, in a precarious but manageable position. Its growth has slowed, its oil and gas revenues have slid, and the latest US sanctions on Rosneft and Lukoil directly challenge the prevailing assumption that geopolitical risks and sanctions threats had subsided. Nevertheless, the economy might yet be saved by fickle White House policy. Unless the new sanctions escalation is genuinely sustained, or global oil markets see a further downturn, the current slow downward trends are likely to hold as Russia appears to have hit supply-side constraints in the labor market and investment. This makes a better understanding of where the Russian economy currently stands all the more important. The following sections explore three key wartime developments: the growing role of China, the prioritization of the defense sector, and the positive effects of the war on poorer regions.

Pivot to the East: How China has come to Russia’s rescue

When Russian President Vladimir Putin launched a full-scale invasion of Ukraine, he gambled his country’s future on a quick victory. When that goal proved elusive, he doubled down. Two developments helped make this economically feasible. The first was the spike in energy prices, particularly for natural gas, which was precipitated by the uncertainty that Putin had wrought upon global markets. The second was Russia’s burgeoning trade relationship with China and its role in helping Russia circumvent sanctions.

Economically and politically, Russia’s relationship with China is simultaneously deeply asymmetrical and mutually beneficial. While Moscow has not become Beijing’s vassal—at least not to the extent that it would attack NATO purely to distract the Alliance from a war for Taiwan—Russia is certainly the junior partner in the “no limits” partnership. China has served as a lifeline for Russia, while Russia has supplied China with cheap energy and raw materials.

On one hand, China has easily overtaken the EU to become Russia’s largest trading partner. On the other hand, Russia accounts for just 3 percent of China’s exports and 5 percent of China’s imports as of 2024.2 Russia’s economic importance to China, to be sure, is not fully reflected in these figures; it became China’s top supplier of crude oil in 2023. But even in the case of oil, China buys from an intentionally diversified set of suppliers, in which Russia accounts for less than one-fifth of imports. With an economy nine times the size of Russia’s, China has the same leverage in market power over Russia as the EU, without the structural dependencies on Russian energy.3 Many EU members (including Germany, the bloc’s largest economy) grew structurally dependent on cheap Russian oil and gas for their economic growth in the twenty-first century.4 The Nord Stream 1 and 2 natural gas pipelines from Russia to Germany via the Baltic Sea, which together cost €18 billion to build, best symbolized the relationship.

Even Russia’s energy exports to China are comparatively far more important to Russia. Oil and gas revenues account for nearly one-third of Russia’s budget inflows. Until 2023, Europe was the most lucrative export market for Russian energy and, thus, for Russian state coffers. Nonetheless, by invading Ukraine, Russia slayed its irreplaceable golden goose, leaving it reliant on new partners. And China, well aware of Russia’s lack of alternatives, purchases both oil and gas at a steep discount.

Russia’s trade to and from China could hardly be more different. It sells oil, gas, coal, and raw materials to China, while it buys machinery, vehicles, and electronics (see below).5 In other words, Russia exports what it can extract from the ground and imports what it lacks the technology and industrial capacity to build itself—highlighting the deep asymmetry in the relationship. This is a complete and embarrassing reversal in the relationship compared to the 2000s, when Russia exported higher value-added goods to China. 

Automobiles have become a bellwether of China’s presence in the Russian consumer market and a rare case of the Russian market’s importance to Chinese industry. Before the full-scale invasion in 2022, Russia imported cars from a range of countries—including Japan, South Korea, Germany, China, and the United States—and a number of countries established production facilities in Russia, creating productivity spillovers. The West’s sanctions regime upended the market so thoroughly that Russia, although wary of provoking its more powerful neighbor, even increased duties on car imports in an attempt to slow the Chinese takeover.6 Chinese brands’ market share surged from below 10 percent in 2021 to above 60 percent in 2023, and they allegedly accounted for the vast majority (about 90 percent) of revenues in 2024. 

Russia had become the largest export destination for Chinese cars, which filled the void left by Western brands exiting the country—and though Russia’s protectionist measures might have chipped away at this, the Chinese automotive industry is among the largest beneficiaries of the expanded Sino-Russian trade relationship. The industry produces far more than the Chinese consumer market can absorb, so markets like Russia—which is both large and absent of Western competition—are highly beneficial. In contrast, China’s smartphone industry, which has taken over the Russian market in a rather visible manner (86 percent of sales in 2024), is hardly dependent on Russia.

China’s manufacturing industries—which are purposefully designed for overcapacity—need international markets, and Russia has become an increasingly important destination for them to sell their products. But automotive exports are the exception that proves the rule; even mutually beneficial exchanges are far more important to Russia than to China. This conclusion is not as trivial as it might sound—the European Union, with a combined GDP that surpasses China’s, was so reliant on Russian energy that the bloc is still working on phasing it out. In other words, structural dependencies on Russia were ingrained in European economies, making it more painful to cut off the trading relationship than key economic figures would have suggested; Russia does not have this leverage with China.

But from an economic point of view, China is not a better trading partner for Russia than the European Union was. It buys oil and gas at lower prices, it invests far less in Russia, and its products are often technologically inferior. Nor is China’s relationship with Russia equivalent to the West’s relationship with Ukraine; whereas Ukraine has received billions of dollars in grants and in-kind contributions from the West, Russia pays in full for its imports from China. But with no alternatives to speak of, China has served as an economic lifeline for the Russian economy.

China has also been central to Russia’s efforts to evade Western sanctions. Following the exodus of Western countries and the imposition of a strict export control regime in 2022, Russian importers turned to increasingly complex sanctions-evasion supply chains to continue buying prohibited products and components. This was particularly urgent for the military-industrial complex, as Russia sourced more Common High Priority Items List (CHPL) items—a set of fifty export-controlled products that the sanctioning coalition jointly determined to be key to Russia’s military industry—from the EU than from anywhere else. A look at Russia’s 2023 imports of these goods reveals China’s new centrality: In value terms, 90 percent of CHPL imports were facilitated by a Chinese firm in some way. Over time, China’s role in providing sensitive goods to Russia has also tilted from facilitator to manufacturer—by 2023, 49 percent of all CHPL imports were made by Chinese companies in China. Goods as complex as computer numerical control (CNC) machines and as simple as ball bearings are now sourced from China instead of the West, making export controls less effective or, at the very least, more difficult to enforce.7

Chinese machinery and components are predominantly supplied to the military-industrial complex, while domestically produced alternatives usually go to civilian firms. Moreover, shipments of domestically produced machinery and components have declined during the full-scale war, indicating that Chinese imports have supplanted Russian competition. In other words, despite all of the resources that have gone into import substitution programs—and the restrictions that sanctions have imposed—Russia’s machinery and components supply chains are more import dependent now than they were in 2021. With the Russian economy on a war footing, manufacturers have merely swapped out their European dependencies for Chinese ones.

Russia’s turn from Europe to China raises the question: Did the sanctions regime backfire? After all, Russia has continued its war against Ukraine and is now closer to China than it was at any other time in the post-Soviet period. 

Economically, sanctions have neither backfired nor achieved maximalist goals. The sanctions regime has ensured that every drone, artillery shell, and missile aimed at Ukraine is more expensive or more difficult to produce. Supply chains have needed to be reoriented, introducing friction costs and quality concerns—the lengths to which Russian firms have gone to acquire export-controlled technologies and machinery effectively reveal the inferiority of alternatives. Disappointment with the fact that sanctions have not brought about the collapse of the Russian economy has more to do with overzealous expectations combined with lax enforcement than it does with the failure of sanctions themselves.

However, the tightening Sino-Russian relationship carries weightier consequences for the practice of economic statecraft. Financial sanctions against Russia—including the disconnection of some major banks from the Society for Worldwide Interbank Financial Telecommunication (SWIFT)—have driven the country out of the dollar-dominated global financial system and toward its (much smaller) Chinese alternative. China and Russia now settle the vast majority of their trade in renminbi, which could theoretically pave the way for a Chinese-led, anti-Western global financial system. Combined with the Trump administration’s trade policies, risks of de-dollarization have grown, particularly in Asia. This remains hypothetical, however, and it is unclear whether Beijing is willing to bear the costs associated8 with taking up such a role. In reality, the Russian economy’s resilience is more of a wake-up call than a cautionary tale for Western governments. A sanctions regime that allows energy export revenues to continue to flow and leaves an economy the size of China’s as a safe haven is destined to disappoint.

Guns over butter

In the push and pull between civilian and military priorities, never has post-Soviet Russia so clearly veered toward the latter. In part, this is reflected in Moscow’s larger ambitions to revive its status as a regional hegemon in Eurasia, and in all the costs it is already bearing in pursuit of this goal—it sacrificed its most lucrative oil and gas customers in the name of dominating Ukraine. But Moscow’s priorities are more straightforwardly revealed by its wartime federal budgets.

The Russian federal budget is both convoluted and secretive, with almost one-third of all allocated funds classified, including more than 80 percent of the defense budget. Even classified expenditures are attributed to broad budget chapters (e.g., national defense), and some categories are easier to ascertain than others—the Ministry of Defense’s classified social support, for example, is likely made up of payments to families of soldiers killed or wounded in the war. Spending on the war has been immense (pegged at or above 8 percent of GDP) but not entirely straightforward to measure. Not all defense expenditures go to the war, while some large civil expenditures, such as investments in occupied territories, are directly related to it. Nevertheless, a few observations can be made about how the budget reflects today’s Russian economy. 

First, direct military spending is likely to plateau, if not decrease, in real terms this year. As spending grew well above inflation since the full-scale invasion, further increasing spending would need to come at the cost of noticeable cuts to social spending, as liquid reserves in the country’s National Welfare Fund (NWF) have been depleted substantially (down 59 percent), and military spending accounted for almost half of budget revenues in the first half of 2025.9 As is the case with much of the Russian economy, 2025 has shown that growth cannot continue forever.

Second, while budget deficits are well above expectations, Russia has not had difficulties financing its deficits. Russia’s federal budget nearly exceeded the planned target for 2025 in just the first six months of the year. The shortfall, which was driven by a drop in oil and gas revenues and a 20-percent rise in expenditures, is far bigger than previous wartime deficits. Nonetheless, Moscow has managed to finance the deficit thanks to strong demand for bonds from Russian banks. This is particularly important to maintain, as domestic banks are effectively the only remaining buyers of the government’s bonds.10

Third, much depends on the price of oil. A bit less than one-third of the federal budget is funded by oil and gas income, and the Ministry of Finance based its budget projections on a forecasted $69.7 per barrel average export price in 2025. The extent of the budget shortfall that falling oil revenues create will depend on two factors: global oil prices, which have been weighed down by sluggish global growth, and how steep a discount on Russian oil prices the Group of Seven’s (G7) oil price cap sanctions can create. With its eighteenth sanctions package in July 2025, the European Union both lowered the price cap for crude oil (from $60 per barrel to $47.6 per barrel) and introduced an automatic mechanism to adjust the cap to market conditions. While this is a welcome change, its effect will still depend on enforcement, which has been subverted by Russia’s shadow fleet of old and uninsured oil tankers.

Besides defense expenditures as a share of GDP, one of Russia’s most-watched financial statistics has been the bonuses that the government pays those who sign up to join the “special military operation.” To entice men to join the war effort despite the risks, regional and local governments have offered sign-on bonuses that far exceed annual salaries. By early 2025, more than 60 percent of Russia’s regions offered bonuses that exceeded 1 million rubles (about $12,000). In Sverdlovsk Oblast in the Urals region, prospective soldiers are offered about 3 million rubles—2.5 million rubles from the regional government, 400,000 from the federal budget, and more from individual municipalities—which is nearly three times the median annual wage. In Mari El, a poor ethnic republic 400 miles east of Moscow, a stunning 10 percent of the region’s total budget is spent on sign-on bonuses.

In Russia’s poorer regions, the combination of sign-on bonuses and killed in action (KIA) payouts has created a system of “deathonomics” in which dying on the battlefield in Ukraine can be more profitable than living to retirement age. The system is particularly appealing to men who are not economically productive—whether due to a lack of training and education or a poor local economy—and effectively acts as local stimulus. From a macroeconomic perspective, these payouts must be viewed in the context of a tight labor market and an overheated economy, in which employers in the civilian sector compete for workers with the army, a military-industrial complex that receives favorable treatment from the government, and each other. Moreover, they are indicative of a larger trend: Russia’s resources are being directed away from the civilian economy and toward the war. Every working-aged man who joins the army is one fewer factory worker or local business employee, and every government ruble spent on incentivizing his choice is one fewer ruble for social spending.

In Russia’s poorer regions, the combination of sign-on bonuses and killed in action (KIA) payouts has created a system of “deathonomics” in which dying on the battlefield in Ukraine can be more profitable than living to retirement age. The system is particularly appealing to men who are not economically productive—whether due to a lack of training and education or a poor local economy—and effectively acts as local stimulus. From a macroeconomic perspective, these payouts must be viewed in the context of a tight labor market and an overheated economy, in which employers in the civilian sector compete for workers with the army, a military-industrial complex that receives favorable treatment from the government, and each other. Moreover, they are indicative of a larger trend: Russia’s resources are being directed away from the civilian economy and toward the war. Every working-aged man who joins the army is one fewer factory worker or local business employee, and every government ruble spent on incentivizing his choice is one fewer ruble for social spending.

It is no coincidence, then, that war-related industries have substantially outperformed the rest of the economy. While war-related industries have boomed—their combined output has increased by around 50 percent—the rest of the economy has been largely stagnant. Much of Russia’s investment, which is already low, is directed to supporting the war. Because Russia has long struggled to translate its military-industrial complex spending to durable civilian-sector growth, this leaves few opportunities for medium- to long-term spillovers. And as Russian workers move to the military-industrial complex or leave for the front, they are not being replaced by migrant labor, which is at its lowest level in a decade.

There are some areas that allow for direct, “apples to apples” comparisons between the fates of the civilian and military sectors. Though both sides are impacted by sanctions, restrictions on military-industrial complex entities are more stringent. Nonetheless, it is the military-industrial complex that comes out ahead.

Russia’s aviation industry, historically reliant on Western planes and technology, has been hit hard by sanctions. Even before the full-scale invasion, Russia’s commercial aviation industry was so reliant on Western supply chains that it resorted to smuggling parts and components from the United States to get around sanctions, as nominally Russian-made airplanes still rely on foreign components. Sanctions forced Russian airlines to quickly seize jets that had been leased from the West and cannibalize older aircraft for spare parts. But measures have clearly been insufficient, as civil aviation incidents hit a record high in 2024 and plans to build more than one thousand commercial aircraft by 2030 are merely a fantasy. In talks with the Trump administration, Russia specifically brought up the aviation industry as a pain point and proposed a scheme to purchase Boeing planes with frozen state assets. 

Military aviation—which is a top-heavy sector led by companies Yakovlev, United Aircraft Corporation, and United Engine Corporation—has not suffered the same fate. Military aviation manufacturers have rapidly expanded their production capacity since the full-scale invasion, with Chinese imports playing an ever-increasing role in their supply chains. While the commercial aviation fleet steadily degrades, military aviation is continuing to produce both fighter jets and helicopters for the war effort. The diverging performance of the civil and military aviation industries, despite the substantial overlap in companies active in them, is further evidence of how Russia has prioritized military production at the expense of the civilian economy.

An indefinite expansion of the military-industrial complex, however, is not feasible. Moscow does not appear willing to make the sacrifices necessary to truly militarize society—for example, to direct the resources to defense that the Soviet Union did during the Cold War—which would be unavoidable during a broader economic slowdown. The more it spends on military-industrial manufacturing and infrastructure, the less the civilian economy can compete for labor and financing (i.e., the military-industrial complex is crowding out the rest of the private sector). Russia has now pushed the limits of how much the civilian economy can be neglected before it is forced into stagnation.

In the first two years of the full-scale war, the Kremlin was not forced to face the trade-offs it is facing today. Military-led economic expansion was not at odds with broader economic growth for a number of reasons that no longer hold true. 

First, high inflation has forced the CBR to raise interest rates substantially as it attempts to pump the brakes on the overheated economy. With a key policy rate of 16.5 percent (down from a high of 21 percent), fewer businesses can afford debt-fueled growth. Furthermore, a significant share of economic actors receive subsidized interest rate loans; one-sixth of all new loans issued in 2023 were subsidized at below-market rates. Russia’s subsidized mortgage program made up a majority of these funds and was more distortionary than preferential loans to the corporate sector, but it ended in July 2024. The remaining portfolio of subsidized loans, held primarily by large banks, ranges from innocuous recipients—the agricultural sector, small and medium-size enterprises, and strategic industries—to defense contractors and the military-industrial complex writ large, which the Kremlin funds with “hidden war debt.”

The bottom line is that these preferential loan programs force the CBR to hike rates more than it would need to otherwise, hurting the broader economy’s growth prospects in the process. This has led to open infighting among regime elites, with defense executives like Rostec’s Chief Executive Officer Sergey Chemezov repeatedly lashing out at CBR Governor Elvira Nabiullina for her stewardship of the Russian economy.11 Nabiullina and the CBR have been critical of these programs, noting that the subsidized loans are paid for by all the individuals and corporations that must pay market rate. Thus far, the Kremlin seems to have sided with the bank. But the longer rates remain high, the more difficult the balancing act becomes.

Second, the external environment has deteriorated significantly. In Russia’s case, this is first and foremost a question of oil and gas exports. Soaring energy prices—and the delayed application of key measures such as the G7’s oil price cap—supported the Russian economy, the ruble, and the government budget in 2022. Natural gas prices were particularly crucial in 2022 because Russian oil has been sold with a risk premium (i.e., with a discount) ever since the full-scale invasion. Russia’s gas revenues more than doubled between 2021 and 2022—from $64 billion to $130 billion—but fell precipitously below pre-war levels thereafter. Now, three and a half years into what was envisioned as a three-day war, energy revenues have structurally changed (see the analysis above). Depressed oil prices amid a global oil glut, China’s unwillingness to import more Russian natural gas via stalled projects like the Power of Siberia 2 pipeline, the EU’s measures targeting India’s refining of Russian crude oil, and Washington’s sanctions against Rosneft and Lukoil all represent real challenges for Russia’s economic prospects.12 Regular Ukrainian strikes on hydrocarbon processing facilities have also hit Russia’s bottom line and show no sign of letting up. None of these challenges are insurmountable or even permanent, but they compound on each other in the absence of other key buffers—most notably, liquid reserves and a large and stable current account balance.

Third, Russia has burned through the reserves that it built prior to its full-scale invasion. Russia’s most important buffer has been the NWF, its sovereign wealth fund. Moscow has heavily relied on the NWF for budget financing—withdrawing more than 7.5 trillion rubles ($93 billion) for fiscal financing, while more than $300 billion of CBR reserves were immobilized in sanctions coalition countries. The NWF’s liquid funds, holdings of foreign currency and gold, have dropped by nearly 60 percent and now consist of just renminbi and gold, as Russia sold all hard currency assets in 2022. Once again, this is not an existential threat to the Russian economy, as the government’s ability to fund its deficit with debt issuance has been consistent. However, the depleted NWF is a lost buffer that creates new trade-offs for the Kremlin. If Moscow continues its war-related spending spree, it must fund its deficit by selling even more debt to domestic banks; if it does not continue its fiscal expansion, it no longer has the NWF to cushion the fall for the general population.

The reality is that the Kremlin spent the first two years of the full-scale war kicking the can down the road, avoiding the trade-offs inherent to its policies. Fiscal expansion, a supportive external environment, and large buffers had the economy growing but running on fumes. At least in the economic sphere, the war was all carrots and no sticks. In 2024–2025, when the situation deteriorated significantly on all three fronts, the Russian economy did not collapse, to be sure, but the Kremlin began to face the trade-offs that it had long put off. Interest rates climbed, real wages fell, and subsidized mortgage programs were scrapped. Fears of looming stagflation—the combination of high inflation, low growth, and high unemployment—have been (perhaps prematurely) in the ether for quite some time. 

What does this mean for the most fundamental trade-off of all: guns versus butter? It is difficult to imagine a scenario in which the Russian government can sustain its current defense expenditures without social spending cuts that are pervasive and visible to the general population. Moreover, the broader economy can no longer support growth (in output and real wages) in both the military-industrial complex and the civilian sector simultaneously. This does not spell disaster, but it will likely chip away at the gains that the country’s poorer regions and citizens have seen during the war.

Regions

Parts of the civilian sector have benefited immensely from the wartime spending bonanza, and it has helped reshape the economy in surprising ways. In some cases, the war has served as an equalizer, injecting cash into poorer regions through army recruitment and casualty payments. Self-reported well-being and financial security measures have generally increased. In other ways, wartime spending has reinforced existing structural inequalities that favor privileged groups and areas, such as ethnic Russians, large cities, and regions with a strong military-industrial base.

The benefits that poorer regions have enjoyed during the full-scale war come at a cost, and they are unlikely to be permanent. Household incomes rise in exchange for killed and wounded men and high inflation; investment into the military-industrial complex crowds out more efficient investment into the civilian economy. Moreover, casualty payouts and defense spending are hardly sustainable drivers of economic growth. Regardless of their permanence, it is worth understanding the regional dynamics associated with Russia’s war.

Both before and during the war, Russia’s economy has been centered around a few economic centers: Moscow, St. Petersburg, Ekaterinburg, and regions with oil and gas extraction industries such as the Nenets, Yamalo-Nenets, and Khanty-Mansi autonomous okrugs.

But the war has brought unprecedented investment and income to Russia’s poorer regions. Two indicators—fixed investment and retail turnover—exemplify the geographic nature of wartime growth. Fixed investment, which includes assets that range from machinery to factories, has shown explosive growth in Russia’s poorer and far-flung regions. The Republic of Tyva, a small ethnic republic on the Mongolian border, has seen 190-percent growth in fixed investment and 74-percent growth in retail turnover—some of the highest in the nation. However, income is not evenly distributed within the region, with military-related incomes not trickling down to the rest of the population. In other words, the fiscal stimulus (from recruitment and KIA payouts) and demand in the military-industrial complex have not dispersed across the entire economy.

Tyva also tops the charts in a less desirable metric; it has the highest number of confirmed war deaths per capita of any region in the country. While Tyva’s sign-up bonuses are some of the lowest in the country—the region merely matches the federal government’s 400,000-ruble payout—it is worth remembering that these bonuses are generally dwarfed by the payments to soldiers’ families when they are killed in action. Consequently, the growth of household bank deposits in Tyva has massively outpaced national averages.

Households are generally faring better in regions that have contributed more soldiers to the war. The growth in household bank deposits is so visible, in fact, that it has even been used as a proxy to measure regions’ mobilization results. Notably, trends in household incomes and household expenditures somewhat diverge. While regions like Tyva show only relatively middling growth in household income despite strong employment growth, their household expenditures have risen just like their bank deposits. In other words, deposits and expenditures have risen precipitously—but not necessarily from standard income sources.

Of course, these poorer regions have had help. In late 2024, the federal government implemented a program to allow lower-income regional governments to write off up to two-thirds of their debt, provided that they spend the freed-up funds on social and communal expenditures or, in some cases, national projects. This effectively means that some regions’ exorbitant spending on the war in Ukraine, including sign-up bonuses and benefits for families of soldiers wounded or killed in action, has been subsidized by Moscow. The program exemplifies the difficulty of assessing how much the Russian government has spent on the war; the Kremlin uses arcane budget maneuvers to funnel money to the war through programs that are ostensibly designed for economic development in poor regions.

Another key development during the war is the renewed convergence between regions’ average wages.13 Between 2000 and 2014, as commodity prices and the market economy helped Russia grow substantially, the differences in wages across regions declined. This trend stagnated between 2014 and 2021 but then reemerged with the full-scale war. More important than the convergence itself, however, is what has driven it.

The dispersion of wages across Russia’s regions is visible in two distinctions—between the rich and middle-income regions, and between the middle-income and poor regions. Between 2000 and 2014, the convergence of average wages was primarily driven by the poorest regions catching up to middle-income regions. Since the full-scale invasion in 2022, the driver of convergence has been on the other end of the wealth distribution, with middle-income regions catching up to rich ones. Geographically, this means that the strongest wage growth does not extend much further east than the Urals.

Trends in investment betray a more complex and less optimistic picture. At face value, fixed investment has increased dramatically in some poorer parts of the country, including in the archetypal region of the Republic of Tyva. But while growth figures are useful metrics, they can obscure differences in scale. In reality, Russia’s poorer regions entered the war so far behind on fixed investment that these large increases (above 100 percent since 2021, in many cases) are dwarfed in scale by those in major metropolitan areas and export-driven (i.e., resource-rich) areas. In fact, dispersion of fixed investment per capita between regions has increased considerably since the full-scale invasion. This suggests that the wage gains in poorer regions relative to the rest of the country are unlikely to become a permanent feature of the economy.

Much of this post-2022 divergence can be attributed to regions with a heavy military-industrial presence; most of these regions fall into the Central, Ural, and Volga federal districts. Regional manufacturing growth is, of course, strongest there, and weakest where production relied on Western export markets. 

Sverdlovsk oblast, which hosts key heavy industry manufacturing hubs, saw fixed investment rise by more than 100 percent since 2021. Russia’s premier tank-producing facility, Uralvagonzavod, is based in Sverdlovsk oblast’s Nizhny Tagil. The Nizhny Tagil industrial cluster has doubled down on military-industrial production, including by ramping up hiring (and wages) for skilled and unskilled workers. It faces macroeconomic headwinds, including a shrinking workforce, but has been buoyed by defense procurement orders (gosoboronzakaz) and debt-fueled investment. Thanks to the expansion of production and the tight labor market, manufacturing wages in Sverdlovsk oblast increased by 78 percent between February 2022 and February 2025 (compared to 70-percent growth in all sectors). 

While the convergence of economic prospects across Russia’s regions might not be permanent, the inefficient allocation of resources—particularly to the military-industrial complex at the expense of the civilian sector—is likely here to stay for the foreseeable future. After the sign-up and war casualty payments stop flowing to the country’s poorest regions, the investments in the war machine will remain, fed by Moscow’s aggressive posture toward NATO.

Conclusions and recommendations

Unfortunately for those (the present authors included) who wish for Russia’s aggression to end as soon as possible, the bill is not yet coming due for the Kremlin’s war economy. Rather, we have argued in favor of a different lens through which to view the Russian economy—one of increasing trade-offs—as costs have mounted but remain manageable.

Slowing growth, depressed oil prices, harsher sanctions, and high inflation are the key macroeconomic challenges that the Kremlin and CBR face in late 2025. However, they are not the only trends worth considering. We have examined three structural shifts that Russia’s full-scale war against Ukraine has wrought upon the country’s economy: an external sector pivot from West to East, a clear prioritization of guns over butter, and a convergence of regional economic trends. Among these, regional convergence is the least likely to persist beyond the war.

Prescriptions for hindering the Russian economy vary depending on the specific goals and risk tolerances of sanctioning states. The United States and EU, for example, have long held the contradictory goal of reducing Russia’s oil and gas revenues without pushing up global market prices—hence the price cap—so as to avoid domestic and international backlash. With the current oil market glut, however, it is feasible to impose sanctions on Russian oil majors without spiking global prices. The true test of this theory will come only in time, as we wait to see what waivers the Treasury Department’s Office of Foreign Assets Control (OFAC) issues to potential customers of Rosneft and Lukoil (particularly India and China) and whether these sanctions remain in place for the foreseeable future.

The Trump administration’s punitive measures against China and India for their support of Russia, be they secondary sanctions or secondary tariffs, have thus far largely been half-hearted and inconsistently applied. This leaves policymakers, particularly in Europe, in a tricky situation. When Washington strikes a more conciliatory tone toward Moscow, sanctions enforcement is tougher. EU and United Kingdom efforts to sanction shadow fleet tankers have continued without the United States, and a growing willingness to interdict law-breaking vessels also put downward pressure on Russia’s oil export revenues, but they are less effective without the Treasury Department’s help. And in the only case in which Washington has imposed new restrictions—on Rosneft and Lukoil—it did so without coordination.

Economically, the two fundamental goals of the post-2022 sanctions regime have been to make it harder for Russia to produce materiel for its war and make it harder for Russia to pay for its war. Both come with their own costs and challenges—the former is hard to enforce, while the latter threatens to boomerang costs back to the sender—that reduce the coalition’s resolve.14 Nonetheless, we see no reason to deviate from these two guiding principles. 

Reducing Russia’s industrial production for its war can and should be accomplished in various ways. 

First, the sanctions coalition’s existing export controls regime must be better enforced and expanded. This would require more resources for investigations and a willingness to target third-country intermediaries that help Russian firms access export-controlled goods.15 As we have detailed, this will inevitably focus on China. 

Second, Chinese and North Korean supply chains to the Russian military-industrial complex must be disrupted. Chinese manufacturers sell dual-use goods and machinery to a wide range of firms in the military-industrial complex, while North Korea has been supplying Russia with more than half of its artillery shells. Targeting Chinese supply chains could entail sanctioning the logistics providers that facilitate the transactions on the Russian side or imposing secondary sanctions on the manufacturers and banks that do so on the Chinese side. Targeting North Korean supply chains, while more difficult due to the country’s international isolation, could entail sanctioning Russian or Chinese banks that facilitate trade with North Korea. 

Third, many entities in the Russian military-industrial complex remain unsanctioned, particularly those that maintain civilian pretenses. Rosatom and Roscosmos, two state-owned enterprises that have heavy ties to the military-industrial complex, are prime examples.

Reducing Russia’s ability to finance its war effort is, for all intents and purposes, a question of reducing its energy export revenues. Despite the fact that the United States has little direct role in the generation of these revenues, it might indeed have more leverage than Europe in the situation by virtue of its more powerful sanctions (and secondary sanctions) toolbox. In either case, the sanctions coalition can target the price of Russian energy exports or the volume of the exports; thus far, sanctions have almost exclusively targeted the former. Rosneft and Lukoil sanctions do appear to be the first major attempt to remove some Russian oil from the market entirely.

Once again, there are multiple paths that the sanctions coalition can take. The simplest step would be to align and expand sanctions against shadow fleet oil tankers, which circumvent the oil price cap. While US sanctions against shadow fleet tankers have generally been the most effective, Brussels and London should continue their efforts to force Russian oil off the shadow fleet and back to the mainstream fleet, where the price cap applies. Washington adopting the EU’s new, lower oil price cap would also hurt Russia’s oil revenues. More severe options could target Russian export volumes by embargoing a specific port, deciding not to grant waivers for Rosneft and Lukoil sanctions, or even applying secondary sanctions on buyers of Russian oil.

Whether by hitting Russia’s military-industrial capacity or its energy revenues, the United States and its European allies can surely hinder Russia’s ability to continue prosecuting its war against Ukraine economically. What is less clear, particularly in Washington, is whether the political will exists to do so.

Read the full issue brief

About the authors

Elina Ribakova has been a nonresident senior fellow at the Peterson Institute for International Economics since April 2023. She is also a nonresident fellow at Bruegel and a director of the International Affairs Program and vice president for foreign policy at the Kyiv School of Economics. Her research focuses on global markets, economic statecraft, and economic sovereignty. She has been a senior adjunct fellow at the Center for a New American Security (2020–23) and a research fellow at the London School of Economics (2015–17).

Ribakova has over twenty-five years of experience with financial markets and research. She has held several senior level roles, including deputy chief economist at the Institute of International Finance in Washington, managing director and head of Europe, Middle East and Africa (EMEA) Research at Deutsche Bank in London, leadership positions at Amundi (Pioneer) Asset Management, and director and chief economist for Russia and the Commonwealth for Independent States (CIS) at Citigroup.

Prior to that, Ribakova was an economist at the International Monetary Fund in Washington (1999–2008) working on financial stability, macroeconomic policy design for commodity-exporting countries, and fiscal policy. Ribakova is a seasoned public speaker. She has participated in and led multiple panels with leading academics, policymakers, and C-level executives. She frequently collaborates with CNN, BBC, Bloomberg, CNBC, and NPR.

She is often quoted by and contributes op-eds to the New York Times, Wall Street Journal, Financial Times, Washington Post, Guardian, Le Monde, El País, and several other media outlets.

Ribakova holds a master of science degree in economics from the University of Warwick (1999), where she was awarded the Shiv Nath prize for outstanding academic performance, and a master of science degree in data science from the University of Virginia (May 2023).

Lucas Risinger is an economic analyst and nonresident research fellow at the Kyiv School of Economics (KSE) Institute. His research focuses on the macroeconomics and military industrial complexes of Russia and Ukraine, as well as the Western sanctions regime against Russia.

Prior to joining KSE Institute, Risinger received his master’s degree from Harvard University’s Davis Center for Russian and Eurasian Studies, where his research centered around Ukraine’s modern economic development. He has studied and worked in Kyrgyzstan, Kazakhstan, Poland, Georgia, and Russia, and is fluent in Ukrainian and Russian.

Related content

Explore the program

The Eurasia Center’s mission is to promote policies that strengthen stability, democratic values, and prosperity in Eurasia, from Eastern Europe in the West to the Caucasus, Russia, and Central Asia in the East.

1    Rates remained at 21 percent for the first half of 2025 before the CBR entered a rate-cutting cycle in June. As of December, it has cut rates three times, down to 16.5 percent.
2    Source: General Administration of Customs of People’s Republic of China.
3    Using 2025 data in current US dollars (USD) from the International Monetary Fund’s World Economic Outlook.
4    In 2021, Germany imported 65 percent of its natural gas from Russia, whereas the EU as a whole imported 41 percent of its natural gas from Russia. Europe’s dependence on Russian energy has declined considerably since 2022 but has not disappeared entirely. A number of countries (including Germany) still import Russian liquefied natural gas, while Hungary and Slovakia remain the primary holdouts from the EU’s plan to phase out Russian oil.
5    Another stark visualization of the imbalance can be found at the Atlas of Economic Complexity.
6    It is also worth noting that the flood of Chinese cars into Russia has not been led by China’s booming electric vehicle (EV) industry—only about 10 percent of Chinese car sales in Russia are EVs.
7    Chinese firms also likely export CHPL items to Russia via Belarus and Central Asian countries, albeit at a smaller scale.
8    These costs include looser capital controls, opening up the yuan to speculative attacks and upward pressure from international capital flows, as well as the necessity of running a current account deficit.
9    Before the full-scale invasion, the Russian government abided by budget rules that were designed to be counter-cyclical: excess revenues (from oil and gas or from standard revenue sources) would be held in the NWF in foreign currencies, which could be converted back into rubles during downswings. This served to keep the ruble stable. These budget rules were temporarily abandoned after the full-scale invasion, however, and the NWF has been used to plug fiscal holes in the federal budget. A resumption of the budget rule saw deposits of renminbi and gold into the NWF, most recently in June 2025.
10    Large domestic banks are also the main facilitators of the large corporate credit expansion that has occurred during the full-scale war, prompting concerns that they are enabling the Kremlin to funnel money to the military-industrial complex.
11    Rostec is a state-owned military industrial behemoth that, for what it is worth, is one of the beneficiaries of the Kremlin’s subsidized loan programs.
12    Claims of progress on the Power of Siberia 2 project in September 2025 should not be overblown, as the two sides have yet to agree on three critical aspects: the price, the duration, and the take-or-pay level (the minimum amount of gas that China would purchase each year, regardless of demand). Without these three elements, any agreement is largely symbolic.
13    This section draws from a working paper for the Peterson Institute for International Economics (PIIE) co-authored by Yuriy Gorodnichenko, Iikka Korhonen, and Elina Ribakova.
14    Enforcing energy sanctions is no easy task either.
15    For example, the US Department of Commerce’s Bureau of Industry and Security, which handles export controls, is dreadfully under-resourced.

The post The Russian economy in 2025: Between stagnation and militarization  appeared first on Atlantic Council.

]]>
Middle powers’ game-changing rivalries in Africa https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/middle-powers-game-changing-rivalries-in-africa/ Wed, 10 Dec 2025 15:12:42 +0000 https://www.atlanticcouncil.org/?p=892867 As traditional powers retreat, middle powers like Turkey, the United Arab Emirates, Qatar, and Indonesia are stepping into Africa with ambitious investments and strategic outreach. Their growing presence is transforming alliances, competition, and development across the continent.

The post Middle powers’ game-changing rivalries in Africa appeared first on Atlantic Council.

]]>
While all eyes are on competing global powers such as the United States, China, and Russia, “middle powers” such as Turkey, the United Arab Emirates (UAE), Qatar, Saudi Arabia, Iran, Indonesia, Malaysia, and other nations are making remarkable breakthroughs on the African continent. This engagement is profoundly reshaping the African theater.

Their recent footsteps on the continent are becoming more and more attention-grabbing. These include Saudi companies buying 2.2 million tons of carbon credits at a 2023 Kenya auction and, in 2024, the UAE becoming the biggest investor in new business projects in Africa—including an investment of $4.5 billion in clean energy on the continent. At the same time, global attention has focused on Khartoum’s suit at the International Court of Justice alleging UAE involvement in the civil war in Sudan, which broke out in early 2023. The UAE has denied supporting the Rapid Support Forces paramilitary group.

In 2024, the third Qatar Africa Business Forum took place, following the Chinese, Russian, Japanese, US, and European Union summits with African nations. Doha has also been hosting the peace talks between the DRC and Rwanda through the M23 since March 2025, with the meeting between Congolese President Felix Tshisekedi and Rwandan President Paul Kagame under the aegis of the Emir of Qatar, Sheikh Tamim bin Hamad Al Thani. Before the October 7 Hamas attacks, Israel hoped to join this geopolitical trend with the goal of amplifying its ties with African partners beyond traditional security issues. In 2023, Japan celebrated the thirtieth anniversary of the Tokyo International Conference on African Development. Meanwhile, Indonesia sealed $3.5 billion in business deals from the Indonesia-Africa Forum in 2024, nearly six times the amount generated at the first forum six years ago.

As middle-power nations position themselves on the international scene, they are entering into direct competition with global powers such as the United States, China, and Russia. Moreover, new tensions are emerging among middle powers. For example, in April 2025, India held its first-ever Africa-India Key Maritime Engagement (AIKEYME) exercise, co-hosted with Tanzania and involving nine other African nations such as Kenya, Madagascar, South Africa, Djibouti, and others. Part of India’s motivation for this exercise is to offer a non-coercive security alternative in the Indian Ocean—countering China’s increasingly dominant maritime presence in Africa. Observers see India’s large-scale naval outreach as part of a broader geopolitical push: by strengthening maritime ties, India is increasing its influence in Africa at the expense of China’s traditional footprint there.

Even for closer allies such as China and Russia, a competition can exist: Russia providing security, weapons, and political backing in insecure regions risks undermining China’s investments focused on long-term economic stability (infrastructure, trade).

These moves have been triggered by three major internal changes that occurred on the African continent in the past few years: population growth, pro-sovereignty sentiment, and industrial transformation.

The African century

First, Africa is poised to become the next “demographic champion,” behind India and China. It is already on track to double its population by 2050, and may be the most populous continent by the end of the century. On the youngest continent in the world, this shift will have a strong economic impact on business markets with a rising group of African workers, consumers, and clients. The continent had already launched the largest free trade area in the world with the 2018 signing of an agreement to create the African Continental Free Trade Area. The numbers confirm these structural shifts. In February 2024, the African Development Bank noted that Africa featured prominently in a list of the world’s fastest-growing economies in 2024 and had better-than-average growth prospects in 2025, subject to global shocks. Sub-Saharan economic growth averaged 4.0 percent in 2024, exceeding expectations by 0.4 percentage points—but global shocks created a “sudden shift in the economic landscape,” including higher tariffs and greater uncertainty, according to the IMF’s April 2025 sub-Saharan report. When the IMF lowered the global growth outlook for 2025 by 0.5 percent, it trimmed sub-Saharan Africa’s outlook by 0.4 percentage points to 3.8 percent, noting that “regional growth is now expected to slow this year.”

Second, internal sentiment has led to significant external changes. A feature of African public opinion is a strong eagerness to protect African nations’ sovereignty against former colonial powers like France, with collateral impact on those powers’ allies: After France withdrew its military forces from Niger, the United States was asked to close its military bases there in July 2024 and in Chad in May 2024.

Nations without a colonial past in Africa have also faced criticism and pushback, including a growing call for transparency and value creation when it comes to Chinese lending practices and mining exploitation. Meanwhile, Russia’s Africa Corps (the successor to the Wagner Group) has regularly been exposed for its contribution to deadly attacks in the Sahelian countries they are supposed to be supporting with security assistance. The strong aspiration for greater African sovereignty is not limited to authoritarian regimes in the Sahelian countries—Mali, Niger, Burkina-Faso, and Chad—that recently experienced coups d’états. Democratic regimes such as Senegal are pivoting toward a more independent path as evidenced by the presidential campaign of April 2024 and the victory of a “patriotic” candidate.

This powerful trend is visible in various sectors, from defense policy (with the end of military cooperation agreements) to currency (with the growing rejection of the France-linked CFA franc), energy (with new norms of mining exploration), and even arts (with the restitution of African cultural heritage).

Third, industrial transformation has become a priority for many African countries. Observing that humanitarian aid and assistance have not always been productive and cannot meet their huge development needs, most African countries prioritize a transformation-driven vision. In the energy sector, where Africa is home to 30 percent of the world’s critical mineral reserves (cobalt, lithium, rare earth elements, copper, chromium, graphite, manganese, and platinum), expectations for what the sector can deliver are higher than ever. And in Africa’s underdeveloped manufacturing sector, there is “a significant opportunity to leapfrog more developed nations and build a thriving low-carbon manufacturing sector from the ground up,” according to a McKinsey & Company report; to do so would likely require investments of roughly $2 trillion to spur “decarbonization-fueled growth.” Therefore, the question is simple: How can Africa move from the extractive, even predatory, model of which it has often been victim to one that guarantees economic diversification, infrastructure development, increased revenue, fiscal stability, improved environmental management, and workforce training?

Within this transformative context, rising middle powers are playing an opportunistic card to capture the new African demands and take advantage of the diversification of African partnerships. Indonesia, for example, which needs more critical minerals (such as lithium) to feed its electric-vehicle (EV) battery industry, is actively positioning itself in Africa’s mining space, in partnerships and not necessarily at the expense with African states.

This is quite significant because it shows Indonesians are not only investing in resource-rich African countries, but also partnering with local state mining firms. For example, PT Timah (an Indonesian tin mining company) has a signed memorandum of understanding with Stamico, a Tanzanian state-mining corporation, to explore tin, nickel, gold, and even rare earth elements.

Returning to Africa for the twenty-first time on the occasion of the thirty-seventh Ordinary Session of the Assembly of the Heads of State and Government of the African Union, Brazil’s President Luiz Inácio Lula da Silva noted that “more than half of the 200 million Brazilian citizens recognize themselves as Afro-descendants.” During Lula’s first presidency, Brazil opened nineteen African embassies. Meanwhile, India showcased its support for the African Union’s Group of Twenty (G20) permanent seat in September 2023.

Regional routes

Very often, investment expansion starts with a bold airline strategy. Consider Turkish Airlines, which connects more than sixty African destinations and has long been a key tool for Turkey’s influence in Africa. Thanks to its “Action Plan for Africa” in 1998 and its “Opening to Africa” program launched in 2005, Turkey’s international outreach to sub-Saharan Africa has flourished, while the European Union’s doors remain closed to Ankara. Turkey has expanded trade ties with African partners, with bilateral trade growing from $5.4 billion in 2003 to $40.7 billion in 2022. The number of Turkish embassies has also increased from twelve to forty-three between 2009 and 2021.

Qatar is taking similar steps, with Qatar Airways investing $1.3 billion to acquire 49 percent of RwandAir in 2020 and, more recently, a 25 percent equity stake in one of Africa’s largest regional airlines, Airlink, which serves fifteen African countries and flies to forty-five destinations.

Building on this experience and taking advantage of their geographical proximity, many Muslim countries in the Middle East have been developing ties with African countries. Water, forests, land, critical minerals: Africa has strategic resources Gulf countries lack. From 2016 to 2023, the commercial volume generated between the Gulf Cooperation Council (GCC) countries—the UAE, Saudi Arabia, Qatar, Kuwait, Bahrain, and Oman—and Africa doubled to $121 billion, according to Afreximbank. The pan-African organization notes that those investments come primarily from the UAE (54.9 percent), Saudi Arabia (25.6 percent), Qatar (7.2 percent), Kuwait (5 percent), and Bahrain (4.2 percent); they have been directed to Egypt (69.8 percent), Morocco (4.6 percent), Algeria (3 percent), Nigeria (2.6 percent), and South Africa (2.3 percent).The level of direct investments in Africa between 2012 and 2022 has outpaced $100 billion, while the Gulf countries spent $9.2 billion in aid in 2022 (equal to 14 percent of global aid received by African countries). The key sectors of investment are construction, environmental technology, energy, transportation, and agribusiness.

What is a middle power?

Despite their geographical diversity, the middle powers that have emerged on the African scene in a significant way share common features.

For sure, we know they are neither superpowers like the Cold War’s United States and USSR nor hyperpowers as the United States was named following the collapse of the Soviet Union in 1991. They don’t belong to the P5, the group of permanent members of the United Nations Security Council (China, France, Russia, the United Kingdom, and the United States). Economically speaking, they are not yet among the richest countries in the world (based on gross domestic product): the United States, China, Germany, Japan, India, the United Kingdom, France, Italy, and Canada. (The case of India is discussed below.) But many are close: Brazil (tenth place), South Korea (twelfth), Indonesia (sixteenth), Turkey (seventeenth), Saudi Arabia (nineteenth), and the UAE (twenty-seventh). Even if some have not reached the top thirty, their ambitions are large enough to place them among Africa’s rising partners, such as Qatar (in fifty-fifth place), which pledged to invest $103 billion across six African countries in 2025.

Beyond belonging to the group of high-GDP countries, middle-power nations have four other common characteristics:

  • They make demonstrations of power: e.g., South Africa referred a case to the International Court of Justice in May 2024 accusing Israel of “genocide” in Gaza.
  • Middle powers can belong to the neighborhood, like the Gulf countries, or be located far away like South Korea, which organized a June 2024 African summit attracting forty-eight African delegations.
  • Their influence is contained because a regional power is not autonomous: It belongs to a more global system of influence like Turkey, which may be expanding its diplomacy in Africa but is limited by its NATO membership.
  • Middle powers must be creative by deploying indirect persuasion techniques on the ground: In 2017, Turkey persuaded Senegal to close schools linked to Fethullah Gülen, a cleric Ankara alleges was behind a 2016 coup attempt.

The cases of Russia and India

While some of the countries mentioned above clearly belong to the category of middle powers, two cases remain difficult to classify.

After losing the Cold War and its empire in 1991, Russia, now the world’s eleventh largest power in terms of GDP, has since sought to move from a Eurasian middle power, integrated into the Commonwealth of Independent States, to a global power that spans from its position within the Shanghai Cooperation Organization as far as Africa with the newly renamed Africa Corps, which deploys propaganda operations there.

As for India, the most populous country and the fifthlargest economic power in the world, it has been able to expand its influence in Africa thanks to the longstanding presence of its diaspora in the east of the continent as well as its involvement in the Non-Aligned Movement, which emerged from a summit in Bandung, Indonesia, in 1953.

The uncertainty about the position of Russia and India is not due to their economic power—they are both among the richest countries in the world—but stems from the fact that these two countries have more impact than the middle powers but less than the global powers. They have features of both groups. Time will tell where they will fall. Thus, while Russia was the leading supplier of arms to Africa ($14.6 billion) in 2021—far ahead of the United States ($5.4 billion)—the level of its trade with Africa has remained very low. According to European data, in 2022, Africa’s imports from Russia were less than 2 percent of its total imports; and African exports to Russia were less than 1 percent of Africa’s total exports. This supports the idea that even as trade has grown in absolute terms, Russia is still not a major economic partner for Africa compared to the European Union or China.

Three weight classes

The middle-power nations can be divided into three groups, depending on their economic weight and the depth of their engagement in Africa:

  • Level 1: UAE, Brazil, and Turkey
  • Level 2: Iran, Indonesia, Saudi Arabia, and Qatar
  • Level 3: South Korea and Malaysia

They are all benefiting from the retreat of the former colonial powers, which are essentially European, the most striking expression of which is France in the Sahel. Also of note is the relative weakening of superpowers in Africa: According to a recent Gallup report, China surpassed the United States in popularity on the continent in 2023. At the same time, China’s dominant position is no longer so hegemonic: While the value of China-Africa trade has increased nearly thirty-fold since 2000 to reach $282 billion in 2023—making China Africa’s largest trading partner—China’s official loans totaled less than $1 billion in 2022 for the first time in eighteen years, according to Boston University’s Global Initiative for China. When the world powers are less involved, there is a vacuum that the middle powers have been quick to fill. And African nations are among those interested in interacting with them in regional groups such as the BRICS: South Africa, Ethiopia, and Egypt have all joined the intergovernmental organization.

Creativity and boldness

In any case, the tools of influence that the middle-power nations deploy in Africa are different from those of the traditional powers. Thus, the UAE has established itself, with its maritime giant Dubai Ports World, as one of the world’s largest port operators in the strategic areas of the Red Sea and the Indian Ocean, with the aim of being less dependent on hydrocarbons and ensuring its food security. The cultural influence of regional powers, which is less well-known, has also been crucial in recent years. For example, Saudi Arabia’s investments in West African education systems have increased the use of the Arabic language. The Indian diasporas have served as an effective support for India’s strategy, whose successful Bollywood films participate in the information war. The Qatari channel Al Jazeera and the Turkish news agency Anadolu cover the continent widely. Many middle powers broadcast their messages in local African languages; Turkey’s TRT and Natural TV offer programs in Hausa and Swahili and television series popular in many countries.

As a result, these middle powers have acquired considerable political influence. India took advantage of its presidency of the G20 in September 2023 to take credit for the African Union’s permanent seat in the G20. In 2015, many African countries, including Niger, Chad, and Mauritania, joined the founding members of the Islamic Military Counterterrorism Coalition, created by Saudi Arabia.

While none of these middle powers has been able to replace the traditional global powers or former colonial powers such as France or the United Kingdom in terms of engagement volume, their growing influence on the continent puts them in a position of strength. The competition will not, however, benefit everyone in the long run. No doubt the future belongs to the powers that can navigate the shifts already underway by forming complementary and winning alliances in a more complex geopolitical scene—dominated by interests, not ideology. This is undoubtedly the reason why, in the African theater, Russia and Iran are seeking closer cooperation, as, separately, China and Russia are as well. On these complex alliances, the Western powers are behind. Meanwhile, regional powers may need to clarify their intentions in Africa, such as the case of the UAE in the bloody civil war in Sudan, in order to preserve their comparative advantage vis-à-vis the informed African public, aware of what is happening on their soil.

About the author

Related content

Explore the program

The Africa Center works to promote dynamic geopolitical partnerships with African states and to redirect US and European policy priorities toward strengthening security and bolstering economic growth and prosperity on the continent.

The post Middle powers’ game-changing rivalries in Africa appeared first on Atlantic Council.

]]>
Delivering justice and jobs is the real test of Ghana’s storied democracy https://www.atlanticcouncil.org/in-depth-research-reports/report/delivering-justice-and-jobs-is-the-real-test-of-ghanas-storied-democracy/ Thu, 04 Dec 2025 21:32:04 +0000 https://www.atlanticcouncil.org/?p=888683 Vigilant media and active civil society sustain Ghana’s democracy, but weak judicial independence erodes public trust. Rising youth joblessness calls for reforms to strengthen industry, modernize agriculture, and align skills training to labor-market needs.

The post Delivering justice and jobs is the real test of Ghana’s storied democracy appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Civil society and independent media are the backbone of Ghana’s democracy: Their roles as watchdogs, notably real-time monitoring and publication of polling-station election results, has strengthened credibility of election outcomes.
  • Judicial independence remains fragile, with public trust in the judiciary dropping by 20 percentage points since 2011.
  • Limited job prospects for Ghana’s growing population of educated youth present a significant threat to its democratic consolidation.

This is the first chapter in the Freedom and Prosperity Center’s 2026 Atlas, which analyzes the state of freedom and prosperity in ten countries. Drawing on our thirty-year dataset covering political, economic, and legal developments, this year’s Atlas is the evidence-based guide to better policy in 2026.

Evolution of freedom

Ghana’s signature achievement since the mid-1990s is the consolidation of civic and political freedoms and a competitive political order in which citizens, journalists, and civic organizations routinely hold leaders to account. The durability of this achievement is not a result of elite benevolence or political will but the product of a dense, independent civil society and a remarkably resilient independent media ecosystem. When governments test the boundaries of civic space, the response is often swift and organized; this social infrastructure is the primary reason Ghana’s civic and political freedoms have remained consistently strong for more than two decades. This context is reflected in the Atlantic Council’s Freedom and Prosperity Indexes’ political subindex for Ghana, which sits well above the economic and legal subindices. In recent years, it sits in the low-to-mid 70s out of a maximum score of 100, a pattern that aligns with lived realities. In the most recent Afrobarometer survey, conducted in 2024, an overwhelming majority of Ghanaians (85 percent) reported that they did not fear political violence or intimidation during the last national elections, a strong testament to the electoral freedoms that Ghanaians enjoy. Moreover, a majority (52 percent) expressed trust in civil society organizations, ahead of religious leaders (who are trusted by 49 percent). Only the military (trusted by 65 percent) ranks ahead of civil society organizations in Ghana.1

The historical roots of this civic vigilance matter. From the anti-colonial mobilization led by Kwame Nkrumah, Ghana’s first post-independence president, and mass professional and student associations to later generations of advocacy groups and think tanks, Ghanaians have long treated resistance to state overreach as a civic obligation.

As formal unions of lawyers, teachers, students, and medical professionals gave way to contemporary civil society and independent media organizations and research networks—among them, the Media Foundation for West Africa, the Ghana Anti-Corruption Coalition, the Ghana Integrity Initiative, the Ghana Center for Democratic Development, and many others, including subnational advocacy groups—the core impulse has remained the same: to protect and defend civic space, demand procedural fairness, and insist that those in power remain answerable to the public. This explains why the social reaction to efforts to undermine political freedoms is often met with resistance and why Ghana’s political openings have not been easily reversed.


Ghanaians have long treated resistance to state overreach as a civic obligation.


Electoral integrity is a useful illustration of how these social checks operate. While the courts can usually be swayed by partisan crosscurrents when individual political actors are charged with corruption or other acts of impropriety, the dynamic is often different with election disputes. The vigilance of civil society and independent media organizations in monitoring and independently collating election results at the polling-station level often helps to provide credible evidence when electoral disputes arise. The volume and quality of that evidence strengthen adjudication, making it harder for judicial bias to gain traction and increasing the credibility of outcomes, even in contentious contests.2 This distinction is important: While the administration of justice in ordinary (nonpolitical) cases is broadly reliable, the politicization of corruption cases can distort judicial behavior; election cases, by contrast, have benefitted from robust, external scrutiny that fortifies the work of the courts.

This juxtaposition points to the core challenge in Ghana’s performance on legal freedom: The judiciary’s structural vulnerability to executive influence, particularly through appointments to the High Court and Supreme Court. Observers can—and do—sort judges into partisan “buckets,” a perception that inevitably erodes confidence in the system’s neutrality. Survey data clearly show a deterioration of citizens’ trust in the judicial system in the last fifteen years, falling by 20 percentage points since 2011.3 Yet outside of high-stakes political cases, the courts tend to function competently and deliver justice with regularity.

Recent movement in the legal subindex has been mildly positive, driven in part by improvements in informality and, to a lesser degree, by steadier security conditions after the turbulence of the early 2000s. On informality, the government’s digitalization initiatives, including the introduction of national (and tax) identification (the Ghana Card) and a digital address system, have helped to identify and increasingly formalize informal businesses. Other initiatives, such as the institution of fee-free secondary education, opened opportunities for young Ghanaians to further their education instead of entering the informal economy. The National Youth Employment Program, although relatively less successful, helped to draw young entrepreneurs into more formalized activities. Finally, a surge of capital investments into construction, alongside an expansion in mining activities, has created demand for artisans, contractors, and allied tradespeople who transact in more formal ways than the street-level microenterprise typical in developing economies. The result is a measurable reduction in the prevalence of informality, a trend visible within the relevant component of the legal subindex.

The gradual strengthening of security owes more to internal stability than to a benign regional environment. Ghana’s northern border with Burkina Faso and proximity to Nigeria’s insurgency-affected areas create constant risks, and yet Ghana has avoided the cascade of instability that has afflicted parts of the Sahel. That relative steadiness, together with the normal functioning of everyday justice for nonpolitical cases, helps explain why legal freedom is trending slightly upward despite persistent concerns about executive sway over judicial appointments and decisions.


Ghana has avoided the cascade of instability that has afflicted parts of the Sahel.

Corruption control within the justice sector is another area to watch. Across administrations, chief justices have consistently placed anti-corruption at the center of their institutional reform agendas, and recent executive appeals to rebuild public trust in the courts suggest continued political salience. However, these public commitments have not always translated into tangible reforms or outcomes. Public perception of judicial corruption remains high: According to the 2024 Afrobarometer survey, more than 40 percent of Ghanaians believe that “most or all judges and magistrates” are corrupt.4 The growing trend of presidents appointing loyalists to the Supreme Court has only reinforced these perceptions, contributing to Ghana’s relatively weak performance on the legal subindex. The ongoing constitutional review presents an opportunity to reform judicial appointments and promotions, tighten avenues for corruption, and strengthen judicial independence.

Ghana’s strong performance on elections, civil liberties, and political rights within the political subindex is tempered by weaker scores on legislative constraints on the executive, highlighting concerns about the effectiveness of institutional checks in practice. However, civil society remains uncompromising in defending democratic norms, including contesting attempts to erode these checks. The resulting equilibrium is not perfect—nor is it immutable—but it has proven remarkably resilient over the past generation.

Economic freedoms have followed their own trajectory, with a notable increase from the mid-2000s into the first half of the 2010s, a period that coincided with the broader “Africa Rising” narrative. This period was characterized by strong improvements in governance and economic growth, rising incomes, and a growing middle class. Consolidation of Ghana’s return to constitutional democracy commenced in the year 2000 with the transfer of power from the ruling party to an opposition party, which further boosted optimism in the country’s political and economic outlook. The new political leadership signaled a clear focus on improving the economy, and market openness and property-rights enforcement seemed to find firmer footing. Former President John Kufuor is remembered in this context for emphasizing macroeconomic health and business-climate improvements that many citizens experienced in their daily lives. The results of committed political leadership and effective economic management are reflected in the economic subindex and the other components such as investment freedom and property rights, starting in the mid-2000s.

The subsequent downturn around 2015 is worth noting. Rising debt-service pressures, coupled with a large budget deficit and high inflation culminated in Ghana going in for an IMF program; a similar pattern occurred around 2023-24 as reflected in the downward trend of the economic subindex. These patterns signal the fragility of gains when fiscal anchors are not backed by disciplined fiscal decisions—such as politically motivated increases in public spending during election years and subsidies on utilities and petroleum products, among others—and when investment freedom and property-rights expectations face credibility questions. These observations underscore that Ghana’s enviable political freedoms do not automatically translate into disciplined fiscal management or sustained economic openness. The freedom metrics capture this: The political subindex remains high, while the economic and legal dimensions fluctuate with policy choices that either reinforce or erode market institutions and democratic norms.

Trade freedom tells a more erratic story. Ghana’s trade policy framework has generally been open by regional standards, but the component’s volatility reflects the broader health of the economy and investors’ read on the policy environment. In periods of economic stress, policy consistency suffers, and openness on paper does not translate into confidence in practice. The trends in the data thus track not only tariff schedules and non-tariff measures but also the credibility of macroeconomic management, which is often punctuated in election years.

The trajectory of women’s economic freedom stands out as a major structural improvement. Around 2004, there was a steep rise in the economic subindex driven in part by a cluster of women’s empowerment policies of the Kufuor administration: free maternal health services, including postnatal care services that reduced a key barrier to women’s labor-market participation, and explicit efforts to expand women’s access to finance and enterprise support. Those initiatives may have helped to boost women’s economic autonomy and anchor a higher plateau that persisted in the years that followed. The component’s level has stagnated since about 2008 and hence leaves some room for improvement—but the rapid change around 2004 is unmistakable. Recent Afrobarometer survey data for Ghana show strong popular support for women to have equal rights to work as men. However, more than a quarter of Ghanaians (26 percent) identify employers’ preference for hiring men as the top barrier to women’s advancement, ahead of childcare (17 percent) and skills gaps (16 percent).5

Where do remaining constraints lie? First, land ownership: In Ghana,  community and family lands are predominantly controlled by male heads; women’s ownership and collateralization of land remain very limited. Given the economic value of land, women remain at a significant disadvantage that dampens entrepreneurship, constrains access to credit, and restricts intergenerational wealth transfer for women. Second, intrahousehold decision-making: In many households, women’s ability to take paid work outside the home remains mediated by male authority. These social and legal frictions are the kinds of de facto constraints that keep the Women’s Economic Freedom component below its potential despite the formal policy gains that started in the mid-2000s.

Evolution of prosperity

Ghana’s prosperity trajectory since the mid-2000s mirrors, in broad outline, the “Africa Rising” era: a period of macroeconomic optimism, improved governance, favorable terms of trade, and political stability across much of the continent. Between 2005 and the mid-2010s, the Prosperity Index registered a strong and upward trend, reflecting the robust growth in incomes and steady improvements in social indicators, even as inequality widened in the classic early-development pattern. Ghana rode this wave and, for several years, significantly outpaced the sub-Saharan Africa average.

The story of the income component is familiar but still striking in its local particulars. A large discovery of offshore oil in the late 2000s added a new driver to a commodity basket already weighted toward gold and cocoa. In the mid-2000s, when global commodity prices were favorable, Ghana’s growth accelerated sharply; in 2011, Ghana recorded a double-digit real GDP growth rate (about 11 percent), up from about 8 percent the year prior. Oil windfalls amplified these gains, though they also heightened exposure to volatility and raised questions about how resource-linked revenues were managed.6 The income component of the Prosperity Index captures this rise and the subsequent plateau, which has persisted over the last decade. Reversals are visible too, mainly coinciding with the two IMF interventions mentioned earlier, driven in large part by fiscal indiscipline during election years.

The inequality component of the Prosperity Index shows a rapid deterioration, especially from the year 2000. But the composition of Ghana’s inequality is complex. It is not simply a rural-urban story; it is also generational. Large cohorts of better-educated youth, especially those under thirty-five, struggle to find formal employment at scale, while older cohorts, who are relatively less educated, hold on to existing jobs.7 The consequence is an age-skewed labor market that expands inequality even as education levels rise. On the rural side, extensive reliance on small-holder agriculture—more than 40 percent of the population is engaged in subsistence farming—keeps cash incomes low. Climate variability has compounded these pressures, with shifts in rainfall and temperature patterns outpacing the seed and crop research needed to adapt. The Index’s inequality line captures the macro pattern, and the underlying micro-mechanisms are the youth (un)employment crunch and the persistent productivity trap of smallholder agriculture.

Environment and health are relative bright spots. The national push to switch households from charcoal and wood to liquefied petroleum gas (LPG) for cooking—especially the 2013 rural LGP promotion program—may have helped to reduce indoor air pollution and, with it, the number of respiratory and related illnesses. Additionally, the government’s 2021 Green Ghana initiative to plant five million trees nationwide to combat desertification signaled a strong commitment to environmental issues in the country.8 The behavioral transition and practical action on desertification probably account for the Prosperity Index’s environment component alongside CO₂ and other measures. On the health side, Ghana’s COVID-19 response benefitted from institutional memory and capacity developed during earlier West African epidemics. Ebola never crossed into Ghana, thanks in part to the region’s experience dealing with health epidemics. When COVID-19 broke out, pandemic protocols were quickly activated and enforced, which resulted in comparatively low infection rates and deaths and a health system that proved more resilient than many expected.

Education presents a more mixed picture. Policy volatility in the secondary cycle—oscillating between three- and four-year models—created confusion and capacity mismatches just as youth cohorts ballooned. Free, compulsory basic education expanded access, but in many districts infrastructure and staffing could not keep pace, producing “shift systems” and, in some cases, causing students to drop out before completing upper-secondary education. Because the Prosperity Index’s education component bundles mean years of schooling with expected attainment, the friction from policy oscillation and demographic pressure is visible at a level that remains middling despite long-run improvements.

Finally, informality also intersects with prosperity through the labor market. The government’s digitalization programs—the introduction of the Ghana Card, which links to individual tax identification numbers, as well as the digital address system—have expanded formalization of the national economy. Moreover, governments’ special initiatives to increase youth employment and a boon in the construction and mining sectors have pulled workers into the formal sector. These interventions should, in principle, raise tax revenues and improve public service availability and access over time. The hard question is durability: Formalization built on cyclical or enclave sectors may not last if investment slows or governance costs mount. The Prosperity Index cannot answer that question by itself, but its pattern—modest gains in prosperity with uneven distributional effects and vulnerability to macro slippage—point to areas where reforms might matter most.

The path forward

The economic, social, and political outlook of Ghana’s next decade will depend largely on the steadiness with which it improves core institutions and transforms its civic strength into predictable, broad-based gains. Moreover, aligning reforms to citizens’ stated priorities—jobs, public services, and integrity—can increase traction.9 The political foundations are relatively strong; the next important step is ensuring that the transparency and accountability mechanisms that guard the conduct of elections also insulate the justice system from partisan distortion in high-stakes cases. Judicial appointments will remain politically salient, but the deeper imperative is to tighten the system’s incentives so that corruption cases are decided on evidence rather than allegiance. Civil society and media can help—by maintaining the evidentiary standard that has worked in election disputes—but ultimately the judiciary must build a reputation for political impartiality that is strong enough to withstand executive pressure. The ongoing constitutional review offers a chance to implement a judicial reform agenda that delivers on this objective.

Economic management is the second pillar. The political business cycles are familiar by now: A new government comes to power and starts out with prudent fiscal management that boosts confidence and attracts investment, often resulting in an increase in the economic subindex. Then comes election time and fiscal indiscipline—such as excessive borrowing and indiscriminate public spending with weak fiscal oversight—erode confidence and investment freedom, triggering adjustment and decline. Breaking this cycle requires more than fiscal rules on paper; it requires political commitment to enforce them consistently and minimize politically motivated borrowing and spending. The 2015 and 2024 IMF programs are markers of what happens when that discipline falters. In the coming years, the goal should be to make investment freedom boring—i.e., stable, predictable, and insulated from the electoral business cycle.

On economic freedom, two structural agendas stand out. The first is women’s economic freedom. The 2004 leap tied to women-centered policies shows how targeted policy can permanently raise the ceiling of economic progress. The unfinished business is in property rights, especially land ownership. In areas where family land remains the norm and titles are controlled by male heads, women’s ability to own, mortgage, and leverage land is curtailed. Reform here is politically delicate, embedded in social norms and local authority structures, but the economic payoff could be enormous: more women-owned firms, better access to credit, and fairer intergenerational asset accumulation. The women’s freedom component of the Index offers a clear benchmark; moving from the mid-seventies to the high eighties would require not just programs but enforceable property rights.

The second is youth (un)employment. Inequality in Ghana increasingly wears a generational face;a cohort of better-educated young people cannot find formal, stable jobs in sufficient numbers. Policy tools here must focus on easing business entry, expansion in labor-absorbing sectors, and modernizing agricultural value chains so that rural youth are not confined to subsistence farming. Climate-smart research and extension services, reliable input markets, and storage and transport infrastructure can help farmers move up the value ladder—and should be paired with vocational pathways aligned to construction, light manufacturing, and services. Such an agenda could help to address the twin problems of rural low productivity and urban underemployment.

Strengthened legal freedom and rule of law can support both agendas if reforms focus on clarity of the law and the quality of bureaucracy. Where statutes are clear, predictable, and enforced uniformly, the transaction costs that push firms into informality will fall; where frontline administration is competent and corruption risks are contained, formalization becomes a benefit rather than a burden. Ghana’s recent sector-led formalization has demonstrated that workers and firms will choose formal channels when the opportunity set changes. The task now is to make those choices systemic: digital one-stop services for business registration and tax collection; credible and quick adjudication for commercial disputes; and incentives for small firms to formalize without fear of retroactive penalties.

Regional (in)security will remain a concerning external variable. Instability in parts of the Sahel and the enduring threat of violent extremism in neighboring regions create risks that Ghana has to grapple with. The country’s success to date reflects internal discipline and professional security services, but the calculus can change quickly as alliances and external funding priorities shift. Ghana’s democratic resilience—anchored in a vigilant civil society and robust private media—makes it better placed than many to navigate these shocks without sacrificing core freedoms. The imperative is to ensure that security responses remain proportionate and bounded by law, so that security gains are not purchased at the cost of civil and political liberties that have been the bedrock of Ghana’s democratic success story.

Geoeconomic partnerships will also shape the opportunity set for Ghana. Specifically, infrastructure that lowers freight costs—an inland port located up north with rail connectivity, for instance—has immediate appeal, and Ghana would do well by investing in this area. Engagements with Chinese state and private investors are often judged domestically on whether they deliver such tangible benefits; they are not, by themselves, read as threats to democratic credentials. The test for the next decade is to structure these partnerships transparently, align them with national priorities, and avoid governance concessions that have complicated infrastructure deals elsewhere. If done well, they can help stabilize economic policy by supporting trade freedom in practice, not just on paper, and by attracting private investment that widens formal employment.

The prosperity side of the ledger will hinge on two slow-moving but decisive social investments. The first is education system reliability. When secondary school terms oscillate, cohort planning collapses; when seating capacity lags enrollment, “shift systems” lead to lost learning and early exits. The policy objective must prioritize stability: a curriculum and cycle length that survives political alternation, infrastructure that grows with cohorts, and targeted support to keep marginal students—especially rural girls—through upper secondary. If achieved, educational attainment will move steadily upward, with compounding effects on income and inequality.

The second is health and environment. Ghana’s clean cooking fuel and afforestation initiatives demonstrate how coordinated public messaging and practical access can drive large-scale shifts in household behavior—which often yield immediate and tangible benefits. Extending this logic—through cleaner fuels, safer urban air, adaptive health systems, and expanded green coverage—can enhance environmental quality, improve health outcomes, and free up resources otherwise consumed by preventable disease burdens.

Finally, the country’s political economy will continue to be shaped by how it manages its natural resource wealth. When mineral and oil revenues supplant tax collection, citizens have fewer reasons to monitor spending, governments face fewer incentives to be transparent, public resource leakages rise, and the discipline that keeps debt manageable erodes. A forward-looking reform would therefore tackle the credible fiscal rules that bind during booms, transparent revenue management that makes it costly to divert funds, and a tax system that is simple enough to comply with and fair enough to legitimize. The expanded government digitalization programs offer sound foundations to make this possible. If Ghana can lock in these basics while preserving the civic and media freedoms that have distinguished it for three decades, legal and economic institutions will catch up and converge with political freedom, and prosperity gains will follow.

Ghana’s comparative advantage is … the lived practice of accountability that precedes and outlasts any single administration.

Civil society and media have proven that they can guard the franchise; the task before us is to extend that guardianship to the legal system’s most politically sensitive corners and to the fiscal choices that unlock prosperity and avoid the familiar cycle of fiscal indiscipline, crisis, and repair. If managed well, the evidence should be visible where it matters most: a steadier investment freedom line, a women’s economic freedom score that rises again rather than plateaus, an inequality curve that bends as youth employment expands, and a legal freedom profile that reflects not just order in the streets but fairness in the courtroom. That is the trajectory Ghana can reasonably aim for in the decade ahead, and it is within reach.

about the author

Joseph Asunka is the CEO of Afrobarometer, a pan-African survey research organization that conducts public attitude surveys on governance and social issues across the continent. His research interests are in governance, democracy, and political economy of development. He holds a PhD in political science from the University of California at Los Angeles.

Explore the data

The Indexes rank 164 countries around the world. Use our site to explore thirty years of data, compare countries and regions, and examine the subindexes and indicators that comprise our Indexes.

Stay Updated

Get the Freedom and Prosperity Center’s latest reports, research, and events.

Stay connected

Read all editions

2026 Atlas: Freedom and Prosperity Around the World

Against a global backdrop of uncertainty, fragmentation, and shifting priorities, we invited leading economists and scholars to dive deep into the state of freedom and prosperity in ten countries around the world. Drawing on our thirty-year dataset covering political, economic, and legal developments, this year’s Atlas is the evidence-based guide to better policy in 2026.

2025 Atlas: Freedom and Prosperity Around the World

Twenty leading economists, scholars, and diplomats analyze the state of freedom and prosperity in eighteen countries around the world, looking back not only on a consequential year but across twenty-nine years of data on markets, rights, and the rule of law.

2024 Atlas: Freedom and Prosperity Around the World

Twenty leading economists and government officials from eighteen countries contributed to this comprehensive volume, which serves as a roadmap for navigating the complexities of contemporary governance. 

Explore the program

The Freedom and Prosperity Center aims to increase the prosperity of the poor and marginalized in developing countries and to explore the nature of the relationship between freedom and prosperity in both developing and developed nations.

1    Center for Democratic Development, Afrobarometer Round 10 Survey in Ghana, 2024, https://www.afrobarometer.org/wp-content/uploads/2025/04/Ghana-summary-of-results-Afrobarometer-R10-22april25.pdf (see pages 30, 32, and 33 of the summary of results tables).
2    For causal evidence that domestic observers in Ghana’s 2012 elections reduced fraud and violence at monitored stations and altered parties’ manipulation strategies, see Joseph Asunka et al.,  “Electoral Fraud or Violence: The Effect of Observers on Party Manipulation Strategies,” British Journal of Political Science 49, no. 1 (2019): 129–51.
4    Center for Democratic Development, “Ghanaians Decry Widespread Corruption, Afrobarometer Survey Shows,” news release, February 14, 2025, https://www.afrobarometer.org/wp-content/uploads/2025/02/R10-News-release-Ghanaians-decry-widespread-corruption-Afrobarometer-14feb25.pdf.
6    According to an Afrobarometer survey in 2022, 85 percent of Ghanaians support tighter regulations of natural resource extraction. See Center for Democratic Development, “Ghanaians Call for Tighter Regulation of Natural Resource Extraction,” news release, November 8, 2022, https://www.afrobarometer.org/wp-content/uploads/2022/11/R9-News-release-Ghanaians-call-for-tighter-regulation-of-natural-resource-extraction-Afrobarometer-bh-7november22.pdf?utm_source=chatgpt.com.
7    Josephine Appiah-Nyamekye Sanny, Shannon van Wyk-Khosa, and Joseph Asunka, “Africa’s Youth: More Educated, Less Employed, Still Unheard in Policy and Development,” Afrobarometer, November 15, 2023, https://www.afrobarometer.org/wp-content/uploads/2023/11/AD734-PAP3-Africas-youth-More-educated-less-employed-still-unheard-Afrobarometer-13nov23.pdf.
8    Elorm Ntumy, “Green Ghana Day: A Chance to Turn the Tide on Deforestation,” UN Capital Development Fund, 2021, https://www.uncdf.org/article/6857/green-ghana-day.
9    See Joseph Asunka and E. Gyimah-Boadi, “People-Centered Development: Why the Policy Priorities and Lived Experiences of African Citizens Should Matter for National Development Policy,” Foresight Africa 2025–2030, May 13, 2025, https://www.brookings.edu/articles/people-centered-development-why-the-policy-priorities-and-lived-experiences-of-african-citizens-should-matter-for-national-development-policy/.

The post Delivering justice and jobs is the real test of Ghana’s storied democracy appeared first on Atlantic Council.

]]> Improving transatlantic cooperation on digital competition https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/improving-transatlantic-cooperation-on-digital-competition/ Thu, 04 Dec 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=888039 Greater dialogue between US and EU regulators would reveal similar priorities on digital competition, mergers, and antitrust issues, and could lead to greater alignment on key digital competition issues.

The post Improving transatlantic cooperation on digital competition appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Despite US officials’ stated opposition to the EU’s Digital Markets Act, the United States and the European Union have similar priorities on digital competition.
  • Dialogue between US and EU regulators could identify consistent approaches to mergers and antitrust issues, making it easier for companies to adopt similar business models on both sides of the Atlantic.
  • Public communications linking antitrust actions to consumer welfare, competitiveness, and economic growth can help competition enforcers withstand political pressure.

Executive summary

President Donald Trump’s policies are substantially reshaping prospects for transatlantic cooperation across a range of policy areas. In digital competition, the picture is complex. The Trump administration opposes Europe’s competition regulation, but both the European Commission and US federal and state competition enforcers have similar priorities when it comes to competition in digital markets.

US-European Union (EU) dialogue could help make interventions to promote digital competition more effective. It could boost consistency (helping firms adopt the same remedies across both sides of the Atlantic) and help regulators share knowledge and best practices. Beyond technical alignment, EU and US authorities can coordinate on narratives and messaging, ensuring that regulatory measures are perceived as fair and mitigating the risk of digital competition policy fueling foreign policy disputes.

At a recent roundtable hosted by the Centre on Regulation in Europe (CERRE) and the Atlantic Council, we identified the following recommendations for competition enforcers on digital antitrust.

  • The European Commission and national competition authorities should continue to cooperate with US federal agencies and strengthen their cooperation with US state attorneys general, given their important role in US digital antitrust cases.
  • To effectively learn from each other’s experience with remedies, and to enhance mutual learning and correct remedies when needed, competition agencies in both the EU and the United States should have a robust, evidence-based assessment about how their remedies have performed.
  • The European Commission needs to improve its communication strategy when pursuing antitrust cases. Antitrust enforcement must be closely linked to consumer welfare, competitiveness, and economic growth. Enhancing its legitimacy can help ensure European competition enforcers withstand any political pressure.
  • Europe needs to better highlight how open and competitive markets foster innovation. Tools to open competition are therefore important ways to support US and European global technological leadership.

In relation to merger policy, competition authorities on both sides of the Atlantic are evolving to better tackle the role of innovation in digital markets. Recommendations include the following.

  • EU and US authorities should develop consistent guidelines setting out how they will assess a merger’s impacts on innovation capabilities (such as chips and computing power, skills, data, and risky and patient capital) and incentives to innovate. Pro-innovation merger control should promote the new innovators and not protect the old ones.
  • The Directorate-General for Competition (DG-Comp) should aim to learn from the US merger guidelines and US authorities’ recent practices to inform the EU’s current exercise of revising its own guidelines.
  • As with antitrust remedies, competition authorities in both the EU and the United States must be honest and clear about how their merger remedies have performed, so that different authorities can become better by learning from each other’s successes and mistakes.

Introduction

Trump’s policies have challenged the transatlantic relationship and are reshaping prospects for transatlantic cooperation. On digital competition, the picture is particularly complex. The president and some of his appointees to the Federal Trade Commission (FTC) and the Department of Justice (DOJ) Antitrust Division oppose Europe’s competition regulation, the Digital Markets Act (DMA)—and the president recently threatened to investigate the EU’s nearly €3 billion fine imposed on Google as an unfair trade barrier under Section 301 of the Trade Act of 1974. Despite this, when it comes to ex post digital antitrust cases, US federal and state competition enforcers and the European Commission have similar priorities. More broadly, competition authorities on both sides of the Atlantic are grappling with how to adopt consistent, principled, and predictable approaches in digital markets. This can better take innovation, investment, and firms’ capabilities into consideration during competitive analysis, and a consistent approach is key for global corporations.

US-EU dialogue could help improve the efficiency and effectiveness of interventions to promote digital competition. It could do the following.

  • Facilitate mutually consistent approaches to common regulatory challenges, reducing burdens on regulators and making it easier for global firms to adopt the same business models across both sides of the Atlantic.
  • Even where consistency is not possible, help regulators by sharing knowledge and best practices, or even help authorities to divide and conquer in areas such as ex post antitrust cases in which authorities on both sides of the Atlantic are pursuing similar goals.
  • Mitigate the risks of foreign policy disputes as digital competition interventions increasingly have cross-border impacts, and as the Trump administration bristles at foreign governments enforcing competition law and pro-competitive regulation against US champions.

But how can this mutually beneficial cooperation be maintained? In 2021, the EU and United States established a Joint Technology Competition Policy Dialogue, supplementing established agreements between the European and US competition agencies, and there is still dialogue between antitrust enforcers. However, given the growing perception of a difference in values between the EU and the United States, and tensions on a range of topics from trade to defense, prospects for cooperation risk becoming narrower in the future.

Cooperation on digital antitrust

European and US authorities have a significant degree of alignment on ex post antitrust enforcement in the digital sector. In digital markets, large firms have often argued that highly innovative digital markets had natural “winner take all” characteristics, but there is nevertheless competition for the market. These firms argue they are subjected to significant competitive pressure from those who might displace them with disruptive innovation and, therefore, have strong incentives to keep innovating. This implies a marginal role for competition agencies. In practice, however, many digital markets have seen little displacement of incumbents in recent years. Effective antitrust remedies not only enforce competition law but also create space for innovation, enabling new entrants and disruptive technologies to challenge incumbents and thrive. While, until recently, innovation in some markets appeared to have slowed, there is an open question about how much artificial intelligence (AI) could disrupt the architecture of digital ecosystems—and whether that implies antitrust authorities should step back or play a role in keeping this possibility open.

In the meantime, competition authorities in the EU and United States have become more assertive. On the US side, the FTC and DOJ are pursuing cases against tech firms brought under previous administrations, despite the Republican Party’s traditional light-touch approach to antitrust. The FTC and DOJ’s approach is fueled by a view that conservative antitrust must not allow “private tyranny,” just as it is opposed to government tyranny.1 In particular, FTC Chairman Andrew Ferguson has applauded that “this administration . . . is rediscovering the wisdom of taking competition enforcement seriously.”2

In Europe, although there have been few new antitrust cases under the new European Commission, a number of ongoing cases are being pursued against the same firms, on similar timeframes and in relation to similar conduct. These cases have been supplemented by enforcement action under the DMA. Some of these cases might have different underlying motivations—with US authorities more concerned with the potential role of large technology firms in stifling plurality of voices online, and the EU more concerned with ensuring market contestability. But they nevertheless illustrate authorities’ common challenges, particularly how to design remedies for highly complex and fast-moving digital markets.

EU and US competition policies increasingly interact. For example, in a case brought by the US DOJ and some states against Google regarding its conduct in the search market, the DOJ sought an extensive list of potential remedies, including data-sharing rules that looked similar to obligations in the EU’s DMA. In September 2025, the district court decided to apply a narrower data-sharing remedy. A similar question about alignment of remedies will arise in the EU and US cases concerning Google’s digital advertising technologies.

However, challenges remain in coordinating antitrust actions on both sides of the Atlantic.

A first challenge is ensuring that the tenets of antitrust analysis remain synchronized. Protecting disruptive innovation in digital markets, for example, might require identifying robust theories of harm closer to market realities and moving away from reliance on static market definitions. However, the US legal system—in which the FTC and DOJ must convince a judge of their case—makes EU-US alignment difficult. Even if EU and US competition authorities agree on a common approach to a particular case, judges might take a different approach. In particular, competition cases in the United States go before generalist US judges, some of whom might be relatively conservative about government intervention. For example, European competition agencies are exploring how large firms can stymie disruptors by preventing their access to inputs to innovate or impacting their access to customers. They have used these concerns to rework the essential facilities doctrine and the tests for when discrimination is anticompetitive (with EU courts often sympathetic to their approaches, as in the Google Shopping and Android Auto cases).3 However, there is limited evidence that US courts are as willing to see principles evolve.

A second challenge is remedy design. Ex post antitrust remedies can have global impacts—for example, by raising costs of operating different business models in different countries, or by requiring structural changes to large firms or technical changes that cannot be implemented at a regional level. Conversely, for firms that can benefit from remedies, a consistent approach to remedy design in the EU and United States could lower costs and allow innovative firms to scale faster. Securing consistent approaches to remedies between the EU, the United States, and third countries such as the United Kingdom could therefore have widespread benefits. There is acceptance that past remedies in tech antitrust cases have sometimes not been very effective, and that innovation seems to have played more of a role than antitrust remedies in promoting competition in digital markets. Both sides seem to be learning from these past experiences, but they have adopted different lessons. The EU has sought to front-end tougher remedies in the DMA while, in the US Google Search case, the judge adopted a narrower set of remedies and instead put more faith in possibilities for AI to disrupt online search markets. Both European and US authorities can benefit from robust and transparent evaluations of past remedies, learning from successes and failures to design more effective interventions in the future.

Thirdly, the EU and United States also take different approaches to the merits of ex ante digital competition regulation. Europe’s DMA has few influential friends among the current US administration. Trump has implied he sees the law as an attack on “the growth or intended operation of United States companies,” and FTC Chair Andrew Ferguson has described the DMA as a “tax on American companies” and one which is “overly rigid,” despite most of the beneficiaries of the DMA being US firms.4 The EU’s objectives with the DMA were to foster a competitive and fair digital market, creating opportunities for challenger firms from both Europe and the United States, and supporting the West’s global technological leadership. From a European perspective, there is no appetite to rescind or water down the DMA; Commissioner Teresa Ribera has signaled the European Commission would take a “brave” approach to enforcement and has fined Apple and Meta for noncompliance.5 However, there is a widespread perception that the commission is tailoring its enforcement approach to reflect the current environment. For example, the Apple and Meta fines came only after the commission missed its own self-imposed deadlines, seemingly to avoid torpedoing EU-US trade talks.6

There is also a question of how European and US regulatory authorities can best cooperate and coordinate in practice, given the different timeframes and processes of their respective cases and concerns in the United States about Europe taking the lead on antitrust matters. Ferguson, for example, has argued, “If we think that Americans are suffering from anticompetitive conduct at home, we should address it here at home . . . I don’t want the Europeans doing it for us.”7 The EU and United States have a positive comity agreement, which allows one party affected by anticompetitive behavior originating in the other party to request that said party address the conduct. But this agreement has never been used in practice. Under the Trump presidency, the European Commission has shown a desire to allow the United States to take the lead. For example, in the Google AdTech case, the European Commission has found that Google breached competition law. However, the US federal court also considered remedies in its case regarding the same conduct. The commission has therefore delayed a final decision on remedies, stating that it wanted to “ensure that Google puts in place an effective remedy on both sides of the Atlantic . . . It is in everyone’s interest to achieve a joint outcome, including for Google itself, and for citizens worldwide.”8 While in principle such an approach might lead to harmonization, and would provide the EU with political cover, it poses the risk of delaying the imposition of remedies or encouraging the EU to accept remedies that might prove ineffective in the European context.

The broader political backdrop remains challenging. Trump has challenged the independence of numerous public authorities, including the FTC—and there is a risk of the president seeking to change the direction of US digital antitrust policy in the future. On the European side, while the EU secured a trade deal with the United States without needing to change its digital antitrust or digital regulation, the European Commission’s enforcement of the DMA and competition law—both procedurally and substantively—already appears to have been influenced by fears of triggering retaliation by the United States. It is difficult to see how the EU can adopt a rigorous and independent approach while remaining dependent on the United States for its security.

These challenges suggest several lessons for competition enforcers.

  • The European Commission and national competition authorities should continue cooperating with the US federal agencies and strengthen their cooperation with US state attorneys general, given their important role in US digital antitrust cases.
  • To effectively learn from each other’s experience with remedies, and to enhance mutual learning and correct remedies when needed, competition agencies in both the EU and the United States should have a robust evidence-based assessment of how their remedies have performed.
  • The European Commission needs to improve its communication strategy when pursuing antitrust cases. Antitrust enforcement must be closely linked to consumer welfare, competitiveness, and economic growth. Enhancing its legitimacy can help ensure European competition enforcers withstand any political pressure.
  • Europe needs to better highlight how open and competitive markets foster innovation instead of protection of national champions. Tools to open competition are therefore important ways to support US and European global technological leadership.

Merger policy and innovation

The discussion on antitrust enforcement naturally leads to questions about how merger policy can also protect innovation and competition in digital markets. Both EU and US approaches to competition policy are evolving to better tackle the role of innovation in digital markets. In particular, there is growing unease that competition authorities need to improve how they approach the impacts of a merger on innovation.

Reflecting these concerns, the United States updated its merger guidelines in 2023 after a two-year process. Merger guidelines are traditionally intended to describe the FTC and DOJ practices to the public, businesses, and courts—such as setting out important questions to which the agencies seek answers during the review process, including what type of evidence they are looking for and how that evidence is typically analyzed. However, the updated guidelines have been perceived by some as a more political document and a statement of the agencies’ intent to toughen merger policy, with more mergers likely to be presumed anticompetitive and the introduction of novel theories of harm. These guidelines remain in place for now, despite changes of leadership at the DOJ and FTC.9

The European Commission is still in the process of updating its merger guidelines, a process that it aims to finalize in 2027. Recently, both Mario Draghi and Commission President Ursula von den Leyen have pushed for the process to speed up. Much of the debate has centered on the importance of scale. Draghi’s report on European competitiveness—often interpreted as reigniting discussion about the merits of allowing EU firms to merge to create more innovative “European champions”—also proposed an innovation defense to allow mergers that would otherwise be prohibited. While some consider the report to be misunderstood, Draghi’s subsequent speeches have contributed to the perception that he is arguing for a loosening of merger policy. However, the extent to which new guidelines will (or can) represent a significant evolution in approach is unclear.

  • First, in Europe, different stakeholders have vastly different objectives when they argue that innovation (and other factors such as resilience) should play a bigger role in merger review. For enforcers, taking innovation into account might imply being able to intervene in more mergers; it is difficult to argue that EU merger policy has been too lax given that only a tiny proportion of mergers have ever been prohibited. For other stakeholders, the objective of giving innovation a stronger role in merger policy is to allow more deals. It is unclear how the guidelines can promote European champions while preventing foreign competitors from engaging in similar large-scale mergers.
  • Second, the recommendations in Draghi’s report are modest. His report has been understood to propose relaxing EU competition law constraints on mergers of major industrial companies. In fact, he acknowledges that a dominant firm would still be precluded from making use of the innovation defense, which would make it inapplicable in almost all cases in which a merger is blocked today. It would also be accompanied by strict safeguards and investment commitments by the merging parties. If Draghi’s proposal is adopted, there might not be much difference from today’s efficiency defense, which has never changed the outcome of a merger review process in Europe (though that might be, in part, because so few mergers are challenged in the first place or because the efficiency defenses have not been clearly articulated or sufficiently convincing). Therefore, there is a significant gap between some of the political rhetoric surrounding the review and the technical reality.
  • Third, the EU’s existing merger guidelines have already been superseded by changes in the commission’s practices, so the urgency of a new set of guidelines can be overstated. In reality, the guidelines should not be a statement of intent but, rather, a description of current practices and approaches. This means they might not fundamentally change case-specific analysis.
  • Fourth, it is difficult to see how changes in merger review alone will significantly alter the EU’s innovation trajectory. In the absence of further development of the single market, and greater availability of venture capital, highly innovative European firms will remain more likely to move to the United States or be acquired by foreign companies rather than remain European.

This might mean that—despite the call for a fundamental change in approach in Europe—the EU and the United States will stay relatively aligned.

One area in which divergence remains a risk is adopting predictable approaches to assessing the impact of a merger on capabilities and incentives to innovate, particularly in relation to disruptive innovation. Competition authorities have pursued theories of harm based on how a merger might impact innovation, even in the absence of immediate impacts on price or quality in particular markets. For example, innovation and innovative capabilities (or access to assets considered essential for innovations) featured heavily in cases such as Dow-DuPont, Amazon-iRobot, Facebook-Giphy (in the UK), and Google-FitBit. However, these cases have often (but not exclusively) focused on sustaining innovation rather than disruptive innovation. Where competition authorities have taken disruptive innovation into account (such as the UK authority in Facebook-Giphy) or examined markets for research and development (as the US and EU authorities did in the Illumina/Grail merger) they were highly criticized for making the results of merger reviews unpredictable.

Authorities will need to make decisions when the evolution of markets is not fully certain. An insistence on only acting when the anticompetitive outcome is undeniable will, on the whole, lead to less competition. On one hand, this suggests authorities should be humble. Sources of disruptive innovation are hard to identify beforehand, which suggests some firms might have more vulnerable positions than static markers of market power might imply. On the other hand, if authorities take the need to protect possibilities for disruptive innovation seriously, this might help illuminate previously under-identified types of anticompetitive effects, such as mergers that stymie potentially disruptive firms even if they appear to be in an unconnected market. This might require defining markets for innovation or focusing more on firms’ capabilities, their management practices, and their strategies in merger review.10 While the outcomes might not always be predictable, EU and US authorities could work together to try to ensure more transatlantic consistency when identifying the impact of a merger on innovation and incentives to innovate. This could increase certainty about the process and framework that competition authorities will adopt.

A second area of potential conflict is whether competition authorities should seek to promote certain types of innovation over others. In line with the Trump administration’s broader deregulatory approach, US competition authorities appear to be taking an agnostic and free-market approach to this question. In contrast, European authorities have emphasized how merger control can contribute to innovation in the area of sustainability and protect incentives for green innovation.11 This includes reflecting customer and government preferences for sustainable products when defining markets. For example, when the European Commission prohibited the Hyundai-Daewoo merger in 2022, it took into account the parties’ incentives to invest in lower-emission liquefied natural gas (LNG) vessels.

A third area of divergence risk relates to politicization of the merger process in both the EU and United States. More than ever, there is a perceived risk of US merger policy and practice being influenced by industry lobbying and top-down political influence. The lack of an institutionally independent competition regulator at the EU means this also remains a risk in Europe. Industry capture could happen at the level of guidelines—where there is a risk of helping today’s largest European companies rather than promoting the growth of disruptive and innovative firms—or on a case-by-case basis. There have been previous merger cases in which the formal technical analysis did not align well with the final decision reached. In this respect, updating the EU’s merger guidelines—by reducing the European Commission’s room for maneuver in response to political pressure—could provide significant cover for taking difficult decisions.

Lessons for merger review authorities include the following.

  • EU and US authorities should develop consistent guidelines setting out how they will assess the impacts of a merger on innovation capabilities (such as chips and computing power, skills, data, and risky and patient capital) and incentives to innovate. A pro-innovation merger control should promote the new innovators and not protect the old ones.
  • DG-Comp should aim to identify and adopt positive aspects of the revised US merger guidelines and US authorities’ recent practices to inform the EU’s current exercise of revising its own guidelines. For example, adopting the US approach by combining horizontal guidelines (which signal how a competition authority examines mergers between direct competitors) and vertical guidelines (which signal the approach to mergers between players at different points in the supply chain) would prove useful to ensure the European Commission thinks holistically about the impact of mergers on innovation, including in digital ecosystems in which horizontal and vertical concerns can be closely related. On the other hand, the EU guidelines still need to follow and reflect DG-COMP’s practices and should avoid becoming politically charged or signaling major changes to the EU approach.

As with antitrust remedies, competition authorities in both the EU and the United States must be honest and clear about how their merger remedies have performed, so different authorities can become better by learning from each other’s successes and mistakes. This will be especially important if there is increasing use of long-term investment commitments as a merger remedy (as in the UK with the Vodafone-O2 merger, and as recommended by Draghi). Such an approach can help ensure authorities across the Atlantic can work with each other. DG-COMP’s previous retrospective studies on remedies are an excellent starting point.

About the author

Zach Meyers is the director of research at the Centre on Regulation in Europe (CERRE). Previously the assistant director of the Centre on European Reform, Meyers has a recognized expertise in economic regulation and network industries such as telecoms, energy, payments, financial services and airports. In addition to advising in the private sector, with more than ten years’ experience as a competition and regulatory lawyer, he has consulted to governments, regulators, and multilateral institutions on competition reforms in regulated sectors.

This issue brief benefits from the insights of discussants at an online roundtable on EU-US regulatory co-operation hosted jointly by CERRE and the Atlantic Council. However, the contents of this brief are attributable only to the author.

About CERRE

Providing high-quality studies and dissemination activities, the Centre on Regulation in Europe (CERRE) is a not-for-profit think tank. It promotes robust and consistent regulation in Europe’s network, digital industry, and service sectors. CERRE’s members are regulatory authorities and companies operating in these sectors, as well as universities.

CERRE’s added value is based on

  • its original, multidisciplinary, and cross-sector approach covering a variety of markets (e.g., energy, mobility, sustainability, technology, media, and telecommunications);
  • the widely acknowledged academic credentials and policy experience of its research team and associated staff members;
  • its scientific independence and impartiality; and
  • the direct relevance and timeliness of its contributions to the policy and regulatory development process impacting network industry players and the markets for their goods and services.

CERRE’s activities include contributions to the development of norms, standards, and policy recommendations related to the regulation of service providers, to the specification of market rules, and to improvements in the management of infrastructure in a changing political, economic, technological, and social environment. CERRE’s work also aims to clarify the respective roles of market operators, governments, and regulatory authorities, as well as contribute to the enhancement of those organizations’ expertise in addressing regulatory issues of relevance to their activities.

About the Atlantic Council

The Atlantic Council promotes constructive leadership and engagement in international affairs based on the Atlantic community’s central role in meeting global challenges. The council provides an essential forum for navigating the dramatic economic and political changes defining the twenty-first century by informing and galvanizing its uniquely influential network of global leaders. The Atlantic Council—through the papers it publishes, the ideas it generates, the future leaders it develops, and the communities it builds—shapes policy choices and strategies to create a more free, secure, and prosperous world.

The Atlantic Council’s Europe Center conducts research and uses real-time analysis to inform the actions and strategies of key transatlantic decision-makers in the face of great-power competition and a geopolitical rewiring of Europe. The center convenes US and European leaders to promote dialogue and make the case for the US-EU partnership as a key asset for the United States and Europe alike. The center’s Transatlantic Digital Marketplace Initiative seeks to foster greater US-EU understanding and collaboration on digital policy matters and makes recommendations for building cooperation and ameliorating differences in this fast-growing area of the transatlantic economy.

Related content

Explore the program

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    “Assistant Attorney General Gail Slater Delivers First Antitrust Address at University of Notre Dame Law School,” US Department of Justice, April 28, 2025, https://www.justice.gov/opa/speech/assistant-attorney-general-gail-slater-delivers-first-antitrust-address-university-notre.
2    Andrew N Ferguson, “Competition in the 21st Century: Heeding the Rallying Cry for Deregulation,” US Federal Trade Commission, May 7, 2025, https://www.ftc.gov/system/files/ftc_gov/pdf/chairman-ferguson-2025-icn-remarks.pdf.
3    “Judgment of the Court (Grand Chamber ) of 25 February 2025: Alphabet Inc. and Others v Autorità Garante della Concorrenza e del Mercato,” European Union, February 25, 2025, https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:62023CJ0233.
4    “Defending American Companies and Innovators From Overseas Extortion and Unfair Fines and Penalties,” White House, February 21, 2025, https://www.whitehouse.gov/presidential-actions/2025/02/defending-american-companies-and-innovators-from-overseas-extortion-and-unfair-fines-and-penalties/.
5    Francesca Micheletti, “Trump’s Antitrust Agency Chief Blasts EU Digital Rules as ‘Taxes on American Firms,’” Politico, April 2, 2025, https://www.politico.eu/article/trumps-antitrust-agency-chief-blasts-eu-digital-rules-as-taxes-on-american-firms/.
6    Francesca Micheletti and Jacob Parry, “Big Tech Fines Just Got Political, Whether the Commission Likes It or Not,” Politico, April 14, 2025, https://www.politico.eu/article/big-tech-fines-digital-markets-act-political-european-commission-meta-apple-donald-trump-tariffs/.
7    Micheletti, “Trump’s Antitrust Agency Chief Blasts EU Digital Rules as ‘Taxes on American Firms.’”
8    “Statement by Executive Vice-President Ribera on the Adoption of the Google Adtech Decision,” European Commission, September 4, 2025, https://ec.europa.eu/commission/presscorner/detail/en/statement_25_2034.
9    “Chairman Ferguson Memo re Merger Guidelines,” US Federal Trade Commission, February 18, 2025, https://www.ftc.gov/legal-library/browse/cases-proceedings/public-statements/chairman-ferguson-memo-re-merger-guidelines.
10    Giulio Federico, Fiona Scott Morton, and Carl Shapiro, “Antitrust and Innovation: Welcoming and Protecting Disruption,” Innovation Policy and the Economy (2019), https://www.journals.uchicago.edu/doi/full/10.1086/705642?af=R; David J. Teece, Dynamic Capabilities and Strategic Management: Organizing for Innovation and Growth (Oxford, UK: Oxford University Press, 2009).
11    Catherine Ellwanger, et al., “EU Green Mergers & Acquisitions Deals—How Merger Control Contributes to a Sustainable Future,” Competition Merger Brief, September 2023, https://competition-policy.ec.europa.eu/system/files/2023-09/kdal23002enn_mergers_brief_2023_2.pdf.

The post Improving transatlantic cooperation on digital competition appeared first on Atlantic Council.

]]>
A stronger, safer, and more prosperous hemisphere: The case for investing in democracy in the Americas https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/a-stronger-safer-and-more-prosperous-hemisphere-the-case-for-investing-in-democracy-in-the-americas/ Thu, 04 Dec 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=891352 This issue brief is the fourth in the Freedom and Prosperity Center's "Future of democracy assistance" series, which analyzes the many complex challenges to democracy around the world—and highlights actionable policies that promote democratic governance.

The post A stronger, safer, and more prosperous hemisphere: The case for investing in democracy in the Americas appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Democratic backsliding, transnational organized crime, and authoritarian influence are driving insecurity and migration across Latin America and the Caribbean.
  • At the same time, weak rule of law and entrenched kleptocratic networks are stifling economic growth and enabling criminal organizations.
  • To push back, the US must shift to a broader investment-driven foreign policy that mobilizes public-private partnerships and supports democratic actors.

This issue brief is part of the Freedom and Prosperity Center’s “The future of democracy assistance” series, which analyzes the many complex challenges to democracy around the world and highlights actionable policies that promote democratic governance.

Introduction

After decades of democratic and economic progress, Latin America and the Caribbean (LAC) is now losing ground. Between 1995 and 2016, the Atlantic Council’s Freedom and Prosperity Indexes recorded steady gains—a more than eight-point rise in prosperity and a more than three-point rise in freedom—that lifted millions out of poverty, deepened the region’s integration into the global economy, and strengthened democratic institutions. Over the past decade, however, this momentum has stalled, and in many countries reversed. Across the region, insecurity has surged, authoritarianism has deepened, and corruption has stifled development, with consequences that reach far beyond its borders.

This reversal is fueling two interconnected crises reshaping the Western Hemisphere: migration and insecurity. Over the past decade, migration—both within the region and toward the United States—has surged. Authoritarian rule in Venezuela, Cuba, and Nicaragua, along with the collapse of Haiti, has driven mass exoduses, while gang violence spurs migration from Central America and hundreds of thousands more have left other countries in search of safety and economic opportunity. Transit states such as Colombia, the Dominican Republic, and Panama face mounting strain on public services, while the United States confronts unprecedented pressure at its southern border.

Regional security is also deteriorating as gangs and transnational criminal networks expand their operations. Mexican cartels dominate the production and trafficking of fentanyl, methamphetamine, cocaine, and other illicit drugs across Latin America and into the United States. The effects of their trade have been devastating, with tens of thousands of overdose deaths annually, particularly in the United States and Canada. Other groups, such as Venezuela’s Tren de Aragua, extend beyond narcotics, driving homicides, corruption, and violent competition over trafficking routes across the region.

Beneath these crises lies a deeper erosion of governance and democracy—one that the United States should support its allies in confronting. Weak rule of law and systemic corruption stifle economic growth and enable criminal networks to thrive. Authoritarian regimes in the region fuel migration, crime, and cross-border instability, while external powers—most notably China—exploit governance gaps through opaque infrastructure projects and debt diplomacy, deepening authoritarian influence. Together, these forces erode state capacity, destabilize the region, and pose a direct challenge to US security and economic prosperity.

Stable, transparent governance in LAC reduces migration pressures, disrupts criminal networks, and creates economic opportunities that benefit both US and Latin American citizens. As the United States reassesses its foreign assistance strategy, democracy assistance can be enacted as a strategic investment to make the hemisphere—including the United States—stronger, safer, and more prosperous. We identify three core issues that pose the greatest challenges but promise the greatest rewards if addressed, and provide recommendations to streamline assistance, expand its scope, and engage business and local actors as funders and partners.

Ultimately, democracy assistance in the region remains one of the most cost-effective investments to advance shared security and prosperity.

Regional challenges to democracy and governance

LAC is confronting a convergence of three interlinked challenges that erode governance, destabilize societies, and undermine US security and economic interests. Each reinforces the others and fuels the migration and crime that strain the region. The United States should therefore prioritize addressing these challenges through targeted foreign assistance and investment.

Transnational organized crime and insecurity

Transnational organized crime (TOC) has evolved into one of the most destabilizing forces in LAC. Once localized, criminal groups have grown into sophisticated, multinational networks that traffic drugs, weapons, and people across borders while infiltrating political systems. These networks now operate across nearly every corner of the region, both benefiting from and contributing to weak rule of law and institutional resilience.

Gangs and TOC actors are among the main drivers of insecurity in the region. Although the region comprises less than 10 percent of the world’s population, it accounts for roughly one-third of global homicides. Central America maintains high levels of insecurity, while countries such as Mexico, Ecuador, Colombia, and Peru have experienced sharp increases in violent crime as cartels and gangs battle for control of trafficking routes, urban neighborhoods, and illicit economies. The costs are profound: Latin American Public Opinion Project data show that intentions to emigrate are significantly higher among individuals exposed to crime, while nearly one-third of private sector firms in Latin America cite crime as a major obstacle to doing business, with direct losses averaging 7 percent of sales. Insecurity is not only displacing communities but also undermining prosperity and eroding trust in governments.

The drug trade remains one of the most profitable and damaging arms of TOC. Mexican cartels—particularly the Sinaloa Cartel and Jalisco New Generation Cartel—are the hemisphere’s principal suppliers of fentanyl, methamphetamine, cocaine, and heroin. Their operations extend beyond Mexico and the United States, reaching deep into Colombia, Ecuador, Central America, and increasingly Canada. In 2024, US Customs and Border Protection seized over 27,000 pounds of fentanyl at the southern border—up from 14,700 pounds in 2022. The human toll is staggering: Fentanyl overdoses now kill more than seventy thousand people annually in the United States.

TOC represents not only a law enforcement problem but also a profound institutional and governance challenge. These groups thrive in contexts marked by weak institutions, porous borders, and entrenched impunity. Venezuela’s institutional collapse, for example, directly enabled the rapid growth of the Tren de Aragua gang from one prison to over ten countries. Once established, criminal networks act as corrosive forces—penetrating police forces, judicial systems, militaries, local governments, and even segments of the private sector. Their influence extends into the electoral arena as well: In Mexico’s recent elections, criminal actors not only financed campaigns for local candidates but also threatened and assassinated others, further distorting political competition and undermining democratic accountability. Left unchecked, TOC erodes public trust, distorts markets, and makes effective governance nearly impossible, fueling a self-reinforcing cycle of violence, displacement, and state fragility.

Case study: Ecuador’s fight against insecurity

The once relatively stable country of Ecuador has become a battleground among Mexican drug trafficking organizations (DTOs) in recent years, with authorities estimating that 70 percent of the world’s cocaine passes through its ports. As Ecuador has emerged as a vital transit country, Mexican DTOs have partnered with local crime syndicates to deepen their control in the country, buying the influence of politicians, judges, and security officials. The main actors vying for control of drug shipment routes include the Sinaloa Cartel, its rival the Jalisco New Generation Cartel, and their affiliated local crime syndicates. These structures tax and protect cocaine flows moving from border regions toward export terminals, targeting trucking firms, port and warehouse staff, and local authorities.

Ecuador’s security crisis, however, is not simply a matter of state versus gangs, but of deep institutional infiltration. The landmark Metástasis investigation (2023-25) exposed how judges, prosecutors, police officers, politicians, a former head of the prison authority, and other high-ranking officials systematically protected or advanced the interests of organized crime for years. In exchange for cash, gold, luxury cars, and other benefits, officials allegedly released gang leaders, altered prison conditions, and sabotaged investigations.

Despite these challenges, Ecuador’s government—reelected in 2025 with a mandate to confront organized crime—has pledged to continue the fight. Yet its experience highlights a critical lesson: Defeating gangs and cartels cannot be achieved solely through crackdowns or arrests; it also requires rebuilding institutions.

In many countries, governments have proven unable or unwilling to meaningfully confront TOC. Others have stepped up efforts to target these groups through mano dura policies or intensified security operations that, while capable of disrupting trafficking routes, cannot by themselves dismantle transnational criminal networks. Addressing the governance gaps that allow these organizations to thrive is therefore crucial. In this context, US leadership remains essential. Given the cross-border nature of these networks, lasting, viable solutions demand a coordinated regional response. By leveraging its diplomatic influence, security partnerships, military capabilities, and development tools—including technical assistance, institutional support, and investment incentives—the United States can help foster cross-border cooperation, strengthen judicial and prosecutorial capacity, and reinforce institutions to shield them from criminal infiltration. Paired with diplomatic and intelligence support, democracy assistance can play a critical role in disrupting organized crime, safeguarding US security interests, and creating the conditions for more prosperous and resilient communities across the hemisphere.

Rule of law and economic development

Declining rule of law has become an increasingly urgent concern in LAC, as regional indicators have steadily worsened in recent years and several countries have registered some of the steepest declines worldwide. This deterioration both enables transnational organized crime and authoritarianism and imposes enormous costs on national economies. Research by the Atlantic Council’s Freedom and Prosperity Center shows that the rule of law is the single most influential factor for long-term economic growth and societal well-being. Liberalizing markets is not enough: Legal clarity, judicial independence, and accountability are the foundations of effective governance and thriving economies. This is particularly relevant in Latin America, where corruption remains the region’s Achilles’ heel—undermining public spending, fueling fiscal deficits, and weakening financial oversight. Across the region, higher corruption levels are consistently associated with lower gross domestic product per capita and reduced foreign direct investment, costing countries and investors billions in lost growth and opportunity

A particularly distorting force in the region’s economy is the prevalence of kleptocratic networks. These are not isolated acts of graft, but coordinated, systematic efforts to capture state resources and extract rents for political and economic gain. Such networks often comprise coalitions of corrupt political elites, complicit business actors, and criminal organizations. They co-opt the judiciary and prosecutors, while silencing investigations and oversight bodies. Their actions stifle competition, discourage entrepreneurship, and produce unfair monopolies that sideline foreign investors, while draining public coffers of resources needed for development.

The scale of these operations can be staggering. In Venezuela, over the past two decades, ruling party figures and business allies have been suspected of siphoning off as much as $30 billion in public funds through transnational schemes involving front companies, illicit contracts, and offshore accounts. This systemic kleptocracy has not only enriched elites but also accelerated Venezuela’s economic collapse, fueling one of the worst migration crises in the region, including to the United States. In Peru, the Club de la Construcción scandal revealed how an informal cartel of major construction companies colluded to divide up public works contracts in exchange for bribes to officials in the Ministry of Transport and Communications. The scheme operated for more than a decade, was worth billions in inflated contracts, and sidelined honest competitors while draining infrastructure budgets.

Case study: The Dominican Republic’s success story

The Dominican Republic illustrates how strengthening the rule of law can improve governance and unlock economic opportunity. Since President Luis Abinader took office in 2020, the government has carried out anti-corruption reforms. The administration appointed an independent attorney general and empowered the public ministry to investigate and prosecute high-level corruption cases. The government has also advanced transparency and digitalization reforms to make interactions with public agencies—especially in procurement—more open, efficient, and resistant to abuse. In addition, the country has aligned with key recommendations from the Financial Action Task Force, including by passing a revamped Anti-money Laundering and Illicit Finance Law, which has constrained kleptocratic networks and organized crime.

These measures have begun to restore trust in public institutions. Procurement processes are now more transparent and competitive––with twenty thousand new suppliers registered—while new safeguards better protect against corruption. Since 2020, the Dominican Republic’s score on Transparency International’s Corruption Perceptions Index has improved by eight points. Investor confidence has followed: Foreign direct investment reached record highs in 2024, while trade with the United States expanded sharply. US goods exports to the Dominican Republic grew to $13 billion that year, producing a $5.5 billion trade surplus for the United States.

Some of the region’s largest corruption scandals have been uncovered by investigative journalists and independent prosecutors. Yet in many cases, impunity prevails, and little progress is made toward prevention or sustained accountability. Strong judicial institutions, effective anti-corruption reforms, and governance are essential for stability and growth. Predictable, rules-based environments make countries far better partners for both domestic and US businesses—creating jobs, expanding markets, and strengthening local economies. Such efforts can also reduce migration pressures, as corruption has been shown to drive both legal and irregular migration. As with TOC, for the United States, supporting rule-of-law reforms is therefore a strategic investment in building a more prosperous, democratic, and secure hemisphere.

Countering authoritarian influence

LAC is home to several resilient democracies that remain close US allies and important trading partners. Yet the region also contains some of the world’s most entrenched dictatorships—Cuba, Venezuela, and Nicaragua—which pose direct threats to stability. Between these extremes lie eight nations that Freedom House classifies as “partly free,” many of which experienced additional democratic declines in 2025. Countering democratic backsliding and protecting the global order is not a values-based mission; it is essential to safeguarding US security, economic interests, and the long-term prosperity of the Western Hemisphere.

The region’s authoritarian regimes illustrate the stakes. Economic collapse and repression have forced 7.7 million Venezuelans, 500,000 Cubans, and tens of thousands of Nicaraguans to flee over the past decade. These governments also generate acute security risks. Nicaragua has positioned itself as a conduit for extra-regional migration, inviting travelers from Africa, Asia, and the Caribbean to enter visa free and transit toward the US border. The Daniel Ortega regime has further been linked to targeted harassment and even assassinations of dissidents abroad, including the 2025 killing in Costa Rica of Roberto Samcam Ruiz, a retired Army major and government critic.

Similarly, the consolidation of Venezuela’s dictatorship has transformed the country into a hub for criminal organizations, including Colombian paramilitary groups and Tren de Aragua. The Nicolás Maduro regime has hosted the Wagner Group while continuing to rely on Russian military advisors, Iranian oil technicians, and Chinese surveillance systems to tighten internal control and repress dissent. Members of the regime have been linked to drug trafficking––most notably through the illicit military network Cartel de los Soles––and, in late 2024, Maduro threatened to invade neighboring Guyana.

At the same time, external authoritarian powers—especially China—are expanding their footprints, particularly in “partly free” states where institutional checks are weak. China exploits governance gaps through surveillance technology, opaque infrastructure deals, and strategic investments in critical sectors—often at the expense of US influence and market access. Over the past decade, China invested $73 billion in Latin America’s raw materials sector, including refineries and processing plants for coal, lithium, copper, natural gas, oil, and uranium. In Peru, Chinese firms paid $3 billion to acquire two major electricity suppliers, giving them what experts describe as near-monopoly control over the country’s power distribution and edging out competitors. Beijing also provides critical technology to regional authoritarian governments and at-risk democracies. In Bolivia, the government deployed Huawei’s “Safe Cities” surveillance systems, raising concerns about mass data collection, particularly during elections.

Case study: The cost of partnering with authoritarian regimes

Under President Rafael Correa, Ecuador—alongside Bolivia’s Evo Morales and Venezuela’s Hugo Chávez—pursued closer ties with foreign authoritarian powers, betting heavily on Chinese financing and infrastructure. A centerpiece of this strategy was the $2.7 billion Coca Codo Sinclair hydroelectric project, awarded under opaque terms to Chinese firms, primarily Sinohydro, as part of an $11 billion package of oil-backed loans and infrastructure deals.

The project soon became a symbol of the risks of such arrangements. The dam has been plagued by structural flaws, including more than seventeen thousand cracks, severe environmental damage, and corruption allegations implicating senior officials. State agencies attempted to downplay or conceal the problems, but by 2024 the facility had ceased functioning altogether. Experts estimated that repairing the damage could cost tens of millions of dollars, erasing much of the project’s intended economic benefit. Beyond its technical failures, Coca Codo Sinclair left Ecuador financially vulnerable. In 2022, the government was forced into arbitration and subsequently renegotiated more than $4 billion in debt with Beijing, further compromising its fiscal position and weakening investor confidence. The episode illustrates how opaque partnerships with authoritarian powers can undermine democratic accountability and damage economic stability.

These developments underscore the importance of countering authoritarianism in LAC as both a security and economic priority for the United States and the region. Betting on democratic renewal in Cuba, Nicaragua, and Venezuela is critical to restoring stability in the hemisphere. At the same time, it is equally important to strengthen “at-risk” democracies to prevent further backsliding. Targeted investments in political party development, anti-corruption reforms, and transparency measures can bolster resilience in these states and reduce the appeal of authoritarian alternatives. Pushing back against China’s growing economic and geopolitical influence in the hemisphere is also essential. By leveraging diplomatic and trade tools, the United States can position itself as a credible alternative to China—particularly by mobilizing investment, fostering public-private partnerships, and advancing governance reforms that strengthen transparency and accountability. Doing so is vital for freedom and security in the region and creates opportunities for business and investment.

Recommendations

Insecurity, weak rule of law, and authoritarianism represent growing threats to freedom and prosperity in the Western Hemisphere. As outlined above, TOC, entrenched corruption, and authoritarian regimes impose heavy economic costs on LAC and undermine democratic governance. At the same time, these forces drive mass migration, placing immense strain on transit and destination countries. Tackling these challenges is a strategic win-win: It can enhance US security and economic interests while advancing stability and prosperity in the region.

As the United States reassesses its foreign policy and democracy assistance strategy in LAC, it should make use of its full range of diplomatic, security, trade, and investment mechanisms—including targeted democracy assistance—to address these challenges.

Move beyond grants to expand the toolkit

The proposed shift toward an investment- and trade-driven foreign policy can go hand-in-hand with democracy assistance and reform. The United States can mobilize financial and diplomatic tools to expand investment as an alternative to Chinese influence, while incentivizing governance, transparency, and accountability reforms that strengthen the region’s resilience against the challenges outlined above.

  • Leverage the US International Development Finance Corporation (DFC) to provide an alternative to Chinese financing and invest in projects that strengthen democratic resilience through economic modernization, digitalization, and high-quality infrastructure—particularly in areas vulnerable to authoritarian influence. As Congress prepares to revisit the DFC’s authorizing legislation, it should ensure the agency has long-term funding to deploy its range of tools—including debt financing, equity investments, and political risk insurance—across the region.
  • Work with Congress to pass the Americas Act to establish regional trade, investment, and people-to-people partnerships with like-minded nations, fostering long-term private sector development. Use this framework to advance transparency and institutional autonomy reforms—particularly through the proposed Americas Institute for Digital Governance and Transnational Criminal Investigative Units—to ensure partner countries strengthen anti-corruption prevention, detection, and prosecution.
  • Use regional forums—such as the Summit of the Americas—to advocate for governance, security, transparency, and accountability reforms to strengthen the resilience of democratic allies and counter authoritarian regimes. The United States should link political reform benchmarks to investment incentives, offering “carrots” for change through regional development commitments.

Ensure democracy assistance makes business sense

A safer and more democratic Western Hemisphere directly benefits economic development and business. The United States should position its domestic and the Latin American private sectors as active partners in strengthening democratic resilience, not just as passive beneficiaries of stability.

  • Revive and operationalize America Creceto incentivize and promote reform-linked investments, infrastructure projects, and job creation across the region to counter Chinese influence and advance US interests while bolstering political will through the DFC. Participation should be tied to clear benchmarks on transparency, labor rights, and legal predictability.
  • Forge public-private partnerships that co-finance civic education, anti-corruption initiatives, and local development projects, particularly in high-risk areas vulnerable to TOC recruitment and migration.
  • Mobilize Latin America’s business elites—among the greatest beneficiaries of economic and democratic collaboration with the United States—to push for and co-fund democracy and governance programs in their home countries. Leading companies, philanthropic foundations, and chambers of commerce should be engaged as active partners in advancing reforms.
  • Strengthen and engage with regional initiatives like the Alliance for Development in Democracy—championed by Costa Rica, Panama, the Dominican Republic, and Ecuador—that integrate the private sector into democratic reform and good governance agendas.

Deploy whole-of-government tools

While the State Department plays a central role in US democracy assistance, the scale and interconnected nature of the region’s challenges—spanning security, rule of law, and authoritarian influence—demand a coordinated, whole-of-government approach.

  • Leverage the Pentagon’s Defense Institution Building program to strengthen law enforcement reform, bolster rule-of-law resilience, and build institutional capacity to counter transnational crime and human trafficking.
  • Provide technical assistance and legal expertise through the Department of Justice, Drug Enforcement Administration, and Bureau of International Narcotics and Law Enforcement Affairs to help countries develop national frameworks that protect transparency, law enforcement, and sovereignty in investment decisions.
  • Double down on rule-of-law reforms and projects, particularly those targeting organized crime and corruption. Support vetted law enforcement units, independent anti-corruption actors, and judicial reform initiatives through US, private sector, and multilateral funding channels, including the Organization of American States, the Inter-American Development Bank, and the Open Government Partnership.
  • Protect the key pillars of democratic institutions from co-optation by TOC, kleptocratic, or authoritarian actors. This must include courts, election management bodies, political parties, and critical government agencies such as those overseeing infrastructure, development, procurement, and public prosecution. Emphasis should be placed on institutional independence, combating and preventing corruption, and ensuring sustainable financing to strengthen resilience.
  • Apply targeted sanctions, Global Magnitsky measures, and trade conditionality to dismantle kleptocratic networks, prosecute corrupt actors, and reward credible reformers.
  • Advocate for and support the implementation of global security and anti-corruption standards—including recommendations from the Financial Action Task Force and its LAC branch, GAFILAT (Grupo de Acción Financiera de Latinoamérica), on money laundering, organized crime, and illicit finance—to disrupt TOC and kleptocratic funding networks while fostering safer and more competitive business environments.

Scale the power of local networks

Regional local actors—both within and outside of government—are often the most credible and resilient defenders of democratic governance. The United States should deepen its engagement with these networks while identifying and empowering new partners.

  • Partner with trusted community institutions—including religious organizations, civic leaders, businesses, and grassroots groups—on programs that prevent gang recruitment, reduce crime, and promote integrity in high-risk areas.
  • Strengthen governance mechanisms to build sustainable local capacity to counter corruption and transnational organized crime.
  • Expand the partner ecosystem to include diaspora networks and local community groups, leveraging their resources, expertise, and transnational connections to reinforce democratic resilience.

Push back on regional and external authoritarian influence

Bipartisan US support for organized opposition in Cuba, Nicaragua, and Venezuela has been a cornerstone of regional democracy policy and should be sustained and expanded. At the same time, Washington should back democratic movements and reformers across the hemisphere where authoritarian influence is taking hold.

  • Sustain support for dissidents and democratic movements in Cuba, Nicaragua, and Venezuela to prepare the ground for eventual political transitions.
  • Invest in independent media.
  • Support the next generation of democratic leaders through fellowships, trainings, and political party development, prioritizing authoritarian and high-risk states.
  • Collaborate with electoral commissions, legislatures, and political parties with an emphasis on internal democracy, campaign transparency, and long-term institutionalization.
  • Assist governments in auditing and renegotiating opaque infrastructure or digital agreements—particularly those with authoritarian powers—that undermine sovereignty, transparency, and public accountability.

The recommendations offered here provide a roadmap to confront the region’s most pressing security and prosperity threats by pairing diplomacy, trade, and investment tools with targeted democracy support. By leveraging the United States’ entrepreneurial capacity and its ability to mobilize multinational and public-private partnerships, reforms can be made more attractive, sustainable, and impactful. This is not charity—it is a strategic investment that advances both US and LAC interests.

At relatively low cost, democracy assistance strengthens governance and open markets in ways that directly serve US security and economic priorities. It helps dismantle transnational criminal organizations, kleptocratic networks, and corruption, while countering the growing influence of authoritarian regimes inside and outside the region. These efforts reduce the flow of illicit drugs and irregular migration, create more reliable markets for businesses, and build stronger partnerships with governments that share democratic values. The outcome is clear: a stronger, safer, and more prosperous hemisphere.

about the authors

Antonio Garrastazu serves as the senior director for Latin America and the Caribbean at the International Republican Institute (IRI). Prior to this role, he led IRI’s Center for Global Impact and from 2011 to 2018 was resident country director for Central America, Haiti, and Mexico. Garrastazu has worked in academe, the private sector, and government, serving in the Florida Office of Tourism, Trade and Economic Development under Governor Jeb Bush. He holds a bachelor’s degree in political science from the University of Florida, and a master’s and PhD in international studies from the University of Miami. 

Henrique Arevalo Poincot is a visiting fellow with the Atlantic Council’s Freedom and Prosperity Center. A strategy and communications specialist with expertise spanning Europe and Latin America, Arevalo Poincot is pursuing his master’s degree in democracy and governance at Georgetown University.

Related content

The future of democracy assistance

This paper series provides an in-depth look at the many complex challenges to democracy around the world and highlights actionable policies that promote democratic governance.

Trackers and Data Visualizations

Jun 15, 2023

Freedom and Prosperity Indexes

The indexes rank 164 countries around the world according to their levels of freedom and prosperity. Use our site to explore twenty-eight years of data, compare countries and regions, and examine the sub-indexes and indicators that comprise our indexes.

explore the program

The Freedom and Prosperity Center aims to increase the prosperity of the poor and marginalized in developing countries and to explore the nature of the relationship between freedom and prosperity in both developing and developed nations.

The post A stronger, safer, and more prosperous hemisphere: The case for investing in democracy in the Americas appeared first on Atlantic Council.

]]>
Cloudbusting: Policy for evaluating trust in compute infrastructure https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/cloudbusting-policy-for-evaluating-trust-in-compute-infrastructure/ Wed, 03 Dec 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=890037 A global cloud built on technical assurances—not geography—is essential to securing critical infrastructure and the future of AI.

The post Cloudbusting: Policy for evaluating trust in compute infrastructure appeared first on Atlantic Council.

]]>

Table of contents

Executive summary

Placing trust in cloud computing is no longer optional. Cloud computing is essential to critical infrastructure, commercial, and government operations.1 Outages over the past few months emphasize the vitality of cloud services to modern economies and essential government services.2 As cloud adoption and transformation continue, policy attention should shift from the question of whether to simply trust cloud computing to the methods for establishing and verifying that trust.  

The stakes will only continue to increase as artificial intelligence systems, which have been identified by the US, China, and the European Union as essential national priorities, continue to utilize cloud infrastructure for development and deployment.3 Sophisticated and unsophisticated threat actors continue to target cloud computing systems, striking rapidly, globally, and opportunistically. 4 These cloud incidents can result in data theft, financial losses, and operational disruptions. Even accidents require rapid coordination and information sharing to ensure systems can get back up and running as quickly as possible.5

Ensuring trust in cloud computing systems between nations and cloud providers is an essential task for modern economies, national security, and ways of life. This report argues that cloud trust will require collaboration between providers, nation states, and customers, but should not start with location requirements and geographic restrictions on access to cloud computing. Instead, national cloud policies should prioritize criteria of trust that verifiably and meaningfully improve the security of customer cloud operations. 

Introduction

As a component of artificial intelligence deployment, development, and use, as well as an enabling technology for business, government, and critical infrastructure functions, cloud computing is a fixture of cyber policy discussions. Within the emerging AI supply chain, cloud services are the means of deploying ‘compute’, a critical resource powering models in both training and inference throughout the global economy.6 This paper aims to offer a nuanced discussion of cloud computing through the consolidation of a shared policy vocabulary and common technical principles to describe and understand trust in cloud computing. By adding detail to how cloud computing is portrayed, policymakers can more effectively understand the systems they’re expected to trust. By adding granularity to existing discussions of cloud computing, policymakers can more effectively understand the systems they are expected to trust and better appreciate how policy shapes both those systems and that trust.  

Attackers continuously scan public-facing devices and infrastructure for misconfigurations and weaknesses.7 Countries with advanced cyber capabilities, including Russia, China, North Korea, and Iran, show no signs of ceasing cyber threat activity.8 The pace of vulnerability exploitation continues to accelerate, and within days of their public disclosure, attackers weaponize vulnerabilities to gain access to and exploit cloud environments.9 Meanwhile, policy debates often focus on limiting access from cloud providers to customer information, instead of ensuring the security of such resources and information from adversary access. 

Developing a more compelling model and framework for trust in cloud computing requires bridging debates around localization, digital sovereignty, and technical security, as well as emerging trends in artificial intelligence development and deployment. The risks posed to the cloud ecosystem by the unintended consequences of policy intervention are significant, but so too are the consequences of untrusted and insecure cloud deployments. 

A shared cloud computing vocabulary 

This section will establish essential vocabulary and terms for cloud computing. The terms and characteristics defined here are non-exhaustive but are a useful starting point for cloud policy discussions. Cloud computing describes a model where service providers offer metered, on-demand access to computing resources.10 Instead of operating their own servers and facilities, customers specify workloads—sets of defined computing tasks, utilizing computing resources—for which cloud providers handle implementation and execution.11 Sometimes the resources used by these workloads are virtual versions of physical resources (“virtual machines” or VMs), but often they are abstract resources or functions, such as data storage or analysis services, and are not rooted in or wedded to specific hardware or software implementations. Cloud providers must manage and architect both individual hardware and software components and the protocols, pathways, and constraints of their communications and interactions. To ensure visibility and reliability, cloud providers must build systems that carefully manage changes, catch and alert on outages, and gracefully handle errors or failures. This model of access to computing resources includes general access to applications and data storage, but also specialized services for specific customers or sectors. 

Cloud providers aggregate and distribute workloads across computing resources. Centralized control over the design, development, testing, and maintenance of both hardware and software enables cloud providers to reduce costs while optimizing their services for the performance and reliability needs of customers.12 End-to-end control over cloud systems also allows costly experimentation with specially-tailored or developed software and hardware, including custom advanced semiconductors (chips, silicon).13 Prominent cloud providers, including Microsoft, Google, and Amazon, derive advantages from both the scale of their cloud infrastructure and their expertise in adjacent fields and product offerings (earning them the name hyperscalers”).14 For example, Google’s development of its distributed data storage and processing platform BigTable was driven by the computing demands of its search product.15 Embedded within the configurations and offerings available to customers are a cascading sequence of impactful decisions made by cloud service providers. Balancing incentives, imperatives, and resource constraints creates an ever-evolving system of systems that is more than the sum of its parts. 

Customers of cloud providers can adjust their use of computing resources elastically. Instead of purchasing physical hardware, launching software, and monitoring it directly for power outages or reliability issues, customers can outsource those responsibilities to cloud providers. This allows companies to focus on their unique products and services instead of monitoring and maintaining networking, energy, and processing equipment. Decomposing workloads into discrete tasks, scheduling tasks for individual hardware components, and monitoring the execution of those tasks for errors, delays, or hardware failures requires carefully optimized software, specific hardware, and dedicated research capabilities.16 Within nano- or milliseconds, cloud computing systems communicate and synchronize across oceans and continents, ensuring availability and reliability despite frequent outages, hardware failures, and natural disasters. Using metered, elastic cloud services also allows companies to “scale” their computing resource footprint in response to demand.17 Seasonal surges, such as a boom in visits to e-commerce sites around the holiday season, or daily and weekly patterns, such as workplace software peaking in use during business hours Monday-Friday, no longer require projections months ahead of time, and the build-up of infrastructure to handle maximum demand, which then sits idle outside of specific moments. Instead, enterprises can dynamically and automatically adjust their use of computing resources and services through their cloud providers.18 At the global scale of modern cloud systems, cloud providers triage and respond to issues that would be completely unfamiliar to self-hosted cloud operators accustomed to handling only hundreds or thousands of servers.  

Cloud customers and providers optimize the architecture of services to support different computational demands, using distinct technology configurations to execute workloads. Cloud computing architectures dictate “how various cloud technology components, such as hardware, virtual resources, software capabilities, and virtual network systems interact and connect to create cloud computing environments.”19 Workloads such as high-definition video streaming, training AI models, and analyzing and extracting information from data have different requirements for synchronicity, availability, reliability, and error tolerance, which demand different choices of software and hardware to balance tradeoffs. By optimizing cloud infrastructure and systems for different tasks, cloud providers can utilize heterogeneous components to their full relative advantages.  

As an example, to ensure rapid access to cloud resources, providers maintain and offer content delivery networks (CDNs)—networks of servers and computing resources distributed worldwide to minimize the distance and latency (time delay) between cloud infrastructure and end-users.20 Cloud providers also maintain points of presence, or edge locations, where their infrastructure connects with internet service providers, on-premise customers, or other cloud providers.21 These points of connection include Internet Exchange Points (IXPs) and other co-location services, a subset of which are sometimes referred to as peering locations.22 Network infrastructure, including edge servers, is a critical vantage point for information useful for security monitoring and incident response. Security practices involving network infrastructure range from mitigating attacks that attempt to overwhelm servers with large amounts of requests to limiting unauthorized access to data and cloud resources.23

Cloud computing and artificial intelligence 

Cloud computing is involved in AI development and deployment at every stage, from providing data storage and structures to enabling interactions between models and users, all while serving as a central hub of monitoring and evaluation for AI systems. Artificial intelligence companies have close financial and technical relationships with hyperscale cloud providers, and cloud providers themselves develop their own AI models and integrate them with other products. This section will give a brief overview of the importance of cloud computing to artificial intelligence development and deployment as a component of the broader compute infrastructure used in the development and deployment of AI systems. 

Emerging players, sometimes referred to as neo-clouds, also offer cloud computing services specific to artificial intelligence workloads. CoreWeave, Lambda, Crusoe, and Nebius all operate under this model.24 These companies are financially intertwined with both existing hyperscale cloud providers and key chipmaker NVIDIA. NVIDIA has invested in both Lambda and CoreWeave, in addition to its own quasi-cloud offering, which is built on the infrastructure of other cloud service providers.25 Oracle has contracted Crusoe to build out compute offerings for OpenAI as part of the Stargate project.26 Microsoft was responsible for 62 percent of CoreWeave’s 2024 revenue, while Google recently inked a deal to use CoreWeave to deliver computing resources to OpenAI.27 These interactions and overlaps all complicate the cloud ecosystem, creating new, interdependent players and novel connections among long-established entities. These new relationships could complicate existing patterns of information sharing and incident response practices, while emerging players have yet to establish long-term track records of security and reliability.  

Hyperscale cloud providers have also invested extensive resources in creating and expanding cloud offerings to support AI workloads and to provide access to AI models for their customers within cloud offerings. Examples include AWS’s managed container offerings, which Anthropic uses to execute training and inference workloads at “ultra” scale, as well as tailoring of existing services, plugins, monitoring agents, credentials, and caching features.28 AWS’s Bedrock offering provides access to several models, including Anthropic’s.29 Microsoft’s Azure managed cloud offerings monitor, orchestrate, and execute AI workloads, including inference for OpenAI’s models.30 Google Cloud’s Cloud TPU platform includes a compiler, managed software frameworks, and custom chips designed to accelerate AI workloads and is used both internally at Google and by companies like Cohere, Stability AI, and Character AI.31

Scarcity or lack of access to key computing resources specific to artificial intelligence could also drive customers to overlook security requirements, focusing instead on rapid access to essential computing power. The increasing compute demands of AI firms and the growth of niche cloud computing service companies, both intertwined with hyperscale cloud providers, will continue to strain existing compute resources such that cloud computing policy interventions run a growing risk of compromising a fragile ecosystem.  

Policymaking in this sector has largely focused on advanced semiconductors, particularly NVIDIA GPUs, as the principal component of AI compute, from the Biden administration’s AI diffusion rule to the Trump administration’s AI Action Plan.32  Proposals have also examined the challenges of securing model weights, managing the flow of advanced semiconductors used in AI training development, and acquiring energy and land needed to construct datacenters.33  

However, limited attention has focused on the risks and opportunities of cloud computing’s role in AI development and deployment, and as an essential component of the AI supply chain itself. Efforts to secure the cloud computing ecosystem can protect sensitive intellectual property involved in AI development in deployment, including model weights and proprietary details of both AI use and research methods and practices used to develop frontier AI models. Conversely, policies and security practices that hamper efforts to secure cloud computing infrastructure could jeopardize the security of AI development and deployment.  

Building trust

Trust, in this paper, refers to both the ability of cloud customers to ensure that their cloud configurations are secure from external threats and from excessive interference or access from cloud providers themselves. Quickly verifying trustworthiness after a violation is paramount for customers wanting to keep up with attackers. This section will discuss the challenge of establishing trust in cloud computing systems. Miscommunication and misalignment regarding trust have immediate consequences for cloud customers, who often bear the costs of security incidents. 

Threat intelligence from cloud security firms suggests that the pace of incidents is increasing, with a 2024 Google Cloud report finding only five days of average observed time between the disclosure and exploitation of vulnerabilities, down from 32 days in 2023.34 Another 2023 report from Orca Security found that it took only two minutes for AWS encryption keys that were publicly exposed on GitHub to be used by threat actors.35 Sophisticated attackers have targeted companies, such as Cloudflare, that specialize in cloud network infrastructure, stealing credentials to access documentation and source code.36 Advisories from cybersecurity companies and intelligence agencies indicate that organizations persistently experience breaches from sophisticated, nation-state-sponsored threat actors who utilize publicly known vulnerabilities as part of a global espionage strategy.37 Meanwhile, trust deficits that result from customers’ lack of trust in cloud providers, or an inability by cloud providers to verifiably demonstrate trustworthiness, hamper both the adoption of cloud capabilities and the ability of organizations to prevent and respond to security incidents. When trust criteria are insufficient or incomplete, preventable incidents can occur at breathtaking speed.  

In policy contexts, trust frequently centers on an entity-based definition. The National Institute of Standards and Technology (NIST) notes that trust is “a belief that an entity meets certain expectations and therefore, can be relied upon.”38 A focus on entities can lead to technology policies focused on static, easily verifiable attributes, such as the national origin or corporate headquarters of cloud providers, from which policymakers derive restrictions on specific firms or sweeping prohibitions against foreign entities. This dynamic is not exclusive to cloud computing policy and has occurred throughout national security debates over trusted technology, from Kaspersky to Huawei.39 While organizational attributes can provide useful information, requirements exclusively based on entity-based definitions of trust can overlook technical security measures and implementation details that directly affect system trustworthiness, while incentivizing the use of proxy companies and circuitous legal setups.  

Technical communities have developed alternative approaches to trust that emphasize continuous verification instead of static, binary decisions to trust or not trust a technology provider. The zero-trust security model operates on “the premise that trust is never granted implicitly but must be continually evaluated,” according to NIST.40 This model is a shift from a perimeter-based security strategy toward contextually securing and restricting access to dynamic computing resources and assets.41 As an illustrative example, a zero-trust approach would reflect a company’s decision to shift from a sign-in system to enter a building, after which each person would have complete access to move around a building, to an approach where each room or floor requires a special key that only certain people can access, regardless of whether or not the person requesting access is already within the building. However, zero-trust is more of a broad set of principles than a set of specific operational requirements and might not align with existing organizational structures and regulatory frameworks that mandate perimeter-based security approaches. 

Cryptographic and hardware-based verification mechanisms offer another path through technical, not organizational, assurances. Trusted Execution Environments (TEEs) and confidential computing could enable remote attestation of the integrity and confidentiality of data and code.42 Remote attestation and technical assurances can establish trust outside of organizational attributes but require specialized hardware and software implementations that are not currently widely available or cost-effective.43 

These divergent approaches to trust create challenges for cloud providers and customers. A coherent, cohesive approach to cloud trust must bridge different methods while accounting for the scale and complexity of cloud computing. This requires moving beyond simple analogies and one-size-fits-all policies towards frameworks that thoughtfully weigh technical and organizational attributes. The alternative is a fragmented system in which policies undermine the economic and technical benefits of cloud computing without improving security. The costs of insecurity will only grow as the cloud becomes more entwined with AI applications, making the question of ensuring trust in cloud computing increasingly critical. 

Digital sovereignty and data localization

This paper’s focus is on digital sovereignty policies that target cloud infrastructure, such as the promotion of national or local alternatives to cloud providers, the exclusion of foreign cloud providers from specific certifications or sectors, or restrictions on the structure and configuration of cloud deployments within national borders.44 This section will ground this paper’s discussion of trust and security in cloud computing and infrastructure within a contemporary policy debate: the application of digital sovereignty and data localization restrictions to cloud computing.45

In many cases, companies that qualify as hyperscalers also offer search engines, operating systems, social media sites, and ad platforms, which could also be relevant to digital sovereignty debates. Those offerings remain outside of the scope of this paper but could very well have implications for cloud computing if remedies or policies aimed at achieving digital sovereignty goals impacted hyperscale providers and their cloud offerings. 

There are at least three essential characteristics of digital sovereignty and data localization policies with direct implications for cloud computing: the affected country or region, the scope of customers affected, and the criteria for cloud trust. In addition to descriptions, each characteristic will include illustrative examples.  

Table 1: Key characteristics for digital sovereignty policies affecting cloud computing systems

Geography

The first essential characteristic is the geographic region affected by a policy. Typical examples of cloud sovereignty or digital sovereignty policies apply at a national level and are set by a federal policymaking body. 

For example, the French SecNumCloud certification scheme, which includes localization requirements and restrictions on foreign ownership of cloud providers, is in effect within France.46 Attempts to extend sovereignty policies in certification requirements across the EU within the European Union Cybersecurity Certification Scheme for Cloud Services have been unsuccessful so far, facing opposition from Denmark, Estonia, Greece, Ireland, Lithuania, Poland, Sweden, and the Netherlands.47 Outside the EU, digital sovereignty policies appear to remain national in scope, which aligns with the focus of supporters of some digital sovereignty policies in ensuring government control over and visibility into cloud services.  

Scope

Another essential characteristic is the scope of customers or procurers of cloud services affected by digital sovereignty policies. Direct government use of cloud services or use by critical infrastructure sectors like finance and defense have been a focus of digital sovereignty policies. These policies can take the form of explicit bans or prohibitions on critical sector or government use of foreign cloud providers, procurement incentives for local companies, or technical requirements that in effect mandate country or sector-specific cloud configurations. 

Several countries and geographies have experimented with sovereignty and localization requirements specific to critical infrastructure sectors or government use. The Cross Border Data Forum’s 2021 data localization report highlighted requirements for exclusive localization of financial sector information and operations, such as transactions and banking information, in several countries, including South Africa, Turkey, and India.48 The aforementioned French SecNumCloud scheme applies to government agencies and “operators of national importance.”49 South Korea’s Cloud Security Assurance Program (CSAP) applies to public sector cloud use, but debates over its provisions have suggested it could be extended to additional sectors such as healthcare and education.50 

The sensitivity of government and critical infrastructure sector data and operations raises heightened concerns regarding the risks of unauthorized access to information or disruption of services. The sheer size of the government and critical infrastructure sectors’ cloud budgets also creates an appealing policy target, as including requirements or incentives within procurement regimes serves as an intermediary between economy-wide regulations and no regulation at all. Government and critical infrastructure criteria for cloud computing are often thought to induce effects outside of their direct targets, as other companies and organizations incorporate or reference criteria used by those entities in their own cloud procurement decisions.51

Criteria for trust

The final essential characteristic of digital sovereignty policies applying to cloud infrastructure is the criteria for trust that policies reference or create. Criteria of trust can include restrictions on nationality or operational jurisdictions of cloud providers, geographic locations of cloud infrastructure, or specific technical and operational measures, such as the use of encryption or external key management. These criteria can be directly put into force through legislation or through references to external certifications or standards bodies. 

Digital sovereignty policies often seek to ensure that cloud service providers have local physical footprints. Ensuring the physical footprint of a technology provider can create a toehold for further enforcement and oversight, clarifying the obligations of cloud providers to the citizens and laws of different countries. Without a clear presence in the form of personnel or physical infrastructure in a country, it is difficult for governments to enforce regulations or to substantively hold companies accountable for abuses or violations of policy. Russia and Vietnam both adopted policies requiring local offices and representatives for technology companies, which have been described as creating opportunities for government control and coercion.52 Incentives for local data center construction, such as Brazil’s proposed package of incentives and tax breaks for developers, can alternatively focus on the potential economic benefits of localized infrastructure, from collected taxes to construction and maintenance jobs.53

Other localization requirements seek to restrict the physical location of cloud infrastructure. Proponents of data localization argue that restricting the physical location of data, including prohibiting cross-border data transfers, provides security and privacy advantages. Countries around the world have adopted localization measures applicable to various sectors, types of data, or processing requirements. Localization measures mandate restricting operations to cloud infrastructure located within certain geographic boundaries. Often, this manifests as restricting the set of cloud “regions” that companies have access to, while cloud providers recommend structuring applications to span multiple regions and availability zones.“54  Availability zones are logically isolated segments of cloud infrastructure that attempt to ensure that if one zone suffers an outage, it does not take down other zones within the same region.55 However, region-wide disruptions such as October’s AWS DynamoDB incident in the us-east-1 region, while rare, have significant impacts on both customers relying on resources within a region and cloud service providers that operate within a specific region.56

Figure 1: Region and launch year

Restricting the flow of data and information can limit access to computing and processing resources, limiting the ability of cloud providers to surge capacity and geographically distribute workloads. The ability to migrate workloads and computing assets, such as data, to other countries is essential for effective disaster recovery, which could motivate carving out backups as exempt from data localization. In preparing for Russia’s invasion, for instance, Ukraine paused localization requirements and shifted essential government data to cloud infrastructure outside of its borders to ensure availability and access in the event of the physical destruction of domestic data centers.57 Estonia has also established a data embassy, which consists of an external private cloud region in Luxembourg to ensure continuity of government operations in the event of a crisis.58

Beyond infrastructure locations, countries and customers might seek to restrict the geographic location of technical support staff and engineers, especially individuals who might access or view sensitive data. Requirements can restrict physical location, citizenship, or clearance of support personnel, which can impact the staffing strategies, create challenges for around-the-clock availability, and require duplication of expertise across nations. According to ProPublica, Microsoft worked around such restrictions from the United States Defense Department by using support structures such as “digital escorts,” where individuals in possession of security clearances but lacking technical expertise supervised engineers, including engineers physically located in China, as they interacted with cloud systems used for national security purposes.59 The impulse towards workarounds for location-based restrictions, such as the digital escort system, which Microsoft has reportedly stopped using for the Department of Defense, demonstrates the operational difficulties restrictions on the location of support staff can create and the security risks that can result from the uneven implementation of location restrictions.60

Infrastructure localization approaches can also be designed to ensure that companies or governments have local oversight and control over security measures, including the use of encryption. Keeping encryption keys off cloud provider infrastructure, and instead on local or on-premise infrastructure, can be referred to as “key escrow” or “external key management.”61 Apple has historically complied with key localization requirements in China, while Google has implemented an offering designed for compliance with a requirement in Saudi Arabia.62  These offerings may be developed in partnership with local providers, who can oversee cloud provider access to encryption keys.63 However, this approach introduces distinct risks to cloud computing systems, as customers must trust the additional provider to secure encryption keys, which, if compromised, would provide access to sensitive data. Countries can also impose other requirements relating to encryption, such as country-specific standards. South Korea’s government cloud certification requires national standard encryption algorithms that are not widely used outside of Korea.64

In the US, debates on state-sponsored, proprietary encryption standards have resulted in concerns about the intelligence community creating “backdoors,” or exploitable flaws within encryption algorithms, which could be used by intelligence agencies and malicious actors to monitor communications and access content.65 Governments could also directly restrict the ability of cloud service providers to offer products with certain encryption standards or features. The UK’s secret law enforcement request to Apple to access certain encrypted communications led Apple to withdraw its Advanced Data Protection feature from the UK market rather than create a backdoor for authorities.66  Restrictions or constraints on encryption standards and encryption system architectures can give local authorities control over access to encrypted data, but can also create vulnerabilities if they result in compromising key local management systems or mandates for insecure encryption standards. 

The jurisdictions cloud providers originate from or operate within can be a source of concern for governments, especially when other governments mandate, incentivize, or promote practices that undermine the security of underlying technology systems. Digital sovereignty policies can aim to exclude specific cloud providers or providers from certain countries, either with outright bans or structural requirements mandating local partnerships. The approach of excluding specific countries, or restricting the access of companies from certain countries, is referred to as a blacklist, while a policy that only allows transfers to specified countries is referred to as a whitelist.67

The United States has typically taken a blacklist approach to national security reviews of foreign companies, imposing a smaller, ad-hoc set of limitations on companies’ jurisdictions and origins. For example, the US government has expressed skepticism over Chinese cloud providers’ access to American information, resulting in investigations of Alibaba’s cloud business.68 These concerns include Chinese policies requiring technology companies to notify the government when they discover technical vulnerabilities and extensive cooperate with defense and intelligence services.69  In reviews of other technical systems, such as telecommunications infrastructure, the US has weighed the national security risks of the involvement of both Chinese and Russian companies.70

Meanwhile, European data protection regimes, such as the General Data Protection Regulation (GDPR), utilize a whitelist approach, requiring “adequacy decisions” to approve data transfers to certain countries.71  European leaders have raised concerns about US surveillance practices and the lack of federal privacy legislation, which has prompted regulators to revoke previous data transfer agreements.72 The dominance of US hyperscale cloud providers, domestically and abroad, has led to a close focus in policy discussions on US legislation applicable to cloud providers, including those that affect the operations of cloud providers in other jurisdictions. Concerns regarding US government access to information have led to repeated references in policy debates to one piece of legislation: the 2018 Clarifying Lawful Overseas Use of Data (CLOUD) Act.  

The CLOUD Act restated requirements of the US Stored Communications Act (SCA) as they apply to information under the control of cloud providers, including if that information is shared, sharded (splitting data into multiple, more manageable pieces), or distributed across geographic locations, but did not change the requirements for warrants under US law to access the content of electronic communications.73  The CLOUD Act’s clarification of the SCA’s scope brought the United States into compliance with the Budapest Convention on Cybercrime, while also authorizing bilateral agreements for countries to request information from cloud providers for law enforcement investigations outside of the Mutual Legal Assistance Treaty (MLAT) process.74  The EU-US Data Privacy Framework currently holds an adequacy decision, allowing individual US companies to transfer data under GDPR. However, the Trump administration’s disruption of the Privacy and Civil Liberties Oversight Board (PCLOB) and US intelligence community data collection have raised questions in Europe about the merits of the adequacy decision and could result in further legal challenges, which could remove the United States and American companies from the GDPR whitelist.75   

Concerns about the market dominance of US hyperscalers, as well as US government access to content stored on cloud computing systems, have also led to various European initiatives to foster domestic alternatives, such as the GAIA-X initiative.76  Foreign ownership restrictions contained within cloud certifications, such as the SecNumCloud regime, have led cloud providers to set up operations and joint ventures with domestic companies that manage local configurations of cloud computing. In France, for instance, Google has partnered with Thales, while Microsoft has partnered with Orange and Capgemini.77 Hyperscale cloud providers have also announced commitments to expand “sovereign” cloud regions, such as Microsoft’s partnership with a German SAP subsidiary, which will consist of “a sovereign cloud platform for the German public sector, hosted in German datacenters and operated by German personnel.”78  AWS’s sovereign cloud commitment language also highlights the physical and logical isolation of a forthcoming sovereign European cloud region, which will have “no operational control outside of EU borders.”79 These commitments and infrastructure developments require significant investments as well as a shift in operational and management strategies from the existing global distributed models.  

Table 2: Illustrative policies mapped to characteristics for digital sovereignty policies affecting cloud computing systems

Implications for cybersecurity and AI 

This multifarious tug of war over sovereignty and trust has significant implications for cloud computing infrastructure, security, and the services, including for AI. Focusing on location as a proxy for control and trust can lead to policies that ultimately undermine security goals by decreasing the reliability and integrity of essential systems. The critical nature of cloud computing means it deserves intensive evaluation to ensure the trustworthiness of foundational systems, but evaluation and assurances of trust in cloud computing should be rooted in effective guarantees. The efficiency and performance benefits of cloud computing are fractured and disrupted by location-based requirements. The replication of infrastructure, support systems, and other operational overhead creates meaningful costs for cloud providers, limiting their ability to invest in other measures that could improve performance or security. Filings by industry organizations, including the US Chamber of Commerce, prove this point by repeatedly highlighting the costs of staff and infrastructure location requirements impose on the operations of cloud providers.80

This location requirements race fragments security monitoring and threat response, limiting the ability of organizations with global footprints and technical systems to mitigate and respond to cross-border risks. National or regional silos of cloud deployments with the same underlying software and hardware deployments—all relying on core features, patterns, and architectures developed by the same handful of companies—insulate cloud deployments from legal concerns while creating technical and financial burdens.

Constraints on provider locations and jurisdictions can also limit organizations from taking full advantage of advanced global capabilities, including networking infrastructure. In 2021, for example, Portugal’s Supervisory Authority fined its public census body €4.3 million for using Cloudflare’s services, citing concerns regarding Cloudflare’s global, distributed network of servers and position as a US company.81  Despite Cloudflare’s reputation as a cost-effective and highly reliable network security provider, the ruling occurred in the wake of broader discussions on the ability of European organizations to transfer data to the United States as part of GDPR compliance.82

Moreover, the impacts of limiting access to network infrastructure are not mitigated by local datacenters and computing capacity, as organizations will still be unable to use state-of-the-art platforms that enable global communications and stronger security protections. Policies that only consider datacenter capacity and access ignore these impacts and can inadvertently create security issues while degrading service quality.

Governments should avoid imposing restrictions on access to cloud computing based exclusively on the location of cloud infrastructure. Location is at best a proxy for the security practices and guarantees of cloud providers and imposes cost and security consequences on providers. Localization requirements should, at a minimum, involve an advanced notification and blacklist approach, minimizing disruptions and operational concerns for cloud providers who build infrastructure configurations years in advance. Ad-hoc revocation should be reserved for well-documented offenders, observed compromises, and emergencies, as cloud providers, their customers, and the security ecosystem broadly benefit from stability and predictability.

Cloud security fundamentally depends upon the ability of organizations to respond to incidents rapidly at scale. Container escape vulnerabilities, which are errors in the implementation of encryption standards, or misconfigurations in the software connecting different services that expose can data and enable lateral movement, are just a few examples of cybersecurity flaws that are agnostic to the physical location of servers and support staff. If location-based requirements restrict companies’ ability to monitor, observe, and remediate incidents, or even prohibit or discourage them from retaining non-domestic cybersecurity incident response companies, organizations and governments will be cut off from the global flow of cutting-edge threat intelligence, vulnerability reports, and mitigation guidance.83

Conflicting trust frameworks can also undermine the ability of organizations to collaborate across the cloud ecosystem. Instead of working with cutting-edge providers and cybersecurity companies focused on addressing security challenges, organizations are encouraged to turn inward, reinventing the wheel by managing their own technology configurations and security postures. While these organizations have useful context for their own security risks, rapid coordination and information-sharing bolsters collective defenses in ways that are difficult to replicate. Ad-hoc grants and revocations of trust in cloud computing systems or cloud providers exacerbate these challenges, and governments should adopt frameworks for trust that allow for continuous verification and evaluation instead.

The management of cloud encryption keys and credentials is also essential to cloud security. Externalizing key management systems poses enhanced risks for the same reasons that advocates seek to localize control of encryption keys: they unlock access to otherwise secure data.84 However, removing key management from cloud provider infrastructure and placing it under the control of another provider creates additional risks, as cloud users must now trust each provider and the infrastructure or platform through which keys or identities are managed.85 Threat actors have targeted key and identity management platforms, recognizing their importance to the overall security posture of cloud customers. Okta, an identity and management company, has been the subject of repeated attacks, including a breach of its customer support portal, which initially became public because of a threat actor’s boasts on Telegram.86 Removing keys from cloud provider infrastructure does not reduce the importance of securing cryptographic information and credentials, and externalizing key management only places additional responsibility on individual customers to manage and ensure key security.

Cloud security errors and flaws cross organizational boundaries and are not prevented by distinctions between cloud providers and other companies in operating or managing infrastructure. Attackers have leveraged connections between on-premise and public cloud systems (known as hybrid cloud deployments), such as shared credentials or identity systems, to compromise and wreak havoc in cloud environments.87. In a 2023 example, a suspected Iranian threat actor used stolen credentials to move from an on-premise environment into a customer’s Azure configuration.88

Security flaws can also be similar across cloud providers, even when cloud providers separately develop features and products. The cloud security firm Wiz conducted research on the incorporation of a popular open-source database service, PostgreSQL, into cloud platforms and found similar vulnerabilities in Azure and Google Cloud, despite their independent development.89

Policymakers should not operate under the assumption that segmenting cloud infrastructure —or the oversight of cloud infrastructure —across organizations will automatically improve the cybersecurity posture of cloud configurations. By limiting the ability of companies to share information about vulnerabilities or observe threat activity across active cloud configurations, policymakers can inadvertently exacerbate the challenge of common security failures across cloud providers. The trajectory of AI development and its intense reliance on cloud resources will only exacerbate the challenges of navigating these tradeoffs. Policies that require jurisdictional independence, exclusive local legal or operational control, and partnerships with local companies incentivize configurations that are not based upon a solid foundation of technical boundaries and isolation. Artificially constraining cloud providers, mandating technology transfer, and rewarding regulatory arbitrage do nothing to advance national sovereignty objectives and incentivize lax security practices instead of proactive, systemic monitoring.

If specific government or critical infrastructure sector criteria for cloud procurement are too onerous or burdensome, they also risk artificially segmenting the cloud market, leaving public sector customers out of step with industry norms and delayed in accessing new offerings. For example, AWS’s US GovCloud region contains detailed documentation on services available in other regions that are unavailable or require distinct configurations within GovCloud.90 A US Government Accountability Office report on federal agency use of generative AI also references delays of cloud certification processes as an obstacle to access and use of new services, particularly when the companies offering them are not interested in gaining authorization through procurement processes or are unaware of federal procurement requirements.91

Critical infrastructure sectors and government agencies already shoulder cybersecurity burdens as the targets of persistent cyberattacks, with consistent ransomware attacks on hospitals as one example.92 In budget-constrained organizations, interpreting and implementing cybersecurity regulatory requirements can create cost burdens that lead to difficult tradeoffs with essential functionality.93 Policies designed to shape the cloud market broadly should carefully evaluate which sectors are impacted and to what degree. If the goal of a procurement or incentive structure is cross-sector security requirements, public entities with limited cybersecurity expertise or leverage to negotiate with hyperscale cloud providers, such as critical infrastructure operators, may not be a logical starting point.

Governments around the world have a crucial role to play in allowing cloud providers to demonstrate trustworthiness, as they can remove barriers to information sharing, harmonize international trust regimes, and demand information from providers that customers would otherwise be unable to access. Accepting and embracing this role requires a strategic focus outside of the role of governments as merely cloud procurers. While governments are essential users of the cloud, consumer protection mandates and broader security goals merit a focus on ecosystem-wide security, which should be disentangled from direct procurement capabilities. Cloud providers should be required to share cloud security indicators with governments not just as a step to securing public sector contracts, but also to verify the trustworthiness of cloud infrastructure critical to modern society.

The US can play an important role in shepherding confidential computing technology—which runs computations on isolated systems—but must also manage coordination to ensure that by the time this technology is available and trustworthy, that allies and partners have not fully pivoted to regulatory regimes that mandate fragmented cloud infrastructure. One way to assure allies and partners is to demonstrate commitments to the security of the cloud ecosystem. Where legislation like the CLOUD Act has been mis- or over-interpreted by outside entities to provide expansive authorities, law enforcement agencies should continue to clarify the scope and details of warranted access to the content or information stored by cloud providers. Through its oversight functions, the US Congress can also publicize further aggregated, anonymized, and declassified information about the nature of interactions between the intelligence community, law enforcement agencies, and cloud providers, including allowing further information sharing about national security requests.

Conclusion

As artificial intelligence demands force the evolution of cloud computing systems, policies aiming to ensure the security of cloud computing must balance the goals of visibility and control with essential capabilities. Specialized providers and the relative opacity of the AI ecosystem both make cloud computing’s role in AI more critical and fragile. As artificial intelligence workloads continue to require careful coordination across specialized providers and infrastructure, establishing clear criteria of trust in cloud computing gains urgency. The consequences of failing to establish and maintain this trust will not just be felt by organizations using the cloud to develop and deploy artificial intelligence, but by governments and companies broadly, as the cloud infrastructure they depend upon and utilize becomes fragmented and limited. 

Countries around the world have implemented and proposed policies that impose geographic or location restrictions on cloud systems, instituting organizational and operational changes for cloud providers without fully evaluating the security tradeoffs. Requirements that change the criteria for trust in cloud computing to prioritize location can silo and fragment cloud infrastructure, reducing geographic distribution that provides resilience and elasticity. Focusing the evaluation of trust instead on technical assurances, rather than geographic and organizational proxies, should be the priority of governments. The location and nationality of cloud providers, while important, are insufficient proxies for security guarantees and outcomes and ultimately serve to incentivize regulatory arbitrage and compliance over state-of-the-art security practices. 

The complexity of cloud computing—driven by scale, specialization, and demand—enables the reliable systems and technical innovations that define modern economies and ways of life—and that is why that policies and regulations in this sector need to be finely-tuned and informed by technical realities. Interventions that aim to manage this complexity by tearing apart infrastructure and segmenting it within geographic borders will only end up undermining these systems and their security without fulfilling national security goals.  

There is no doubt this is a tall task. But only strategies as nuanced as the technology itself can safeguard its advantages while establishing the foundational trust that will underpin the future of artificial intelligence and technological innovation.  

About the author

Sara Ann Brackett is an assistant director with the Cyber Statecraft Initiative, part of the Atlantic Council Tech Programs. She focuses her work on open-source software security, software bills of materials, software liability, and software supply-chain risk management within the Cyber Statecraft Initiative’s cybersecurity and policy portfolio.

Brackett graduated from Duke University, where she majored in computer science and public policy and wrote a thesis on the effects of market concentration on cybersecurity. She participated in the Duke Tech Policy Lab’s Platform Accountability Project and worked with the Duke Cybersecurity Leadership Program as part of Professor David Hoffman’s research team.

Acknowledgements

The author would like to thank Trey Herr, Stewart Scott, Nitansha Bansal, Kemba Walden, Devin Lynch, Justin Sherman, Dominika Kunertova, and Joe Jarnecki for their comments on earlier drafts of this report, as well as all the individuals who participated in background and Chatham House Rule discussions about issues related to data, AI applications, and the concept of an AI supply chain. 

Explore the program

The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

1    Tianjiu Zuo, Justin Sherman, Maia Hamin, and Stewart Scott, Critical Infrastructure and the Cloud: Policy for Emerging Risk, Atlantic Council, July 10, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/report/critical-infrastructure-and-the-cloud-policy-for-emerging-risk/.
2    Lily Hay Newman, “What the Huge AWS Outage Reveals About the Internet,” Wired, October 20, 2025, https://www.wired.com/story/what-that-huge-aws-outage-reveals-about-the-internet/.
3    “Winning the Race: America’s AI Action Plan,” Executive Office of the President of the United States, July 23, 2025, https://www.whitehouse.gov/wp-content/uploads/2025/07/Americas-AI-Action-Plan.pdf; “Global AI Governance Action Plan,” Ministry of Foreign Affairs of the People’s Republic of China,” July 26, 2025, https://www.fmprc.gov.cn/eng./xw/zyxw/202507/t20250729_11679232.html; “The AI Continent Action Plan: Shaping Europe’s Digital Future,” Commission to the European Parliament, April 9, 2025, https://digital-strategy.ec.europa.eu/en/library/ai-continent-action-plan.
4    “Top Threats to Cloud Computing 2024,” Cloud Security Alliance: Top Threats Working Group, August 5, 2024, https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-2024.
5    An Outage Strikes: Assessing the Global Impact of CrowdStrike’s Faulty Software Update, 118th Cong. (2024) (written testimony of Adam Meyers, Senior Vice President, Counter Adversary Operations, CrowdStrike), https://homeland.house.gov/wp-content/uploads/2024/09/2024-09-24-HRG-CIP-Testimony-Meyers.pdf
6    For coverage of another element of this supply chain, data, see Justin Sherman’s Securing data in the AI supply chain.
7    Bar Kaduri and Tohar Braun, “2023 Honeypotting in the Cloud Report: Attacker Tactics and Techniques Revealed,” Orca Security, 2023, https://orca.security/lp/sp/ty-content-download-2023-honeypotting-cloud-report/.
8    “Emerging Threats: Cybersecurity Forecast 2025,” Google Cloud Security, November 13, 2024, https://www.gstatic.com/gumdrop/files/cybersecurity-forecast-2025.pdf.
9    “Cloud Attack Retrospective: 8 Common Threats to Watch for in 2025,” Wiz, June 18, 2025, https://www.wiz.io/reports/cloud-attack-report-2025.
10    Peter Mell and Timothy Grance, “NIST Special Publication 800-145: The NIST Definition of Cloud Computing, National Institute of Standards and Technology, September 2011, https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-145.pdf.
11    Ashwin Chaudhary, “What is Cloud Workload in Cloud Computing,” Cloud Security Alliance, November 13, 2024, https://cloudsecurityalliance.org/blog/2024/11/13/what-is-cloud-workload-in-cloud-computing.
12    Rolf Harms and Michael Yamartino, “The Economics of the Cloud,” Microsoft, November 2010, https://news.microsoft.com/download/archived/presskits/cloud/docs/The-Economics-of-the-Cloud.pdf.
13    Wenqi Jiang et al., “Data Processing with FPGAs on Modern Architectures,” Companion of the 2023 International Conference on Management of Data, June 4, 2023, 77–82, https://doi.org/10.1145/3555041.3589410.
14    “Gartner Says Worldwide IaaS Public Cloud Services Market Grew 22.5% in 2024,” Gartner, August 6, 2025, https://www.gartner.com/en/newsroom/press-releases/2025-08-06-gartner-says-worldwide-iaas-public-cloud-services-market-grew-22-point-5-percent-in-2024.
15    Fay Chang et al., “Bigtable: A Distributed Storage System for Structured Data,” ACM Trans. Comput. Syst. 26, no. 2 (2008): 1-26, https://doi.org/10.1145/1365815.1365816.
16    Aditya Ramakrishnan, “Under the hood: Amazon EKS ultra scale clusters,” Amazon Web Services, July 16, 2025, https://aws.amazon.com/blogs/containers/under-the-hood-amazon-eks-ultra-scale-clusters/.
17    David Kuo, “Scaling on AWS Part I: A Primer,” AWS Startups Blog, November 25, 2015, https://aws.amazon.com/blogs/startups/scaling-on-aws-part-1-a-primer/.
18    “What is elastic computing or cloud elasticity,” Microsoft, accessed September 4, 2025, https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-elastic-computing.
19    “What is cloud architecture?,” Google Cloud, accessed September 4, 2025, https://cloud.google.com/learn/what-is-cloud-architecture?hl=en.
20    Vijay Kumar Adhikari et al., “Unreeling Netflix: Understanding and Improving Multi-CDN Movie Delivery,” Princeton Computer Science, accessed September 4, 2025, https://www.cs.princeton.edu/courses/archive/fall16/cos561/papers/NetFlix12.pdf.
21    “What is a data center?” Cloudflare, accessed September 4, 2025, https://www.cloudflare.com/learning/cdn/glossary/data-center/.
22    Shweta Jain, “What’s in a Name? Understanding the Google Cloud Network ‘Edge’,” Google Cloud, February 22, 2021, https://cloud.google.com/blog/products/networking/understanding-google-cloud-network-edge-points.
23    “Cloudflare Security Architecture,” Cloudflare Docs, accessed September 4, 2025, https://developers.cloudflare.com/reference-architecture/architectures/security/.
24    “Can a $9bn deal sustain CoreWeave’s stunning growth?” The Economist, July 10, 2025, https://www.economist.com/business/2025/07/10/can-a-9bn-deal-sustain-coreweaves-stunning-growth.
25    Asa Fitch, “Nvidia Ruffles Tech Giants With Move Into Cloud Computing,” The Wall Street Journal, June 25, 2025, https://www.wsj.com/tech/ai/nvidia-dgx-cloud-computing-28c49748; Matt Rowe, “NVIDIA starts to invest in cloud computing,” Due, July 1, 2025, https://www.nasdaq.com/articles/nvidia-starts-invest-cloud-computing.
26    Stephen Nellis and Anna Tong, “Behind $500 billion AI data center plan, US startups jockey with tech giants,” Reuters, January 23, 2025, https://www.reuters.com/technology/artificial-intelligence/behind-500-billion-ai-data-center-plan-us-startups-jockey-with-tech-giants-2025-01-23/.
27    Krystal Hu and Kenrick Cai, “CoreWeave to offer compute capacity in Google’s new cloud deal with OpenAI, sources say,” Reuters, June 11, 2025, https://www.reuters.com/business/coreweave-offer-compute-capacity-googles-new-cloud-deal-with-openai-sources-say-2025-06-11/.
28    Ramakrishnan, “Under the hood.”
29    “Amazon Bedrock,” Amazon Web Services, last accessed September 4, 2025, https://aws.amazon.com/bedrock/.
30    Zachary Cavanell, “Meet the Supercomputer that runs ChatGPT, Sora & DeepSeek on Azure (feat. Mark Russinovich),” Microsoft Mechanics Blog, June 5, 2025, https://techcommunity.microsoft.com/blog/microsoftmechanicsblog/meet-the-supercomputer-that-runs-chatgpt-sora–deepseek-on-azure-feat-mark-russi/4418808.
31    Alex Spiridonov and Gang Ji, “Cloud TPU v5e accelerates large-scale AI inference,” Google Cloud, August 31, 2023, https://cloud.google.com/blog/products/compute/how-cloud-tpu-v5e-accelerates-large-scale-ai-inference; Nisha Mariam Johnson and Andi Gavrilescu, “How to scale AI training to up to tens of thousands of Cloud TPU chips with Multislice,” Google Cloud, August 31, 2023, https://cloud.google.com/blog/products/compute/using-cloud-tpu-multislice-to-scale-ai-workloads; Joanna Yoo and Vaibhav Singh, “How Cohere is accelerating language model training with Google Cloud TPUs,” Google Cloud, July 27, 2022, https://cloud.google.com/blog/products/ai-machine-learning/accelerating-language-model-training-with-cohere-and-google-cloud-tpus.
32    “FACT SHEET: Ensuring U.S. Security and Economic Strength in the Age of Artificial Intelligence,” Executive Office of the President, January 13, 2025, https://bidenwhitehouse.archives.gov/briefing-room/statements-releases/2025/01/13/fact-sheet-ensuring-u-s-security-and-economic-strength-in-the-age-of-artificial-intelligence/; “America’s Action Plan, Executive Office of the President, July 2025, https://www.whitehouse.gov/wp-content/uploads/2025/07/Americas-AI-Action-Plan.pdf.
33    Sella Nevo,  et al., “Securing AI Model Weights,” RAND, May 30, 2024, https://www.rand.org/pubs/research_reports/RRA2849-1.html; Janet Egan, “Global Compute and National Security,” Center for a New American Security, July 29, 2025, https://www.cnas.org/publications/reports/global-compute-and-national-security; Tim Fist, Arnab Datta, and Brian Potter, “”Compute in America: Building the Next Generation of AI Infrastructure at Home,” June 10, 2024, https://ifp.org/compute-in-america/#part-ii-how-to-build-the-future-of-ai-in-the-united-states.
34    “Cybersecurity Forecast 2026 report,” Google Cloud,  https://cloud.google.com/security/resources/cybersecurity-forecast?hl=en.
35    “2023 Honeypotting in the Cloud Report,” Orca Security, https://orca.security/lp/sp/ty-content-download-2023-honeypotting-cloud-report/.
36    Matthew Prince, John Graham-Cumming, Grant Bourzikas, “Thanksgiving 2023 security incident,” Cloudflare Blog, February 2, 2024,  https://blog.cloudflare.com/thanksgiving-2023-security-incident/.
37    “Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System,” Cybersecurity and Infrastructure Security Agency (CISA), September 03, 2025, https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a.
38    “Glossary: Trust,” National Institute of Standards and Technology, Computer Security Resource Center, https://csrc.nist.gov/glossary/term/trust.
39    Joe Warminsky, “Kaspersky Added to FCC List That Bans Huawei, ZTE from US Networks,” CyberScoop, March 25, 2022, https://cyberscoop.com/kaspersky-fcc-covered-list/.
40    Scott Rose et al., NIST Special Publication 800-207: Zero Trust Architecture, August 2020, https://nvlpubs.nist.gov/nistpubs/specialpublications/NIST.SP.800-207.pdf.
41    “Zero Trust Maturity Model,” CISA, January 2022, https://www.cisa.gov/zero-trust-maturity-model.
42    Suzanne Ambiel, “The Case for Confidential Computing,” The Linux Foundation https://www.linuxfoundation.org/hubfs/Research%20Reports/TheCaseforConfidentialComputing_071124.pdf?hsLang=en; “Trusted Execution Environment (TEE),” Microsoft Learn, accessed September 4, 2025, https://learn.microsoft.com/en-us/azure/confidential-computing/trusted-execution-environment.
43    “A Technical Analysis of Confidential Computing,” Confidential Computing Consortium, November 2022, https://confidentialcomputing.io/wp-content/uploads/sites/10/2023/03/CCC-A-Technical-Analysis-of-Confidential-Computing-v1.3_unlocked.pdf.
44    Max Von Thun, “Cloud computing is too important to be left to the Big Three,” The Financial Times, May 26, 2025, https://www.ft.com/content/5c930686-9119-402d-8b9b-4c3f6233164e; “Navigating Digital Sovereignty and its Impact on the Internet,” The Internet Society, December 2022,https://www.internetsociety.org/wp-content/uploads/2022/11/Digital-Sovereignty.pdf; Laurens Cerulus, “France wants cyber rule to curb US access to EU data,” Politico, September 13, 2021, https://www.politico.eu/article/france-wants-cyber-rules-to-stop-us-data-access-in-europe/; “Towards a next generation cloud for Europe,” European Commission, October 15, 2020, https://digital-strategy.ec.europa.eu/en/news/towards-next-generation-cloud-europe; Tony Roberts and Marjoke Oosterom, “Digital authoritarianism: a systematic literature review,” Information Technology for Development (2024): 1-25, https://www.tandfonline.com/doi/full/10.1080/02681102.2024.2425352?af=R#d1e129 https://www.internetsociety.org/wp-content/uploads/2022/11/Digital-Sovereignty.pdf.
45    “Navigating Digital Sovereignty and its Impact on the Internet.”
46    Georgia Wood and James Lewis, “The CLOUD Act and Transatlantic Trust,” Center for Strategic and International Studies, March 29, 2023, https://www.csis.org/analysis/cloud-act-and-transatlantic-trust; Frances G. Burwell and Kenneth Propp, Digital Sovereignty in Practice: The EU’s Push to Shape the New Global Economy, Atlantic Council, October 2022, https://www.atlanticcouncil.org/wp-content/uploads/2022/11/Digital-sovereignty-in-practice-The-EUs-push-to-shape-the-new-global-economy_.pdf
47    Meredith Broadbent, “The European Cybersecurity Certification Scheme for Cloud Services,” Center for Strategic and International Studies (CSIS), September 1, 2023, https://www.csis.org/analysis/european-cybersecurity-certification-scheme-cloud-services.
48    Nigel Cory and Luke Dascoli, “How Barriers to Cross-Border Data Flows Are Spreading Globally, What They Cost, and How to Address Them,” Information Technology and Innovation Foundation, July 19, 2021, https://itif.org/publications/2021/07/19/how-barriers-cross-border-data-flows-are-spreading-globally-what-they-cost/.
49    Broadbent, “The European Cybersecurity Certification Scheme for Cloud Services.”
50    “South Korea’s Cloud Service Restrictions,” Information Technology and Innovation Foundation, August 26, 2025, https://itif.org/publications/2025/05/25/south-korea-cloud-service-restrictions/
51    James Andrew Lewis and Julia Brock, “Faster in the Cloud,” CSIS, January 16, 2025, https://www.csis.org/analysis/faster-cloud-federal-use-cloud-services
52    Justin Sherman, “The Kremlin May Make Foreign Internet Companies Open Offices in Russia,” Slate, February 8, 2021, https://slate.com/technology/2021/02/russia-kremlin-internet-controls-foreign-companies-offices.html.
53    Lais Martins, “Brazil is Handing Out Generous Incentives for Data Centers, But What it Stands to Gain is Still Unclear,” Tech Policy Press, May 22, 2025, https://www.techpolicy.press/brazil-is-handing-out-generous-incentives-for-data-centers-but-what-it-stands-to-gain-from-it-is-still-unclear/.
54    Regions and zones,” Google Cloud, accessed September 4, 2025, https://docs.cloud.google.com/compute/docs/regions-zones.
55    “Cloud Locations,” Google Cloud, last accessed September 4, 2025, https://cloud.google.com/about/locations.
56    “Summary of the Amazon DynamoDB Service Disruption in the Northern Virginia (US-EAST-1) Region,” Amazon Web Services, accessed September 4, 2025, https://aws.amazon.com/message/101925/.
57    Catherine Stupp, “Ukraine Has Begun Moving Sensitive Data Outside Its Borders,” The Wall Street Journal, June 14, 2022, https://www.wsj.com/articles/ukraine-has-begun-moving-sensitive-data-outside-its-borders-11655199002
58    “e-Governance,” e-Estonia, last accessed September 4, 2025, https://e-estonia.com/solutions/e-governance/data-embassy/.
59    Renee Dudley and Doris Burke, “A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers,” Pro Publica, July 15, 2025, https://www.propublica.org/article/microsoft-digital-escorts-pentagon-defense-department-china-hackers.
60    Renee Dudley, “Microsoft Says It Has Stopped Using China-Based Engineers to Support Defense Department Computer Systems,” Pro Publica, July 18, 2025, https://www.propublica.org/article/defense-department-pentagon-microsoft-digital-escort-china.
61    Anton Chuvakin and Il-Sung Lee, “The cloud trust paradox: 3 scenarios where keeping encryption keys off the cloud may be necessary,” Google Cloud, February 2, 2021, https://cloud.google.com/blog/products/identity-security/3-scenarios-where-keeping-encryption-keys-off-the-cloud-may-be-necessary.
62    Tom McKay, “Apple Moves Chinese iCloud Encryption Keys to China, Worrying Privacy Advocates,” Gizmodo, February 25, 2018, https://gizmodo.com/apple-moves-chinese-icloud-encryption-keys-to-china-wo-1823312628; Archana Ramamoorthy and Bader Almadi, “Google Cloud expands services in Saudi Arabia, delivering enhanced data sovereignty and AI capabilities,” Google Cloud, August 19, 2024, https://cloud.google.com/blog/products/identity-security/google-cloud-expands-services-in-saudi-arabia-delivering-enhanced-data-sovereignty-and-ai-capabilities.
63    Il-Sung Lee, “Use third-party keys in the cloud with Cloud External Key Manager, now beta,” Google Cloud, December 17, 2019, https://cloud.google.com/blog/products/identity-security/cloud-external-key-manager-now-in-beta.
64    Esperanza Jelalian, “Subject: Public Consultation on Amendments to Korea’s Cloud Security Assurance Program (CSAP),” US-Korea Business Council, US Chamber of Commerce, February 9, 2023, https://www.uschamber.com/assets/documents/U.S.-Chamber_USKBC_CSAP-Letter-to-MSIT-02-09-2023.pdf.
65    Bryan H. Choi, “NIST’s Software Un-Standards,” Lawfare, March 7, 2024, https://www.lawfaremedia.org/article/nist’s-software-un-standards.
66    Zoe Kleinman, “UK backs down in Apple privacy row, US says,” BBC News, August 19, 2025, https://www.bbc.com/news/articles/cdj2m3rrk74o.
67    Kenneth Propp, Who’s a national security risk? The changing transatlantic geopolitics of data transfers, Atlantic Council, May 29, 2024, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/whos-a-national-security-risk-geopolitics-of-data-transfers/.
68    Alexandra Alper, “Exclusive: U.S. examining Alibaba’s cloud unit for national security risks – sources,” Reuters, January 19, 2022, https://www.reuters.com/technology/exclusive-us-examining-alibabas-cloud-unit-national-security-risks-sources-2022-01-18/.
69    Peter Harrell, “Managing the Risks of China’s Access to U.S. Data and Control of Software and Connected Technology,” Carnegie Endowment for International Peace, January 30, 2025, https://carnegieendowment.org/research/2025/01/managing-the-risks-of-chinas-access-to-us-data-and-control-of-software-and-connected-technology?lang=en.
70    Communications Networks Safety and Security, US Senate Committee on Commerce, Science, and Transportiation, Subcommittee on Communications, Media, and Broadband, 117th Cong. (2024) (written statement of Justin Sherman, Nonresident Senior Fellow, Atlantic Council Cyber Statecraft Initiative), https://www.commerce.senate.gov/services/files/9D566360-52C7-4FB9-B30B-1A5A86B9A69E.
71    Propp, Who’s a national security risk?
72    Caitlin Fennessy, “The ‘Schrems II’ decision: EU-US data transfers in question,” IAPP, July 16, 2020, https://iapp.org/news/a/the-schrems-ii-decision-eu-us-data-transfers-in-question.
73    “Promoting Public Safety, Privacy, and the Rule of Law Around the World: The Purpose and Impact of the CLOUD Act,” US Department of Justice, April 2019, https://www.justice.gov/criminal/media/999601/dl?inline.
74    “Deputy Assistant Attorney General Richard W. Downing Delivers Remarks at the 5th German-American Data Protection Day on ‘What the U.S. Cloud Act Does and Does Not Do,’” US Department of Justice, May 16, 2019, https://www.justice.gov/archives/opa/speech/deputy-assistant-attorney-general-richard-w-downing-delivers-remarks-5th-german-american.
75    Brian Hengesbaugh and Lukas Feiler, “How could Trump administration actions affect the EU-US Data Privacy Framework?” IAPP, February 26, 2025, https://iapp.org/news/a/how-could-trump-administration-actions-affect-the-eu-u-s-data-privacy-framework-; “Joint answer given by Mr. McGrath on behalf of the European Commission,” European Parliament, April 14, 2025, https://www.europarl.europa.eu/doceo/document/E-10-2025-000520-ASW_EN.html.
76    Mark Scott and Francesco Bonfiglio, “Why Europe’s Cloud Ambitions Have Failed,” AI Now Institute, October 15, 2024, https://ainowinstitute.org/publications/xi-why-europes-cloud-ambitions-have-failed.
77    “’Cloud de Confiance’ leader,” s3ns, accessed September 4, 2025, https://www.s3ns.io/en; Judson Althoff, “Announcing comprehensive sovereign solutions empowering European organizations,” Microsoft, June 16, 2025, https://blogs.microsoft.com/blog/2025/06/16/announcing-comprehensive-sovereign-solutions-empowering-european-organizations/.
78    Brad Smith, “Microsoft announces new European digital commitments,” Microsoft, April 30, 2025, https://blogs.microsoft.com/on-the-issues/2025/04/30/european-digital-commitments/.
79    Colm MacCarthaign, “Establishing a European trust service provider for the AWS European Sovereign Cloud,” Amazon Web Services, July 10, 2025, https://aws.amazon.com/blogs/security/establishing-a-european-trust-service-provider-for-the-aws-european-sovereign-cloud/.
80    Jelalian, “Subject: Public Consultation on Amendments to Korea’s Cloud Security Assurance Program (CSAP).”
81    “The Portuguese Supervisory Authority fines the Portuguese National Statistics Institute (INE) 4.3 million EUR,” European Data Protection Board, December 19, 2022, https://www.edpb.europa.eu/news/national-news/2022/portuguese-supervisory-authority-fines-portuguese-national-statistics_en.
82    Hendrik Mildebrath, “The CJEU judgment in the Schrems II case,” European Parliament, September 2020, https://www.europarl.europa.eu/RegData/etudes/ATAG/2020/652073/EPRS_ATA(2020)652073_EN.pdf
83    Peter Swire and DeBrae Kennedy-Mayo, “The Risks to Cybersecurity from Data Localization – Organizational Effects,” 8 Arizona Law Journal of Emerging Technologies 3 (June 2025), https://doi.org/10.2139/ssrn.4030905.
84    Anton Chuvakin and Honna Segel, “Unlocking the mystery of stronger security key management,” Google Cloud, December 21, 2020, https://cloud.google.com/blog/products/identity-security/better-encrypt-your-security-keys-in-google-cloud.
85    “Cloud External Key Manager,” Google Cloud, accessed September 4, 2025, https://cloud.google.com/kms/docs/ekm#considerations; Chuvakin and Segel, “Unlocking the mystery of stronger security key management;” “Use Secure Cloud Key Management Practices,” US National Security Agency, CISA, March 7, 2024, https://media.defense.gov/2024/Mar/07/2003407858/-1/-1/0/CSI-CloudTop10-Key-Management.PDF.
86    Jonathan Greig, “Okta security breach affected all customer support system users,” The Record, November 29, 2023, https://therecord.media/okta-security-breach-all-support-users; Jonathan Grieg, “Okta apologizes for waiting two months to notify customers of Lapsus$ breach,” The Record, March 27, 2022, https://therecord.media/okta-apologizes-for-waiting-two-months-to-notify-customers-of-lapsus-breach.
87    Lior Sonntag, “Bridging the Security Gap: Mitigating Lateral Movement Risks from On-Premises to Cloud Environments,” Wiz, May 25, 2023, https://www.wiz.io/blog/lateral-movement-risks-in-the-cloud-and-how-to-prevent-them-part-4-from-compromis
88    MERCURY and DEV-1084: Destructive attack on hybrid environment,” Microsoft Threat Intelligence, April 7, 2023, https://www.microsoft.com/en-us/security/blog/2023/04/07/mercury-and-dev-1084-destructive-attack-on-hybrid-environment/.
89    Ronen Shustin, Shir Tamari, Nir Ohfeld, and Sagi Tzadik, “The cloud has an isolation problem: PostgreSQL vulnerabilities affect multiple cloud vendors,” Wiz, August 11, 2022, https://www.wiz.io/blog/the-cloud-has-an-isolation-problem-postgresql-vulnerabilities.
90    “Services in AWS GovCloud (US) Regions,” Amazon Web Services, accessed September 4, 2025, https://docs.aws.amazon.com/govcloud-us/latest/UserGuide/using-services.html.
91    “Artificial Intelligence: Generative AI Use and Management at Federal Agencies,” US Government Accountability Office, July 29, 2025, https://files.gao.gov/reports/GAO-25-107653/index.html.
92    “Healthcare and Public Health Sector,” CISA, accessed September 4, 2025, https://www.cisa.gov/stopransomware/healthcare-and-public-health-sector.
93    Ashley Thompson, “Re: Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements,” American Hospital Association, July 3, 2024, https://www.aha.org/lettercomment/2024-07-02-aha-responds-cisa-proposed-rule-cyber-incident-reporting-requirements.

The post Cloudbusting: Policy for evaluating trust in compute infrastructure appeared first on Atlantic Council.

]]>
How the Baltic Sea nations have tackled suspicious cable cuts https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/how-the-baltic-sea-nations-have-tackled-suspicious-cable-cuts/ Wed, 26 Nov 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=889855 Two places in the world's oceans see a lot of suspicious maritime behavior: the Baltic Sea, and the waters around Taiwan. Elisabeth Braw reports from the NATO task force charged with protecting the undersea cables and pipelines essential to daily life in Europe, with lessons for Baltic states and Taiwan, too.

The post How the Baltic Sea nations have tackled suspicious cable cuts appeared first on Atlantic Council.

]]>

Bottom lines up front

  • In 2023 and 2024, many undersea cables and a pipeline in the Baltic Sea were cut or damaged in a string of suspicious incidents. Caught by surprise, the Baltic states’ initial response was improvised and uncoordinated. 
  • The AI boom and the energy transition are likely to increase the number of undersea cables, and governments can no longer assume they would only be damaged by accident. 
  • A NATO task force now leads multinational patrols and the EU has reached out to nations whose flag is used by vessels flouting maritime law to get dangerous ships de-flagged. 

On September 26, 2022, the Nord Stream 1 and 2 pipelines began leaking gas in the exclusive economic zones (EEZs) of Sweden and Denmark. It quickly became clear that the leak was not a technical fault but the result of explosions. In the months and weeks before the leak, Germany, the main importer of the Russian gas carried by Nord Stream, had completely cut its Russian gas imports.1 It had also declined to certify Nord Stream 2, the second pipeline, which was full of gas and ready to commence operations.2 Nord Stream AG—Nord Stream 1’s owner—had, in turn, scheduled maintenance suspensions, some of which were not part of standard maintenance. The two pipelines, conceived of during the peak of globalization but long opposed by the Baltic states and Poland, had become so geopolitically fraught that the explosions were quickly interpreted as an act of state-linked sabotage. Most analysts reasoned that Russia must have orchestrated the explosions as an act of revenge against Western countries slashing their imports of Russian gas.

Almost precisely one year later, on October 8, 2023, the Balticconnector pipeline connecting Finland and Estonia began leaking gas in the Gulf of Finland, the easternmost part of the Baltic Sea.3 Investigators soon established that the pipeline had been hit by the Hong Kong-flagged, Chinese-owned boxship Newnew Polar Bear.4 So had an undersea data cable. Even though different countries and outfits launched individual responses, the Newnew Polar Bear managed to sail through the Baltic Sea and along Norway’s coast before reaching Russian waters, where it was completely out of investigators’ reach.

After the Eagle S had struck the fifth cable and was approaching yet another, the Finnish police and coast guard dramatically boarded and detained it.

Just over a year later, the Baltic Sea region was struck by another suspicious undersea incident. On November 17, 2024, a data cable connecting Sweden and Lithuania was damaged. So was a data cable connecting Finland and Germany, the only cable connecting Finland with the European continent. Authorities quickly identified a suspect, the Chinese-owned and Chinese-flagged bulk carrier Yi Peng 3.5 Vessels from different Baltic Sea states shadowed the bulker, but they could not detain it because it was sailing in EEZs, not territorial waters. After sailing through the Danish Straits—which count as international waters, not territorial ones—the ship stopped in Denmark’s EEZ.6 It remained there with China, the flag state, blocking Danish and other local investigators from boarding the ship. On December 20, the Chinese authorities allowed investigators from Denmark, Sweden, Finland, and Germany to board, but only under Chinese supervision and only for a truncated visit.7 The following day, the bulker left.

A few weeks later, on Christmas Day, the Cook Islands-flagged tanker Eagle S struck one interconnector (power cable) and four data cables in the Gulf of Finland.8 Because the tanker was a shadow vessel known to the Finnish and Estonian authorities, both had been monitoring it.

A shadow vessel:

  • generally has owners who deliberately obfuscate their identity;
  • flies flags from nations with minimal or no maritime expertise (“flags of extreme convenience”);
  • has questionable protection and indemnity (P&I) insurance; and
  • turns off its automatic identification system (AIS) to hide its movements.

There is no standard intergovernmental definition of “shadow vessel,” but the Atlantic Council’s Threats to the global maritime order project has developed this set of criteria.

After the Eagle S had struck the fifth cable and was approaching yet another cable, the Finnish police and coast guard dramatically boarded and detained it.9 They did so in Finland’s EEZ—a highly controversial move because coastal states only have jurisdiction in their territorial waters, with limited rights in the EEZ.10 However, the Finnish authorities reasoned that they had no choice but to detain the ship in the EEZ, because not doing so would have resulted in even more cables being struck.11

The following month, the Maltese-flagged bulk carrier Vezhen struck a data cable connecting Sweden and Latvia. When the bulker approached Sweden, authorities escorted it into Swedish territorial waters, then seized it.12 However, because the prosecutor couldn’t prove that the bulker’s crew had intentionally released the anchor, the investigation was shelved and the ship and crew were released.13

Between and after these high-profile incidents, ships were spotted behaving suspiciously near undersea cables and pipelines. The sightings, and especially the incidents, have highlighted a troubling reality: governments and undersea-infrastructure operators can no longer assume that ships will only hit undersea installations by accident. On the contrary, they must now assume that the waters above the cables and pipelines are frequented by state and non-state actors wishing to damage these installations.

This matters because existing cables and pipelines are indispensable to the functioning of the countries they connect. What is more, the continuing digital transformation and the advance of artificial intelligence (AI) will require even more undersea data cables, and the green transition will require even more undersea power cables. These undersea power cables transport electricity between different countries, between countries and islands, and between offshore wind farms and the mainland. For Europe, the need to replace Russian gas imports makes undersea pipelines providing gas from Norway essential.

A coordination cell takes on saboteurs and the shadow fleet

Even though it has long been known that saboteurs could target undersea cables and pipelines, countries and organizations affiliated with them have historically refrained from doing so, if only because the United Nations Convention on the Law of the Sea (UNCLOS) bans deliberate damage of undersea installations. Terrorist organizations, for their part, have had little interest in conducting attacks that would not result in dramatic footage. Although some damage to undersea cables and pipelines over the decades has been attributed to criminals, nation-state involvement has been exceedingly rare.

That explains why, in September 2022, the Nord Stream explosions caught Baltic Sea nations and the rest of the world by surprise.14 Because the explosions occurred in the EEZs of Sweden and Denmark, the two countries launched investigations. As one of two countries connected by the pipelines, Germany also launched an investigation. Russia, the other country connected by the pipelines, repeatedly accused the three other countries of not sharing information about their investigations with Russian authorities.15 These protestations were widely condemned and ridiculed by Western commentators, who assumed that Russia was behind the explosions.

The real test for the Baltic Sea nations, and NATO, will arrive if—or when—a vessel ignores instructions to change course.

Even after the incident, Nord Stream’s extremely high profile led the three countries to believe the attack had been a one-off incident. NATO and the Baltic Sea nations did not see a need to establish protocols in case further attacks occurred, though NATO tasked Hans-Werner Wiermann, a retired German general, with mapping out what role the Alliance could play in coordinating the response to future incidents. Wiermann responded by establishing a coordination cell, based at NATO headquarters, which would function as a clearinghouse of information between different agencies in different member states. The coordination cell began operations in early 2023.16

The coordination cell was, however, dependent on receiving all necessary information from authorities in NATO member states, and that stream of information was not yet fully functional when the Balticconnector began leaking gas. The lack of a NATO-wide protocol for such incidents meant that Finland and Estonia activated their national protocols, but that information was not systematically shared across NATO and national authorities. As a result, a few allies and NATO institutions independently discovered that an incident had taken place and began investigating. However, there was no regular coordination between the different entities. That meant that it took hours before the Newnew Polar Bear was identified as a suspect and, by that point, the boxship had left the EEZs of Finland and Estonia and struck a nearby data cable.17 The authorities later realized that the Chinese-owned ship appeared to have cut a data cable in Sweden’s EEZ before hitting the Balticconnector.

Precisely because there were no NATO-wide protocols for such situations, and also because Sweden was not yet a member of NATO, the information did not reach the right authorities and officials quickly enough. That enabled the Newnew Polar Bear to make its way through the Baltic Sea, through the Danish Straits, along the Norwegian coast, and into Russian waters before the respective countries’ authorities—and NATO—could decide what actions to take. (The Newnew Polar Bear had, in coordination with Russian authorities, recently undertaken a pioneering journey through Russia’s Northern Sea Route.18) “Where we were in 2023 was that damage to undersea cables and pipelines was in the risk scenarios, there was acknowledgement that these kinds of incidents could happen,” said Erkki Tori, Estonia’ national security advisor. “But I don’t think that we truly acknowledged the multinational nature of these incidents. What we learned in Estonia after the Newnew Polar Bear incident was that you need to have a very operational relationship with different nations that you share the undersea infrastructure with. And not only on one level, but on multiple levels: the government level, the agency level, but also on the level of the companies that use or co-own the infrastructure.”19

Since then, communication protocols and coordination have improved. Tori added: “On a bilateral basis [with Finland], we have tried to maintain and enhance the relationships that we built as a response to the Newnew Polar Bear incident. If you move further from there onto a regional perspective, you need such relationships across the region as well, because even just one moving ship might be a problem for various critical undersea infrastructure objects. You need to have the same kind of awareness, the same kind of response protocol throughout the region as well.”20

A new NATO task force patrols the Baltic Sea

In March 2024, Sweden was finally admitted to NATO after Turkey dropped its opposition. A few months later, in October, Germany stood up Commander Task Force (CTF) Baltic.21 While NATO has other CTFs, CTF Baltic took on special significance the moment it was created, as it was seen as another response to the undersea incidents, with a role completely different from that of NATO’s coordination cell.

CTF Baltic, based in the German port city of Rostock, has some ninety naval officers, most of them from the Bundeswehr, with others on loan from Baltic Sea nations and even southern European countries like Italy. It also commands a fleet of naval vessels and some aircraft, most of which belong to the Bundeswehr while others are on loan from allies.

While CTF Baltic’s official task is “to coordinate naval activities in the region with Germany’s allies and provide them with a current joint maritime situational picture around the clock,” its focus since its inception has been on the shadow fleet and threats to undersea installations. “The Baltic Sea may seem like a small ocean, but it’s a significant body of water to patrol,” said Brian Svendsen of the Danish Navy, CTF Baltic’s assistant chief of staff for current and future operations. “We focus on the shipping lanes, on ships that have previously been identified as a potential source of concern, and naturally monitoring the undersea installations.”22

Although CTF Baltic is a German entity, it undertakes its activities on behalf of NATO’s Maritime Command (MARCOM). It does so not only by patrolling selected parts of the Baltic Sea, but also by monitoring ship movements from land, including through radar. When the leaders of NATO’s Baltic littoral states announced the creation of Baltic Sentry in January 2025, it was not a matter of a new organization but rather a new component for CTF Baltic.23 Baltic Sentry essentially added more vessels, patrol aircraft, and staff to the setup already in place in Rostock.24 “We had found that in order to show that we take the threat to undersea installations seriously, we need allied presence on top of our national presence,” Tori said. “And by we, I don’t mean just Estonia and Finland. On a national basis, we already have ships patrolling. Baltic Sentry is there to show solidarity and as a very practical measure, a way of demonstrating vigilance.”25

Around the same time that NATO allies launched Baltic Sentry, the Joint Expeditionary Force (JEF) activated Nordic Warden, a monitoring system that “harnesses AI to assess data from a range of sources, including the Automatic Identification System (AIS) ships use to broadcast their position, to calculate the risk posed by each vessel entering areas of interest.”26 Nordic Warden was also integrated into CTF Baltic’s operations. (The United Kingdom-led JEF also comprises Denmark, Estonia, Finland, Iceland, Latvia, Lithuania, the Netherlands, Norway, and Sweden.)

Only a few weeks after CTF Baltic was launched, the Yi Peng 3 incident occurred, and the Eagle S and Vezhen incidents occurred after that, but the Baltic Sea has not experienced any suspicious undersea incidents since January 2025. “That is a sign that the deterrence we provide is working,” Svendsen said. As with all deterrence, it is impossible to ascertain whether the deterrent has worked or whether no further incidents were being planned, but mounting deterrence is better than testing one’s luck without it.

Either way, the Baltic Sea countries today have in place collaboration, monitoring, and response options that are a far cry from where they were when the Newnew Polar Bear struck the Balticconnector in October 2023. When shadow vessels approach undersea cables and pipelines, CTF Baltic monitors them. Should another vessel start behaving suspiciously around undersea installations, the task force will detect that too. Also, coastal states’ coast guards and navies conduct regular patrols, and the countries’ authorities systematically share updates in a manner that simply was not in place in mid-2023 and earlier. Their efforts also show how NATO member states can succeed in addressing regional threats without the entire Alliance needing to become involved.

In addition, Tori noted, the European Union (EU) is also part of the efforts to restore order in the Baltic Sea, not just through its sanctions on specific shadow vessels. EU officials also engage with counterparts in the countries that flag the shadow vessels. Today such countries—flags of extreme convenience, to use the phrase coined by this author—include the Gambia, Sierra Leone, and Comoros. In a noteworthy development that reflects European outreach, Barbados, Gabon, and the Cook Islands—which had been popular flag states for shadow vessels—have announced they will de-flag ships sanctioned by Western governments.27 While incidents involving undersea infrastructure are not limited to shadow vessels, the fact that shadow vessels skirt rules and have opaque ownership structures makes them more likely candidates for suspicious incidents than conventional ships.

In addition, the EU is implementing its Action Plan on Cable Security, which it passed in February 2025. Among other measures, the plan involves steps to further develop information exchange and strengthen joint repair capabilities.28

If, or when, another suspicious incident involving undersea cables or pipelines occurs, it is less clear how NATO, the EU, or the nations and entities now involved in the efforts to protect this infrastructure would respond. “We’d deploy there straight away, and it’s important to remember that the Baltic Sea is bigger than it seems,” Svendsen explained. “We can’t be everywhere all the time. In case of an incident, we’d deploy to the site and monitor it, but the response is up to the coastal state because it decides what can be done depends on that country’s legal system. And it’s important to remember that the owners of cables and pipelines have primary responsibility for their security. CTF Baltic and NATO are there to assist, but not to provide all-round security.”29

As a military alliance, NATO is also not in charge of responding to suspected underwater sabotage; coastal states are. In the Baltic Sea, vessels seconded to CTF Baltic can return to national command if needed in incident response. But the question remains how the coastal states and NATO would respond. For now, they seem to bet that patrolling and monitoring the Baltic Sea will deter sabotage of undersea installations—but like all deterrence efforts, these activities are at best an educated guess. The real test for the Baltic Sea nations, and NATO, will arrive if—or when—a vessel ignores CTF Baltic’s patrols and coastal states’ instructions to change course.

From the Baltics to the South China Sea

The Baltic Sea is the region most affected by Russia’s shadow vessels and—together with Taiwan—the region most affected by suspicious incidents involving undersea cables and pipelines. At the time of the Newnew Polar Bear incident in October 2023, individual countries had impressive response protocols, but there were no real protocols involving information sharing and response with other countries. That situation has dramatically improved. Today, the Baltic Sea countries systematically share information, aided by NATO’s coordination cell, and consistently exchange updates and information with cable and pipeline operators, while national authorities and CTF Baltic monitor traffic around the clock and are able to deploy in case of an incident.

What is less clear is how CTF Baltic and national authorities would respond in case of an incident in which a vessel refuses to obey orders to move or has already struck a cable or pipeline and refuses orders to halt. Such rules of engagement cannot be established by CTF Baltic or national authorities. Instead, they depend on what NATO decides constitutes an aggressive act that could trigger Article 5.

CTF Baltic and Baltic Sea countries can bring further attention to suspicious incidents by adopting the Philippines’ strategy of total transparency. In contested parts of the South China Sea, where the Chinese Coast Guard and Maritime Militia harass Philippine and other vessels, the Philippine Coast Guard patrols the waters and films each dangerous Chinese activity. At times, the Philippine Coast Guard also invites reporters on board its vessels. This gives the public at home and abroad a better understanding of the dangerous activities transpiring in the South China Sea. A similar strategy could help educate the public about the situation in the Baltic Sea. As in the South China Sea, those involved in dangerous activities in the Baltic Sea are likely to be immune to naming and shaming, but public attention would increase the pressure on them and, at the same time, educate the public about actions their governments might need to take.

About the author

Featured project

Threats to the global maritime order

Learn more about the Atlantic Council’s project Threats to the global maritime order: Protecting the freedom of the seas.

Related content

Explore the program

The Transatlantic Security Initiative aims to reinforce the strong and resilient transatlantic relationship that is prepared to deter and defend, succeed in strategic competition, and harness emerging capabilities to address future threats and opportunities.

1    “Bundesnetzagentur Veröffentlicht Zahlen zur Gasversorgung 2022,” Bundesnetzagentur, January 6, 2023, https://www.bundesnetzagentur.de/SharedDocs/Pressemitteilungen/DE/2023/20230106_RueckblickGasversorgung.html
2    “Certification Procedure for Nord Stream 2 Suspended,” Bundesnetzagentur, November 16, 2021, https://www.bundesnetzagentur.de/SharedDocs/Pressemitteilungen/EN/2021/20211116_NOS2.html
3    Anne Kauranen and Terje Solsvik, “Finland Says ‘Outside Activity’ Likely Damaged Gas Pipeline, Telecoms Cable,” Reuters, October 10, 2023, https://www.reuters.com/markets/commodities/finnish-government-hold-news-conference-suspected-pipeline-leak-media-2023-10-10/
4    “National Bureau of Investigation Has Clarified Technically the Cause of Gas Pipeline Damage,” Police of Finland, October 24, 2023, https://poliisi.fi/en/-/national-bureau-of-investigation-has-clarified-technically-the-cause-of-gas-pipeline-damage
5    Elisabeth Braw, “Suspected Sabotage by a Chinese Vessel in the Baltic Sea Speaks to a Wider Threat,” Atlantic Council, November 21, 2024, https://www.atlanticcouncil.org/blogs/new-atlanticist/suspected-sabotage-by-a-chinese-vessel-in-the-baltic-sea-speaks-to-a-wider-threat/
6    Ibid.
7    Louise Rasmussen, “China Lets Sweden, Finland, Germany and Denmark Board Ship in Cable Breach Case,” Reuters, December 20, 2024, https://www.reuters.com/world/europe/swedish-police-go-board-yi-peng-3-vessel-invitation-china-2024-12-19/
8    Michelle Wiese Bockmann, “Russia-Linked Cable-Cutting Tanker Seized by Finland ‘Was Loaded with Spying Equipment,’” Lloyd’s List, December 27, 2024, https://www.lloydslist.com/LL1151955/Russia-linked-cable-cutting-tanker-seized-by-Finland-was-loaded-with-spying-equipment
9    “Boarding of Eagle S ‘Serious Violation of Maritime Safety,’ Says Master,” Lloyd’s List, August 22, 2025, https://www.lloydslist.com/LL1154601/Boarding-of-Eagle-S-serious-violation-of-maritime-safety-says-master
10    Ibid.
11    Joshua Minchin, “Eagle S Could Have Cut More Cables, Says Finnish Police,” Lloyd’s List, January 14, 2025, https://www.lloydslist.com/LL1152219/Eagle-S-could-have-cut-more-cables-says-Finnish-police
12    Alexander Martin, “Sweden’s Elite Armed Police Used Helicopter to Board Suspected Sabotage Ship,” Record, January 29, 2025, https://therecord.media/sweden-vezhen-ship-armed-police-boarded-helicopter
13    “Misstankar om Sabotage Efter Kabelbrottet Avskrivna—Beslagtagna Fartyget Vezhen Släpps,” SVT Hyheter, February 3, 2025, https://www.svt.se/nyheter/lokalt/blekinge/beslagtagna-fartyget-slapps
14    The countries with Baltic coasts are: Germany, Poland, Sweden, Denmark. Finland, Estonia, Latvia, and Lithuania. In addition, Russia’s Kaliningrad exclave has a Baltic coastline.
15    “The Nord Stream Incident: Open Briefing,” Security Council Report, October 3, 2024, https://www.securitycouncilreport.org/whatsinblue/2024/10/the-nord-stream-incident-open-briefing.php
16    “NATO Stands Up Undersea Infrastructure Coordination Cell,” NATO, February 15, 2023, https://www.nato.int/cps/en/natohq/news_211919.htm
17    Roula Khalaf and Oliver Telling, “Chinese Vessel Spotted Where Baltic Sea Cables Were Severed,” Financial Times, November 19, 2024, https://www.ft.com/content/383516a5-02db-46cf-8caa-a7b26a0a1bb2
18    Elisabeth Braw, “Finland Identifies Pipeline Sabotage Ship,” American Enterprise Institute, October 25, 2023, https://www.aei.org/foreign-and-defense-policy/defense/finland-identifies-pipeline-sabotage-ship/
19    Interview with the author, October 17, 2025.
20    Ibid.
21    “Commander Task Force Baltic Established,” Bundeswehr, October 21, 2024, https://www.bundeswehr.de/en/organization/navy/news/commander-task-force-baltic-established-5850832
22    Interview with the author, October 15, 2025.
23    “NATO Launches ‘Baltic Sentry’ to Increase Critical Infrastructure Security,” NATO, January 14, 2025, https://www.nato.int/cps/en/natohq/news_232122.htm
24    Ibid.
25    Interview with the author, October 17, 2025.
26    “Joint Expeditionary Force Activates UK-Led Reaction System to Track Threats to Undersea Infrastructure and Monitor Russian Shadow Fleet,” Government of the United Kingdom, press release, January 6, 2025, https://www.gov.uk/government/news/joint-expeditionary-force-activates-uk-led-reaction-system-to-track-threats-to-undersea-infrastructure-and-monitor-russian-shadow-fleet
27    Braw, “The Threats Posed by the Global Shadow Fleet—and How to Stop It”; “Top 7 Geopolitical Disruptions in Q3 2025,” Windward, last visited October 28, 2025, https://windward.ai/knowledge-base/top-7-geopolitical-disruptions-q3-2025/
28    “Joint Communication to the European Parliament and the Council: EU Action Plan on Cable Security,” European Commission, February 21, 2025, https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52025JC0009
29    Interview with the author, October 15, 2025.

The post How the Baltic Sea nations have tackled suspicious cable cuts appeared first on Atlantic Council.

]]>
Carbon markets and climate finance for Ukraine’s recovery https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/carbon-markets-and-climate-finance-for-ukraines-recovery/ Wed, 19 Nov 2025 21:45:00 +0000 https://www.atlanticcouncil.org/?p=889238 As COP30 unfolds, learn how Ukraine's experience will influence climate finance mechanisms and drive sustainable recovery efforts.

The post Carbon markets and climate finance for Ukraine’s recovery appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Amid full-scale war, Ukraine is emerging as a laboratory for innovative finance, testing climate finance solutions—such as Article 6 of the Paris Agreement—as a way to channel finance directly into reconstruction projects.
  • A proposed “solidarity credits” framework, using the funding pool of a Green Recovery Fund and supported by a first-loss guarantee facility, could de-risk private investment and unlock concessional finance for Ukraine’s recovery.
  • By linking carbon integrity with human security, Ukraine can show how carbon markets can drive resilient development in fragile or transitioning economies, from solar roofs on hospitals to reforestation, setting a model for countries aligning climate action with security and inclusive growth.

As COP30 convenes in Belém, the first UN Climate Conference hosted in the Amazon and a symbolic turning point for global climate solidarity, the question before negotiators is not only how to scale climate ambition, but how to ensure it delivers on Nationally Determined Contributions (NDCs) finance for countries’ sustainable economic development. Ukraine’s recovery stands as one of the clearest tests of whether climate finance can function under conditions of war. Article 6, finalized last year in Baku, now enters its implementation phase; Ukraine’s experience could define how these mechanisms evolve.

The challenge of financing reconstruction in Ukraine is massive. Russia’s full-scale invasion has inflicted more than $176 billion in direct damage and over $589 billion in economic losses across Ukraine, which is nearly three times the country’s pre-war gross domestic product (GDP). The destruction is systemic, with the metals sector reducing steel production by almost 71 percent after several leading plants were destroyed or occupied. Millions of acres of farmland are unusable due to occupation or contamination from over two million landmines, making it the most heavily mined country in the world. Natural reserves such as Sviati Hory have lost thousands of hectares of forest and wetland ecosystems to fires and contamination. The energy sector ranks among the most heavily affected, with up to 93 percent of damaged or destroyed assets across power generation, transmission, and distribution infrastructure since the start of Russia’s full-scale invasion. As of December 2024, the sector’s recovery and modernization needs are estimated at $67.78 billion, including $53.7 billion to rebuild power generation on green transition principles aligned with EU climate and energy goals. The Ukrainian regions facing the highest reconstruction needs—Zaporizhzhia, Kharkiv, Dnipropetrovsk, Donetsk, Odesa, and Sumy oblasts—are industrial hubs and front-line territories.

Despite the scale of destruction, Ukraine’s recovery offers an opportunity for transformation. The country can not only rebuild what was lost, but also redesign its economy and infrastructure on resilient, sustainable, and future-ready foundations. Guided by the Build Back Better principle, endorsed by President Volodymyr Zelenskyy and supported by international partners, Ukraine aims to reconstruct using higher-quality, advanced, and sustainable technologies, aligning recovery with the EU’s Green Transition and Digital Transformation agendas. 

If realized, this vision could radically reshape Ukraine’s economic landscape by mid-century. The economic dividends would be substantial: lower import bills, improved trade balance, and thousands of skilled jobs in engineering, manufacturing, and local services. Breaking its historic dependence on imported fossil fuels, once 70 percent of Ukraine’s energy mix, Ukraine could become nearly self-sufficient in primary energy. New value chains in clean technologies, sustainable construction materials, and bio-based industries would drive regional growth and anchor long-term industrial modernization.

As Ukraine aligns its recovery strategy with the EU Green Deal, one of the most pressing challenges will be balancing industrial revival with the obligations stemming from the EU’s Carbon Border Adjustment Mechanism (CBAM). Exemption from CBAM may be politically feasible in the short term, but in the long run, Ukraine’s competitiveness will depend on achieving genuine emissions reductions across energy-intensive sectors. Carbon finance under Article 6 could be instrumental in this process—directing investment toward low-carbon steel, cement, and fertilizer production, speeding the transition away from coal and gas, and helping Ukraine move toward alignment with the EU’s carbon pricing and reporting systems.

Yet the challenge is immense. Achieving this transformation will require annual investment around $35 billion across energy, industry, transport, and buildings, including $11 billion each year in renewable generation and grid infrastructure. Ukraine’s $524 billion reconstruction need is therefore more than rebuilding physical assets; it is a test of financial credibility, investor confidence, and political will. In defending Ukraine against Russia’s unlawful aggression—a threat not only to Ukrainian sovereignty but to the shared interests and security of its allies—Western countries have already demonstrated significant political will, mobilizing over $454 billion in military, financial, and humanitarian aid since 2022. The same resolve now needs to power a new framework for climate-aligned reconstruction, where solidarity is measured not just in aid, but in investment, innovation, and shared security. 

The scale of Ukraine’s reconstruction is daunting, yet existing international frameworks currently being discussed at COP30 could potentially help mobilize the necessary capital. Can COP leaders leverage the framework of Article 6 of the Paris Agreement to bring reconstruction finance to Ukraine?

Article 6 as a bridge to climate, development, and green recovery finance

Article 6 of the Paris Agreement enables the trade of emission reductions and removals units as “internationally transferred mitigation outcomes” (ITMOs)—equal to 1 ton of CO2 counted toward the country’s climate targets. In practice, a government or company can fund verified climate action abroad, and count the resulting emissions reduction toward its own NDC, or use them for corporate or investment needs. 

If implemented at scale, Article 6 can become a channel for financing Ukraine’s reconstruction and green transition. Reimagined as a mechanism for countries to further demonstrate their unwavering support for Ukraine, Article 6 ITMOs could be redefined as “solidarity credits,” verified units of climate finance directed to Ukraine’s reconstruction. These credits would support grid restoration, renewable-energy deployment, and institutional capacity building, while following Article 6’s framework and maintaining its integrity and transparency requirements.The governments of the United Kingdom, the EU, and Ukraine could take the lead in testing this approach through bilateral agreements under Article 6. The initiative would pilot a new class of “solidarity credits” that uphold Article 6’s integrity rules while extending its application to post-conflict reconstruction. These credits would enable partner countries to channel verifiable climate finance (or results-based finance) into Ukraine’s recovery, supporting projects such as clean energy. Then, the supporting government could either claim these credits or let the private sector buy or invest in them, thus providing climate finance and advancing global decarbonization goals. Because these are authorized under the Paris Agreement, there is no risk of double-counting. Companies can retire these ITMO units to support high-integrity corporate climate claims, bolstering their climate accountability and transition plans while channeling capital into Ukraine’s recovery.

Current endeavors

Last year’s package agreed at COP29 in Baku effectively finalized the core rulebook for Article 6. In practice, this means that the Paris Agreement architecture for issuing and trading ITMOS under Article 6.2 and under Article 6.4 is now sufficiently clear for countries to move from design to delivery. Early movers, including Switzerland, Honduras, Suriname and Japan, have begun translating these rules into real national programs and project transactions, showing what the Article 6 implementation actually looks like.

That shift, however, has also underscored how complex and demanding Article 6 is to implement effectively. The framework builds on the Kyoto Protocol’s clean development and joint implementation mechanisms, retaining their focus on transparent governance, environmental integrity, and contributions to sustainable development while introducing stricter safeguards and transparency, and stronger alignment with national climate targets. Implementing this framework requires robust national systems, including clear authorization procedures, reliable monitoring, reporting and verification, and registries capable of tracking units from issuance to final use. Many countries are now developing and implementing these systems, and while progress is evident, it remains uneven across jurisdictions.

For the moment, international transfers of ITMOs remain modest in volume, but some countries, such as Honduras and Suriname have signed MoUs to trade large volumes with large banks and companies. Limited adoption is not a failure of the concept so much as a reflection of both the infancy of this new market and the work needed to align domestic institutions, data systems, and project pipelines with these new Article 6 rules and regulations. As more countries complete those building blocks and capital liquidity enters this market, a steady scale-up is inevitable.

Designing a new financial architecture

Implementing Article 6 to enable Ukraine’s reconstruction will be a test of financial ingenuity, with clear policy signals, proving that climate finance can operate even under extreme conditions of risk and instability, such as war.

The framework suggested by the Oxford Roadmap to Net-Zero Aligned Carbon Market Regulation, which is widely referenced as setting a gold-standard approach in carbon finance investment-grade, defines six pillars: efficient financing, net-zero alignment, ecosystem integrity, equitable outcomes, enforcement, and usability. These principles can support a de-risked Article 6 architecture, one that embeds high-integrity standards within Ukraine’s reconstruction finance. Applied to Ukraine, they suggest a model where carbon revenues complement grants and concessional lending. Even a modest stream of credits could channel between $2 billion and $3 billion annually into verified renewable and grid-resilience projects, roughly 5 percent of Ukraine’s annual recovery needs.

Translating these principles into practice requires a concrete governance model. Integrity and traceability are the bridge between abstract standards and operational finance. Each Article 6 credit should therefore carry verifiable metadata—satellite monitoring, reporting, and verification; third-party audits; and tangible co-benefits such as megawatts restored, hospitals powered, jobs created, or tons of diesel displaced.

Why now?

The UK and EU are uniquely positioned to partner with Ukraine on carbon finance. London retains diplomatic credibility on climate policy and has been among Ukraine’s staunchest allies since 2022. Its management of the International Climate Finance (ICF) portfolio and commitment to high-integrity carbon markets form a solid foundation, reinforced by the 2025 UK–Ukraine 100-Year Partnership Memorandum.

The EU, on November 5, 2025, approved a 90 percent emissions reduction target for 2040, allowing member states to use Article 6 international carbon credits for up to 5 percent of their emissions. This would allow and incentivize any EU member countries, companies, and investors to invest in Ukraine and use those Article 6 carbon credits for their emissions reduction purposes.

On October 29, 2025, the second NDC of Ukraine to the Paris Agreement was approved by resolution of the Cabinet of Ministers of Ukraine and published on the UNFCCC website during COP30. This sends a strong political signal and shows a clear determination by Ukraine to grow its economy sustainably. Ukraine aims to reduce its greenhouse gas emissions in 2035 by more than 65 percent from 1990 levels. Furthermore, Ukraine intends to continue participating in market mechanisms under Article 6 of the Paris Agreement as a party on whose territory projects under Article 6 of the Paris Agreement are implemented. 

By participating in cooperative approaches, under Article 6, Ukraine will comply with the rules and guidelines in accordance with the decisions of the Paris Agreement to ensure proper accounting, environmental integrity, transparency, and avoidance of double counting. 

A proposed bilateral Article 6 framework could consist of three pillars:

  1. Solidarity credits: The UK and the EU would contribute approximately £200 million ($263.4 million) to a Ukraine Green Recovery Fund. This fund would finance projects such as grid reconstruction, solar energy initiatives, and energy efficiency upgrades. The resulting ITMOs would be transferred to the UK but explicitly not used to meet its NDCs. Instead, they would function as either “solidarity credits,” or sold to businesses and the capital markets, thus strengthening business cooperation and bringing symbolic political value.
  2. Guarantee facility for risk mitigation: Utilizing UK-backed concessional finance, a first-loss guarantee facility would reduce investment risk for private developers. This guarantee would cover partial losses if a project is destroyed or interrupted by conflict, thereby lowering Ukraine’s perceived country risk.
  3. Pilot “green corridors” with transparent monitoring, reporting, and verification. Two to three green corridors, for example, around Kyiv, Vinnytsia, and Dnipro, could serve as regional reconstruction zones integrating distributed renewable energy and upgraded transmission infrastructure within international carbon-market frameworks, including the Paris Agreement Crediting Mechanisms.

For quick and lasting impact, Ukraine should prioritize projects where carbon finance meets human security:

  • Distributed renewables on schools, hospitals, and administrative buildings—Ukraine’s rooftop photovoltaic potential exceeds 238.8 gigawatts, alongside distributed storage. Ukrainian firms such as KNESS have already deployed over 100 megawatt-hour of battery capacity. For example, retrofitting municipal hospitals in Chernihiv oblast with rooftop solar systems could unlock concessional financing backed by a UK guarantee covering 20 percent of potential losses, thereby reducing the cost of capital from 12 percent to 7 percent.
  • Energy-efficiency retrofits could cut heating demand by 50 percent and 60 percent since almost 80 percent of the housing stock in Ukraine is considered energy inefficient, with the bulk constructed between the 1960s and 1980s.
  • Circular-economy and low-carbon materials for reconstruction can cut emissions and reduce import dependency. Ukraine’s biomethane potential, estimated at 9.7 billion cubic meters annually, offers a strategic opportunity to replace fossil natural gas in heating, industry, and transport.
  • Nature-based solutions should be a priority in both ecological and urban recovery. With more than ten million hectares of degraded land, Ukraine could pilot high-integrity restoration projects under Article 5—from reforestation to green urban renewal in heavily affected cities such as Chernihiv and Mykolaiv.

These activities would diversify Ukraine’s mitigation portfolio and embed climate resilience in its recovery model.

Restoring trust through carbon finance cooperation

By linking emission reductions and removals to real reconstruction outcomes, Ukraine can turn climate cooperation into a driver of national renewal, and the COP process can become the beginning of this road for Ukraine. A transparent, high-integrity carbon market would show that climate action can restore energy generation capacities, reforest bombed landscapes, and reconnect communities. 

In this sense, Ukraine’s carbon market could become a prototype for conflict-affected economies worldwide, where climate policy and recovery policy converge, and where the currency of carbon is measured not only in tons of CO₂ but in megawatts restored, hectares rehabilitated, and lives rebuilt. 

about the authors

Ievgeniia Kopytsia is a legal scholar and policy expert with more than ten years of experience advancing climate and environmental governance across Ukraine, the EU, and international institutions. She specializes in climate and energy law, post-conflict reconstruction, and the legal alignment of Ukraine with European and global standards for a green transition.  As a national legal expert, Kopytsia has provided legislative assessments, policy advice, and project leadership on the implementation of environmental and climate laws, including supporting Ukraine’s climate policy reforms and green recovery initiatives. She is a frequent contributor to international conferences and working groups, focusing on the intersection of environmental law, conflict resilience, and sustainable development within the Euro-Atlantic community.

Darka Harnyk is the director of the Energy Security Marshall Plan for Ukraine at EOPA, where she works with Ukraine’s Ministry of Economy, Ministry of Environment, and international partners to develop financing mechanisms for post-war green reconstruction. Her work focuses on Article 6 climate cooperation, war-risk de-risking, and critical raw materials. Before transitioning into reconstruction and climate finance, Harnyk worked in the tech sector at Unity Technologies and later earned a degree in environmental science and policy from Columbia University.

stay connected

Sign up for PowerPlay, the Atlantic Council’s bimonthly newsletter keeping you up to date on all facets of the energy transition

related content

explore the program

The Global Energy Center develops and promotes pragmatic and nonpartisan policy solutions designed to advance global energy security, enhance economic opportunity, and accelerate pathways to net-zero emissions.

The post Carbon markets and climate finance for Ukraine’s recovery appeared first on Atlantic Council.

]]>
Biometrics and digital identity in Africa https://www.atlanticcouncil.org/in-depth-research-reports/report/biometrics-and-digital-identity-in-africa/ Wed, 19 Nov 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=888771 Biometrics have become deeply embedded in Africa’s political, social, and economic landscape. 

The post Biometrics and digital identity in Africa appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Forty-nine African countries now operate biometric systems, with foreign vendors dominating a market that controls the continent’s most sensitive identity infrastructure.
  • An estimated half a billion Africans lack identity documents, driving governments to deploy biometric systems rapidly. Still, weak governance frameworks often mean these technologies exclude the very populations they’re intended to serve.
  • From Uganda’s Ndaga Muntu to Kenya’s Huduma Namba, biometric deployments across Africa face common challenges: data breaches, corruption in enrollment processes, exclusion of elderly citizens, and the use of facial recognition to monitor political dissent.

Executive summary

The rapid adoption of biometric and digital identification systems is transforming governance and public administration across Africa. Promoted as tools to modernize service delivery, enhance electoral integrity, and strengthen state capacity, these systems are becoming central to how identity and citizenship are managed. From national identification schemes and voter registration to border management and SIM card registration, biometrics have become deeply embedded in Africa’s political, social, and economic landscape. 

However, this technological expansion comes with profound risks. Weak legal frameworks, limited oversight, and a growing reliance on foreign vendors have created an ecosystem vulnerable to privacy breaches, state surveillance, and systemic exclusion. Biometric systems increasingly integrate electoral and civil identity data, giving governments vast surveillance capabilities while disenfranchising marginalized groups such as rural communities, migrants, and individuals without foundational IDs. 

The report explores the main use cases driving biometrics and digital identification systems in Africa, focusing on their governance, vendor dynamics, and human rights impacts. Key areas include national identification and civil registration, which provide the foundation for legal identity and access to services; immigration management; elections, where they strengthen voter registration and authentication; and smart city initiatives, which leverage digital IDs for efficient service delivery and urban governance. 

The research reveals that foreign technology firms dominate Africa’s biometric ecosystem; that forty-nine African countries have at least one form of biometric system; and thirty-five out of the fifty-four countries on the continent use biometrics in their election processes. Companies such as Idemia (France), Semlex (Belgium), Veridos (Germany), Thales (France), and Huawei (China) provide the core technology, hardware, and algorithms that underpin these systems. African governments often finance these projects through loans from international institutions like the World Bank, creating dependencies that shape procurement and governance practices. 

While biometric systems are often introduced to improve electoral processes and service delivery, their fragmented rollout forces citizens to repeatedly submit sensitive data across multiple platforms, increasing costs and risk of fraud. Many projects lack transparency, with procurement processes shielded under the guise of national security. Public knowledge of these systems remains low: a sample study in three countries by ICT Works found that only 38 percent of surveyed citizens were aware of their governments’ purchases of biometric, facial recognition, or AI systems, highlighting a significant transparency gap. 

To mitigate these risks, the report offers seven key policy recommendations: 

  1. Strengthening independent oversight bodies free from political interference; 
  2. Enacting comprehensive data protection laws covering the full life cycle of biometric data; 
  3. Ensuring transparent, participatory deployment processes; Integrating human rights due diligence into all projects; 
  4. Establishing continuous oversight and remedies for rights violations; 
  5. Protecting electoral integrity and preventing the over-integration of ID systems; 
  6. Embedding a rights-based governance model rooted in privacy, equality, and non-discrimination. 

The findings underscore that biometric and digital identity systems must not be viewed merely as technical tools for modernization. They are inherently political, with the potential to either strengthen democratic governance or entrench authoritarian control. Without robust reforms, these systems risk becoming instruments of exclusion and surveillance rather than empowerment. 

read the full report

About the authors

Sani Suleiman Sani is a policy and research strategist shaping continental dialogue on digital rights, technology governance, and inclusive innovation in Africa. He leads the research portfolio at Paradigm Initiative, where he oversees multi-country studies that inform legislative processes, corporate accountability, and global debates on digital policy.

Thobekile Matimbe is a human rights lawyer and Senior Manager Partnerships and Engagements at Paradigm Initiative (PIN) where she dedicates her skills to the advancement of digital rights and inclusion in Africa and beyond.

Kenton Thibaut is a senior resident China fellow at the Atlantic Council’s Digital Forensic Research Lab (DFRLab), where she leads China programming for the Democracy + Tech Initiative, and a resident senior fellow at the Atlantic Council’s Indo-Pacific Security Initiative (IPSI) at the Scowcroft Center for Strategy and Security.

 Iria Puyosa is a senior research fellow at the Atlantic Council’s Democracy+Tech Initiative. She specializes in the complex interplay between technology and political dynamics. 

Acknowledgements

This report was made possible with support from the Embassy of Denmark in the United States. The Digital Forensic Research Lab (DFRLab) would also like to thank the Paradigm Initiative for contributing writing and research.

related content

Explore the programs

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

The Democracy + Tech Initiative creates policy practices that align global stakeholders toward tech and governance that reinforces, rather than undermines, open societies. It builds on the DFRLab’s established track record and leadership in the open-source field, empowering global communities to promote transparency and accountability online and around the world.

The post Biometrics and digital identity in Africa appeared first on Atlantic Council.

]]>
Why Ankara’s rising power in the Sahel could benefit the West https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/why-ankaras-rising-power-in-the-sahel-could-benefit-the-west/ Wed, 19 Nov 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=888402 Turkey offers a rare channel in the Sahel that the West could use to recalibrate its approach to the region.

The post Why Ankara’s rising power in the Sahel could benefit the West appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Arms and infrastructure deals have steadily bolstered Turkey’s standing as a reliable partner in the Sahel, where coups disrupted French and US roles.
  • Turkey’s “solution-based” diplomacy contrasts sharply with Russia’s security-first playbook in Africa, yet they operate in parallel rather than competing in the countries with military juntas.
  • Ankara must decide whether to align more openly with Russia in the Sahel or mediate and potentially counter Russian influence, potentially coordinating with the West on security strategy.

As the US role in the Sahel is weakening, Turkey’s role is rising. With new defense agreements, increasing diplomatic engagements, and joint economic development projects with new, junta governments that espouse anti-colonial rhetoric in Burkina Faso, Mali, and Niger, Turkey finds itself working in the same theater as the Kremlin to fill the void left after Western forces departed. Turkey’s new trusted status among Sahelian governments and its state-led approach make it one of the nations positioned to influence regional security dynamics during a time when other Western powers are constrained. Although Turkish efforts in the Sahel have been primarily based on its own strategic ambitions and national interests, Ankara’s growing influence offers a rare channel through which the United States and its allies could recalibrate their approaches to the region. 

The Sahel’s break with the West 

Since these coups and the establishment of military juntas in Mali, Niger, and Burkina Faso, France and the United States have faced the annulment of defense agreements in the region, French and US troops have withdrawn from the region, the European Union’s Takuba Force ceased anti-Jihadist operations in Mali, and, in January, Niger revoked a counterterrorism accord with the United States, demanding the withdrawal of 1,000 US troops from the country. The United States has laws that prohibit it from assisting governments that have overthrown democratic governments, including clear guidance from the US State Department against foreign assistance to Niger, and now Washington finds itself without a clear role in the Sahel.

The region’s Western-backed security architecture has collapsed: Three withdrawals (i.e., Mali, Burkina Faso, and Niger) prompted the dissolution of the Group of Five (G5) for the Sahel. The same three departures from the Economic Community of West African States (ECOWAS) has left the Sahel searching for new patrons and new strategic frameworks. Mali, Burkina Faso, and Niger, for example, have formed the Alliance of Sahel States (AES), a political and defense bloc that rejects old alignments. To fill the new defense void, alternative partners without the baggage of colonial legacy—most notably Russia and Turkey—have stepped in, offering defense cooperation without the governance conditions demanded by the West. 

The United States, which provided humanitarian aid, economic investment, and security forces to the region for roughly a decade prior to the coups, lost much of its ability to advance regional security interests when it was pushed out of the region. Its ability to monitor threats in the region and in neighboring countries like Libya, coordinate strategies with local forces, and access crucial intelligence was significantly degraded. Although US security operations in the region have been constrained by new partnerships, it still has options. Opportunities remain through indirect engagement—particularly with actors that retain both credibility on the ground and diplomatic standing in the West. Turkey is one of the only powers operating in the Sahel that meets both criteria.

Turkey’s role amid a shrinking Western presence, rising Russian influence

Turkey’s military cooperation in the Sahel draws on nearly two decades of experience positioning itself as a rising power in Africa, rooted in its 2003 ​​​​Strategic Depth​ doctrine and early initiatives like the “Strategy for the Development of Economic Relations with Africa” and the “year of Africa” in 2005—the same year it secured observer status in the African Union. Initially, Turkey relied on soft power, leveraging shared Ottoman heritage, cultural diplomacy, and economic partnerships to expand its influence. However, what began as a soft-power push—through development aid, cultural ties, and embassy openings—has evolved into a defense and infrastructure strategy, especially under President Recep Tayyip Erdoğan’s aim to position Turkey as a leader among emerging powers. Turkish delegations have conducted regular visits to AES capitals, striking arms and infrastructure deals while pursuing bilateral military agreements.  

At the same time, Russia, too, has made swift inroads. It is capitalizing on anti-colonial sentiment and offering support through its largest private military company, the Wagner Group, to provide “training, close protection, and counter-terrorism operations.” Through proxy forces, Russia has gained access to political influence and resource extraction in exchange for security-force training, arms deals, and protection of junta leaders. Russia’s use of proxy forces has allowed it to distance itself from Russian casualties and military failures. 

However, Russia’s war in Ukraine has slowed its operations in the Sahel. Across AES, Russian forces are stretched thin. Despite Russia’s success in stabilizing the Touadéra regime in the Central African Republic in 2021—a conflict that gave Russia defense legitimacy despite the fact that Sahel—Russian forces have largely been unsuccessful. In 2024, fifty-one percent of global terrorism-related deaths took place in the Sahel. This was the deadliest year in the Sahel’s history as the region remains mired in conflict and plagued by violent insurgencies, fragile state institutions, and waning international engagement. 

​​​​In the Sahel, Turkey can play the same role as Russia. Turkey can offer Sahelian militaries affordable, “rapidly deployable” equipment. And Russia, which has been struggling to keep up with military-industrial demands, is an increasingly unreliable partner. Sahelian clients grew more discontented with the Russian proxy forces’ unsuccessful operations and inability to fulfill weapons contracts, and the Wagner Group officially left Mali, announcing on Telegram that its mission was accomplished. In its place, Russia plans to consolidate its troops under the Russian Ministry of Defens​​​​e-backed Africa Corps. Reestablishing connections, building trust, and establishing higher capacity supply lines will take time; meanwhile, alternative partners like Turkey are in place in the Sahel and can take advantage of the Kremlin’s declining foreign-operations capacity. 

In contrast to Russia’s focus on mercenary deployments and ​​​​direct-combat missions, Turkey offers a more varied tool​ ​kit: combining diplomacy, state-to-state defense deals, economic engagement, intelligence sharing, and technology transfers. Turkey’s defense industry, particularly its drone sector, made early moves into the African market, supplying low-cost, high-capability platforms like Baykar’s Bayraktar TB2 and Akinci drones. These have become cornerstones of AES air power, and are ​​​​​often more cost-effective​ than systems from Iran, Israel, or even Russia. 

Turkey is now the main producer of combat drones for Africa, according to the Africa Center for Strategic Studies (part of the US Department of Defense). In December 2024 Mali received Turkish Akinci drones in addition to its eight TB2 drones; Niger has purchased six TB2 drones, five Karayel-SU drones, and Aksungur drones; and Burkina Faso has purchased at least six TB2s and two Turkish Akinci drones. These drones are managed and operated out of local airbases, like the Niamey air base in Niger or the Bamako Air Base 101 in Mali, and are managed by a “hyper-closed circle” of high-ranking officials. In early April 2025, Mali was also found to be using MAM-T bombs 20 kilometers from its border with Algeria when a Turkish-made Akinci drone was shot down. This was the first time the Malian armed forces were found to be using MAM-T bombs, which are guided, high-explosive fragmentation munitions that can be strapped to Bayrak drones, and are manufactured by Turkish company Roketsan

On the ground, Turkey’s engagement increasingly makes up for declining Russian power. Turkish drones and, ​​​​​​reportedly, Turkish-hired Syrian mercenaries disrupt insurgent operations in areas where state forces are absent, helping to alleviate local manpower shortages. ​​​​​Although unconfirmed, Sadat, a private Turkish military contractor often referred to as Erdogan’s “parallel army,” was alleged to have sent more than one thousand Turkish-trained Syrian mercenaries to Niger and Burkina Faso in 2024, ​​​​tasked with protecting mines, petroleum infrastructure, and military installations​. This is not the ​​first time​​ Sadat has been accused of using Syrian ​​mercenaries​​ in foreign conflicts.

Already, Turkey has increased intelligence-sharing capabilities in the region through its intelligence agency, Milli İstihbarat Teşkilatı, which recently opened a hub in Niger. Its growing network​ of embassies, companies, and security personnel across the Sahel gives Ankara access to critical information, which can influence security operations.

Turkey’s economic expansion in the Sahel

Turkey has slowly expanded its influence in the Sahel by expanding its security operations simultaneously with its commercial agreements. 

While the AES has implicitly distanced itself from former colonial powers through new security partnerships and arms contracts, the three states are also turning to alternative partners for economic support. They had perceived prior Western economic conditions as unfair and are seeking more beneficial economic relationships. After revoking mining licenses and pulling out of economic partnerships with the West, the Sahel now needs new partners to help develop its potentially lucrative energy and raw materials sectors.  

Since the 2010s, Turkey has increasingly engaged with Africa’s energy sector, leveraging its 2017 National Energy and Mining Policy to enhance its energy independence. It has signed agreements with at least seventeen African countries across North, West, and East Africa, as well as the Horn of Africa, focusing on renewables and critical minerals. Trade volumes between Turkey and Africa increased from ​​​​$5.4 billion in 2003 to $40.7 billion in 2022, and a ​​​​growing number of Turkish companies are expanding their operations in Africa. 

Turkey now has greater reason to diversify its imports away from Russia and Iran— given the disruption of trade patterns by conflicts in Ukraine, the Mediterranean, and the Middle East—and toward Africa. The Sahel’s underdeveloped energy sector offers Turkey a foothold in new supply routes and economic opportunities.  

A Turkish energy company has taken a leading role in Mali, supplying 60 megawatts of power and building a heavy fuel oil power plant. Turkish exports to Mali rose from $87 million in 2021 to $111 million in 2023. Similarly, Turkey has boosted trade with Burkina Faso, despite regulatory hurdles in the mining sector. Exports rose from less than $100 million prior to 2020 to $166 million in 2024, reflecting Ankara’s deeper economic engagement with the new military government. 

In the Sahel region, Niger has traditionally been Turkey’s strongest energy partner in the region. Turkey and Niger have signed bilateral mining agreements and oil and natural gas agreements, established a working committee​ to expand economic cooperation, and held leadership-level discussions about infrastructure development projects​ in northern Niger. Turkish firms have been uniquely willing to engage in high-volatility regions, implementing critical infrastructure, energy, and mining projects simultaneously with increased defense cooperation. 

The Sahel’s mineral wealth is critical to Turkey’s industrial ambitions and plans to become a processing hub for critical minerals. Turkey’s defense industry depends heavily on critical minerals used in advanced weaponry, aerospace systems, and batteries and, at the same time, Turkey’s rising clean technology industry has accelerated the need for lithium, nickel, copper, and other raw minerals. While Turkey is beginning to build up its raw mineral processing capabilities in an attempt to limit foreign control over critical supply chains, Ankara is in search of suppliers for these materials.  

With limited domestic reserves and rising industrial needs, Ankara is targeting the region’s large supplies of raw materials. Mali is Africa’s second-largest lithium producer; Niger is a leading exporter of uranium; and Burkina Faso is a major gold supplier. Though Turkey has domestic reserves of tungsten, graphite, and cobalt, access to the Sahel’s minerals enables Turkey to compete in global markets and develop its own processing base. 

Through diplomatic and corporate efforts, Turkey has tried to secure access to gold and uranium in Niger, the world’s seventh-largest producer of uranium; Turkish and Azerbaijani companies have discussed joint mining projects in the Sahel; and, until recently, a Turkish company held the industrial exploitation rights of the largest gold mine and the largest manganese mine in Burkina Faso. Russian companies have likewise expanded their economic presence in the Sahel; Russian companies ​​​​have signed lithium mining deals with Mali, lithium and uranium mining deals with Niger, and deals on nuclear cooperation with Burkina Faso. While Western companies have been sidelined, governments in the Sahel remain open to cooperation with both Ankara and Moscow. Turkey, as a NATO ally that retains the political space to operate in these markets, is a potential counterbalance to Russia’s growing influence while advancing its own strategic and industrial objectives.

Solution-based diplomacy in a security-first landscape

What sets Turkey apart from other external actors—especially Russia—is the diversity of its engagement. Unlike Moscow’s arms-for-access model, which is often viewed as exploitative and destabilizing, Ankara has prioritized a ​​​​multifaceted approach that includes trade, infrastructure, defense, diplomacy, and development. Turkish-African trade spans sectors from textiles to healthcare and energy, and Turkey’s public and private sectors have actively invested in education and capacity building across the continent. This “solution-based” diplomacy contrasts sharply with Russia’s security-first playbook. 

Yet Turkey’s growing presence in contested regions comes with risks. Infrastructure investments in unstable political environments require security guarantees—and that often means greater military involvement. As Ankara deepens its footprint, it must decide whether to align more openly with Russia, or to use its position to mediate and potentially counter Russian influence. 

Turkey is viewed by many African leaders as a reliable, noncolonial partner. This gives Ankara access that Western powers now lack. While Turkey has not publicly aligned with US or European policy in the Sahel, its access and credibility in the region offer an opportunity to bridge the growing gap between Western interests and Sahelian realities. 

If Ankara chooses to leverage this position, it could quietly support Western objectives—sharing intelligence, coordinating security policies, or shaping development strategies that undercut Russian influence. Turkey would not be acting as a Western proxy, but as a sovereign actor leveraging its credibility and access to serve both its own interests and those of the broader international order. In a region where Western engagement is rapidly shrinking, Turkey’s role may become indispensable—not as a rival, but as a crucial partner.

Not a proxy but a pathway: The West’s reentry point in the Sahel

The power balance between Russia and Turkey is markedly different from conflict zones where they stood or stand on opposite sides—such as Syria, Libya, Ukraine, and the Azerbaijan-Armenia conflict. In the Sahel, both powers are engaging the same postcoup regimes—Russia through mercenary-led counterinsurgency and Turkey through state-led arms deals, drone operations, and economic development. They are not in direct confrontation in the Sahel, nor are they locked in zero-sum competition. Instead, they operate in parallel, often in the same theaters and with the same governments, but with divergent methods, capabilities, and long-term goals. 

Parallel engagement between Russia and Turkey raises security concerns for Western powers who have lost their influence in the region, but it also creates a unique opening. While Russian security forces have been largely unsuccessful in their efforts to mitigate threats in the Sahel, Turkey has an opportunity to increase its engagement with local forces. And as the only Western partner force that is directly engaging with the region, Ankara can potentially disrupt Russian influence and coordinate with the West on security strategy. Its access to critical mineral assets, defense infrastructure, and high-level political relationships across the AES bloc can offer the West indirect access to a region from which it has been largely expelled. 

Since President Donald Trump returned to office at the beginning of 2025, both Washington and Ankara have shown renewed willingness to deepen their bilateral partnership on regional matters and cooperate in third countries, most notably Syria. In addition to diplomacy, including Foreign Minister Hakan Fidan and Secretary of State Marco Rubio meeting in Washington and Brussels, both capitals have continued demonstrating top-level cooperation on Syria with the trilateral gathering in Riyadh, where Trump and Erdoğan met with Syrian President Ahmed al-Sharaa, together with the creation of the joint Syria Working Group to further enhance closer cooperation on Syria’s reconstruction and stability efforts. This dynamism and strategic alignment can be a strong foundation for extending the US-Turkey partnership into Africa, where shared interests in stability and security could help reshape the dynamics of great​-​power competition in the region. 

Turkey’s pragmatic foreign policy is not without complications. But in the Sahel, that very pragmatism can work to the West’s advantage. If Washington moves beyond its reflexive skepticism and recognizes Turkey’s intermediary potential, the Sahel could shift from a symbol of Western retreat to a frontier of renewed influence—anchored by a partner that understands and navigates both the streets of Niamey and the corridors of NATO.

About the authors

Alp Burak Ozen is a program assistant at the Atlantic Council Turkey Program.

Haley Nelson is a Boren Scholar and a Georgetown University alumna. She is an independent geopolitical consultant with a focus on energy and infrastructure security in Eastern Europe, Central Asia, and Turkey.

related content

explore the program

The Atlantic Council Turkey Program aims to promote and strengthen transatlantic engagement with the region by providing a high-level forum and pursuing programming to address the most important issues on energy, economics, security, and defense.

The post Why Ankara’s rising power in the Sahel could benefit the West appeared first on Atlantic Council.

]]>
Why modernizing CAFTA-DR matters for the United States, and options for updating the trade pact https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/why-modernizing-cafta-dr-matters-for-the-united-states-and-options-for-updating-the-trade-pact/ Wed, 19 Nov 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=888568 Central America and the Dominican Republic are emerging as key partners for US economic security. The United States has a unique opportunity to reform its free trade agreement with the region—CAFTA-DR—to strengthen these ties.

The post Why modernizing CAFTA-DR matters for the United States, and options for updating the trade pact appeared first on Atlantic Council.

]]>

Bottom lines up front

  • The United States’ free trade agreement with Central America and the Dominican Republic needs updating to address digital trade, labor standards, and supply-chain rules that have evolved since it took effect in 2005.
  • Modernizing CAFTA-DR will strengthen US economic security by countering China’s influence and reducing migration pressures.
  • Three paths forward exist: full USMCA accession for CAFTA-DR members; replacing the group agreement with bespoke bilateral deals; or targeted updates to specific chapters of the original agreement.

As the US government reconsiders its trade architecture, as well as its trade network in the Western Hemisphere, updating the Central America–Dominican Republic Free Trade Agreement (CAFTA-DR) should be viewed not as a simple economic exercise, but as a strategic investment in US economic security and competitiveness. An upgraded CAFTA-DR could reinforce regional stability at a time when economic fragility, migration pressures, and external influence are converging in the United States’ near abroad.

Aligning CAFTA-DR’s standards with the more modern United States–Mexico–Canada Agreement (USMCA) framework—for example, on digital trade, labor, and supply-chain governance—would create a more coherent North American–Central American production corridor serving US industries, reducing dependence on distant suppliers, and supporting a more orderly regional economy.

China’s expanding presence in Central America and the Caribbean, via critical infrastructure investments, technology partnerships, and growing trade links, has altered regional dynamics and tried to dilute US influence. Modernizing CAFTA-DR is therefore not just an economic update; it is a geopolitical must-have to both secure supply chains and keep key trade partners aligned with the United States.

An updated CAFTA-DR could strengthen supply chain resilience by encouraging the strategic relocation of certain US light and more-labor-intensive manufacturing and by diversifying away from China-dependent networks. It would also enhance digital trade rules, environmental standards, and labor protections, all central issues on today’s economic security agenda. By refreshing these commitments, the United States could help its partners attract high-value investment, foster inclusive growth, and reduce migration pressures fueled by economic fragility.

Moreover, modernization would reaffirm Washington’s long-term commitment to shared prosperity and democratic governance. A proactive US agenda, anchored in fair trade, sustainable investment, and transparent governance, could offer a compelling alternative to China’s transactional and opaque financial approach. In short, an updated CAFTA-DR represents a strategic tool for deepening US partnerships, defending economic values, and reinforcing the hemisphere’s autonomy at a time when geopolitical competition is intensifying.

About the authors

Enrique Millán-Mejía is a senior fellow in economic development at the Adrienne Arsht Latin America Center of the Atlantic Council. He served as senior trade and investment diplomat for the government of Colombia to the United States between 2014 and 2021.

Antonio Ortiz-Mena, PhD, is a nonresident senior fellow at the Adrienne Arsht Latin America Center of the Atlantic Council. He served as head of the Trade & Economics office of the Embassy of Mexico to the United States between 2007 and 2015. He is the CEO and founder of AOM Advisors.

Rocío Rivera Barradas, PhD, is a senior advisor with AOM Advisors. She served as trade and investment diplomat of the government of Mexico to the United States, based at the Mexican Consulate in Chicago, between 2019 and 2024.

Related content

Explore the program

The Adrienne Arsht Latin America Center broadens understanding of regional transformations and delivers constructive, results-oriented solutions to inform how the public and private sectors can advance hemispheric prosperity.

The post Why modernizing CAFTA-DR matters for the United States, and options for updating the trade pact appeared first on Atlantic Council.

]]>
China’s economic slowdown and spillovers to Africa https://www.atlanticcouncil.org/in-depth-research-reports/report/chinas-economic-slowdown-and-spillovers-to-africa/ Tue, 18 Nov 2025 16:00:00 +0000 https://www.atlanticcouncil.org/?p=887330 China has catalyzed new infrastructure and industries in Africa, but the continent is also exposed to negative ripple effects from changes in China’s domestic economy. This report investigates how different projections of China’s economic growth and structure over the next five years will affect trade and financial engagement with the African continent.

The post China’s economic slowdown and spillovers to Africa appeared first on Atlantic Council.

]]>

Bottom lines up front

  • On balance, the best long-term outcome for Africa is likely one in which China accepts the cost of reform.
  • Demand for minerals will grow about 5 percent per year under all scenarios but only a reform scenario sees Chinese demand for African manufactures grow.
  • Chinese exports of commodities and manufactures to Africa are set to grow only 4 to 6 percent per annum in all scenarios, a marked decline from annual growth rates above 10 percent between 2020 and 2024.

Executive summary

China’s economic rise and its integration with Africa have catalyzed new infrastructure and industries across the continent. But this also now exposes African countries to negative ripple effects from changes in China’s domestic economy. As China’s investment- and manufacturing-centric economic model loses steam, African officials and policymakers will need to plan for growth and economic transformation, with an understanding that their largest trade and investment partner might look very different than it has over the past decade.  

This report investigates how different projections of China’s economic growth and structure over the next five years (through 2030) will affect trade and financial engagement with the African continent, and what these outcomes will mean for decision-makers. It deploys a novel framework to estimate how economic flows between China and Africa shift under different growth scenarios. To account for Africa’s diverse economies—spanning some of the world’s least developed countries as well as high-income financial centers—this analysis extends to country groups.

No growth scenario in China will benefit all of Africa’s nations equally. But on balance, the best long-term outcome for Africa is likely one in which China accepts the cost of reform to implement slower, but more stable, growth. While countries could previously envision the net benefits of close trading relationships with China in 2030, trade now presents both opportunity and threat: opportunity in the form of cheap imports, but complication in the form of persistent trade imbalances and overcapacity in manufacturing. Under any growth scenario, finance from China’s banks and investors will continue to decline—whether sharply or gradually—as China’s domestic financial system evolves.

Chapter 1 surveys economic conditions in Africa as of 2025, as well as how commodity markets and external imbalances make many African countries vulnerable to shifts in the global growth environment and in their economic relationships with China. Even countries with limited direct exposure to China are likely to feel the impact of a slowdown via regional economic linkages and the effect of China’s exports and imports on global prices.

Chapter 2 provides an overview of trade and financial flows between China and Africa. While the importance of individual flows varies, a few channels account for the majority of economic value: goods trade, commercial and development finance, and foreign direct investment (FDI). Baseline growth rates of these flows are used to inform projections in the later analysis.

Of these, the goods trade represents the largest scope of bilateral engagement between China and the African continent, approaching $300 billion annually as of 2024, or about 10 percent of Africa’s gross domestic product (GDP). However, imbalances driven by structural characteristics of the two economies have intensified in recent years. Despite recent attempts to diversify trade, African countries still have large trade deficits, mostly exporting commodities to China and importing manufactured goods. China’s mode of finance mixes concessional and commercial motives, and new financial flows are slowing as lenders look to control risk. The result has been that China is collecting more in debt service payments than it is disbursing in new loan finance.

China’s outbound financial activity, which recovered after COVID-19 downturns, is now more diverse in both its form and its targets. New annual FDI flows from China now exceed new lending from China to African countries ($6 billion in annual deals as of 2023, according to Rhodium Group data). Portfolio flows are still small. Estimated total Chinese portfolio investment amounted to only $1.6 billion as of June 2024, which remains concentrated in economies with more developed financial markets, such as South Africa and Egypt. The differences in scale between these flows influence the channels through which China’s growth effects will be most keenly felt.

To evaluate the impact on African economies of spillovers from China’s growth slowdown, Chapter 3 establishes a baseline of economic conditions in China. The real question to determine China’s future growth is whether it manages to reform its investment-driven system or stagnate on its current path. To evaluate both of these possibilities, we evaluate the economic assumptions of China’s growth scenarios—and from there, the impacts on African countries— through 2030, using three different perspectives.

  • The International Monetary Fund (IMF) scenario: In its official World Economic Outlook (WEO) projections, the IMF forecasts growth of 3.4 percent by 2030.
  • The reform scenario: China begins to successfully rebalance toward a consumer-oriented economy and the country’s economic growth slows in the short term before rising to a more sustainable rate of around 4 percent by 2030.
  • The stagnation scenario: Beijing’s reform efforts flounder and China’s economy grinds slower and slower. Growth slows to 2.5 percent by 2030.

Chapter 4 assesses outcomes for African economies, based on the growth scenarios laid out in Chapter 3 for China through 2030. The impacts of growth projections are evaluated for goods trade across four product groups of Chinese imports from Africa (oil, minerals, agricultural products, and manufactured goods) and two product groups of Chinese exports to Africa (manufactured goods and commodities). Impacts on key outbound financial flows from China to Africa are also evaluated, including lending, portfolio flows, and FDI. Several key takeaways arise from this analysis.

  • Across different scenarios, China’s oil imports from Africa are likely to decline due to growing electric vehicle adoption and clean power generation capacity, but they hold up best in scenarios in which China’s structural reforms are limited.
  • China’s non-oil mineral imports will likely grow quickly under all scenarios, but demand might shift among mineral products, with different implications for different African countries. Commodities such as iron ore and those used in clean tech sectors are core inputs for a variety of China’s manufacturing industries. As a result, the projected growth of China’s mineral demand is strong across all scenarios.
  • African manufactured and agricultural goods do best in a reforming China, where an empowered consumer base spends more on foodstuffs and African-made manufactured goods such as clothing. In the stagnation scenario, and to a lesser extent, the IMF scenario, weak Chinese demand and expanding manufacturing output and trade surplus suppress demand for African manufactured goods. Growth of China’s agricultural imports is projected to be strong under all three scenarios. In the reform scenario, growth projections are highest for both agriculture and manufacturing imports. As Chinese household consumption grows, industrial upgrading in China will move out of lower value-added industries, letting African manufacturers capture more market share.
  • All three scenarios project that lending to Africa will be stronger than other forms of finance. Chinese lenders will still need to refinance and support their existing obligations despite tightening constraints on their balance sheets.
  • Under all three scenarios, the growth of FDI to Africa is projected to continue at modest levels over the next five years. Chinese FDI in Africa is heavily concentrated in capital-intensive sectors that are stickier and more often linked to policy goals, such as control of critical minerals and other essential inputs used by Chinese manufacturers.

Chapter 5 concludes by assessing the potential impacts of each scenario by country group. While oil exporters and “traditional” mineral and commodity metal exporters would paradoxically benefit from a “stagnating” China that maximized oil consumption, this would not be a net benefit to the rest of the continent. Instead, a reforming China—better positioned to resolve trade and financial imbalances, and to drive consumption of Africa’s exports—offers the best prospects overall for a larger group of African countries.

  • For transition mineral exporters, demand for Africa’s critical minerals is likely to persist regardless of scenario, as these sectors will remain a core focus of China’s (and other countries’) national economic strategies. It is more difficult to predict outcomes for low-income countries even if they are less exposed to commodity markets, where much depends on regional transmission of spillovers. Though China’s aid and development finance are far from the only considerations for policymakers in this group, they are not guaranteed to rise even in a high-growth scenario. For the middle-income group as well, much depends on the balance between surging Chinese exports and opportunities to capture investment from China. A reform scenario is their best bet.

Read the full report

About the authors

Matthew Mingey is an Associate Director with Rhodium Group, focusing on China’s economic diplomacy and outward investment, including development finance. Matthew is based in Washington, DC. Previously, he worked on global governance issues at the World Bank. Matthew received a Master’s degree in Global Business and Finance from Georgetown University’s Walsh School of Foreign Service and a Bachelor’s degree from the University of Pennsylvania.

Jeremy Smith is a Research Analyst with Rhodium Group’s China practice, focusing on China’s evolving growth dynamics and economic engagement with the world. Jeremy previously worked at S&P Global, where he performed macroeconomic forecasting and sovereign risk analysis for countries in Latin America and the Caribbean. Prior to that, he was a James C. Gaither Junior Fellow at the Carnegie Endowment for International Peace. Jeremy received a master’s degree from the Johns Hopkins School of Advanced International Studies, concentrating in international economics and China studies. He also earned a graduate certificate from the Hopkins-Nanjing Center and a bachelor’s degree from Williams College.

Laura Gormley is a Senior Research Analyst with Rhodium Group’s China Projects Team, focusing on China’s innovation ecosystem and external economic engagement. Prior to joining Rhodium Group, she was a research assistant with the Global Development Policy Center – Global China Initiative at Boston University, where she contributed to the Center’s work on China’s development finance and decarbonizing the Belt and Road Initiative. Laura holds a Master’s degree in Global Policy from Boston University’s Pardee School of Global Studies and a Bachelor’s degree from McGill University.

Acknowledgements

This report was written by Matthew Mingey, Laura Gormley, and Jeremy Smith, with support from the Atlantic Council GeoEconomics Center’s Charles Lichfield and Jessie Yin.

Rhodium Group and the GeoEconomics Center wish to thank the colleagues, fellow analysts, and reviewers who shared their ideas and perspectives with us during the writing process and helped us strengthen the study in review sessions and individual consultations. Our gratitude goes out to Daniel Rosen and Josh Lipsky.

This project was made possible thanks to the philanthropic support of Carnegie Corporation of New York.

related content

Explore the program

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

The post China’s economic slowdown and spillovers to Africa appeared first on Atlantic Council.

]]>
Building the digital front line: Understanding big tech decision-making in Ukraine https://www.atlanticcouncil.org/in-depth-research-reports/report/building-the-digital-front-line/ Mon, 17 Nov 2025 15:35:11 +0000 https://www.atlanticcouncil.org/?p=886781 In this report, author Emma Schroeder examines which factors most shaped tech companies’ decisions as to whether and how to lend their support to Ukraine throughout the war.

The post Building the digital front line: Understanding big tech decision-making in Ukraine appeared first on Atlantic Council.

]]>

Table of contents

Executive summary

The war in Ukraine has seen Russia launch and sustain a full-scale invasion across the information and physical domains against a country that has embraced technological development and increased technological and geopolitical connections to the United States, Canada, and Europe. Private technology companies have provided essential and often irreplaceable support to Ukraine following Russia’s invasion in 2022 and—especially in the early months of the conflict—did so largely without a request from an allied state or payment from Ukraine.

However, more than three years on, although the private sector’s assistance in Ukraine has been well-documented, the policymaking community at large is still largely unaware of how companies decided whether and how to provide technological support to and in Ukraine. Through open research as well as interviews and roundtable discussions with various private sector and government representatives, this report posits that companies were primarily motivated by a complex combination of factors in tandem, which pulled them toward or pushed them away from support. The factors pulling companies toward cooperation were the moral clarity of the conflict, and alignment with existing business opportunities. At the same time however, among factors pushing companies away from involvement in Ukraine was the difficulty of coordinating assistance in-country, as well as the risk of Russian retaliation. Meanwhile, both sets of factors were either enhanced—or mitigated—due to various actions taken by Ukraine, allied states, and international bodies. This includes Ukrainian tech diplomacy; the development of Ukraine’s technical capabilities; aid facilitations and coordination efforts by both various groups and entities; and risk mitigation efforts undertaken by both states and private companies.

Dependency on the private sector in the cyber domain has become a somewhat frequent refrain in domestic cybersecurity conversations. However, prior to the February 2022 Russian invasion of Ukraine, no one—not supranational bodies, states, or even companies themselves—was prepared for the role they would assume once the tanks rolled and the missiles fired.  The Russia-Ukraine conflict’s cyber dimension has revealed an underlying dependency on products, services, and infrastructure owned and operated by private companies. This has proved to be both a source of opportunity to enhance Ukraine’s defenses, while at the same time revealing fundamental risks and vulnerabilities. Given the heft and impact of technology companies in today’s digital infrastructure, let alone in conflict, it is essential that policymakers grasp this complex interplay of factors that influenced companies‘ decision-making as they headed in Ukraine, to inform planning or preparedness for future conflicts where the private sector will inevitably play a key role.

Introduction

Amid the Russia-Ukraine conflict, the private sector was and is a crucial line of defense and source of cyber resilience to a greater extent than any conflict previously observed. As the first case study of this phenomenon in an overt, conventional war, the past three years in Ukraine have clearly demonstrated how crucial the cyber and informational domain, and the private companies at its forefront, will be in competition, conflict, and war to come.

More than three years following the full-scale Russian invasion of Ukraine in the early morning of February 24, 2022, the war—and the crucial role of the international community in it—continues, but not unchanged. The war that Putin expected to end in Russian victory within a handful of days is now well into the third year of the largest and deadliest war in Europe since World War II.

This study examines the characteristics of this conflict that influenced companies’ decision-making regarding the type and degree of their involvement in Ukraine. Which factors and actions taken by states shaped tech companies’ decisions throughout the conflict as to whether and how to lend their support to Ukraine? These include both pull factors, those that increased the likeliness and degree of technology company involvement in Ukraine, and push factors, those that decreased the likeliness or degree of the same. Additionally, a key element influencing this space was the response by the Ukrainian government, allied governments, and international bodies to either build on the effects of the pull factors or mitigate the effects of the push factors throughout the conflict.

These factors and reactions are explored through open research, individual interviews with executives from tech companies active in Ukraine,1 and workshop discussions including private sector, civil society, and representatives from various governments. It puts forward the private sector’s perspective on its own involvement in Ukraine since the 2022 invasion, reflecting on opinions and actions as they stood at the time of initial decision but also on the lessons learned since. The intention is to contribute to a baseline of understanding of public-private cooperation in Ukraine so that future policy decisions, whether in the Ukraine context or beyond, are built upon a full evaluation of experience.

Pull factors

Clarity of conflict

Clarity of conflict refers to the perception of the “right” and “wrong” or “victim” and “perpetrator” in a conflict, among one or more set audiences, whose support has the potential to provide materiel aid. In examining the role of this factor in the provision of tech aid to Ukraine, these audiences are primarily state policymakers, general populations, and technology leaders in Europe and North America. Overwhelmingly, in both public reporting and private interviews, the central reason given by companies themselves for why private companies provide aid and services supporting Ukraine is the moral clarity that these companies, their employees, and a large portion of their customers saw in the conflict and its conduct. Many interviewed commented on how the Russo-Ukrainian War, distinct from most other conflicts, has a clear and binary “right” and “wrong” side in the perspective of at least most of the Western world, from governments to individuals. 

Russia engaged in continuous overt and covert aggressive action through a wide variety of coercive, though largely nonescalatory, tools in an attempt to exert control on Ukraine and its population. On February 24, 2022, however, Russia unleashed coordinated missile strikes on Ukrainian cities, airborne deployments of soldiers to key locations beyond the border region, conventional advancement across the border, and coordinated cyber aggression.

In March 2022, Amnesty International released a statement saying, in part, that “In less than a week, Russia’s invasion of Ukraine has triggered a massive human rights, humanitarian, and displacement crisis that has the makings of the worst such catastrophe in recent European history.”2 Photos and videos poured out of Ukraine, documenting Russian violence and war crimes against the people of that country. Reports on Russian atrocities and Ukrainian resistance dominated the headlines and news discussions in the West for months.  A Monmouth University survey conducted in March 2022 found that 89 percent of Americans believed that Russia’s actions in Ukraine were not justified.3 Similarly, a poll of public perceptions of responsibility for war, taken across ten European countries showed that a clear majority in all countries attribute the primary responsibility to Russia.4

During these early months of 2022 the private sector quickly became an essential pillar of support for the Ukrainian war effort. As one expert put it, “If you had ordered a generic villain, you would have gotten Putin. From a moral standpoint, it was really easy for companies to take a stand, you have a moral highpoint.”5 Russia’s long decade of slowly escalating violence toward Ukraine, culminating in a brutal conventional assault and now, yearslong war, created an unusually stark geopolitical environment in which both Western states and the majority of their populations not only supported the defense of Ukraine but did so enthusiastically.

Across interviews and roundtable discussions, industry experts demonstrated an appreciation of the clarity of the “right” and “wrong” in the case of Ukraine. Nearly every private sector individual interviewed highlighted the importance of this factor in determining whether and how their company decided to begin or deepen its involvement in Ukraine following the invasion. One expert from a leading tech company said that “This was the easiest of all scenarios I could imagine for the private sector to seek to help an entity like Ukraine. The clarity on the conflict made the decision to assist Ukraine clear.”6 As several experts attested, much of the cyber aid provided to Ukraine required technical expertise that was not only limited to a few companies but also limited to a relatively small population of skilled individuals. At this level of analysis, the degree of available assistance had to take into account the bandwidth and possible burnout risk for these individuals as well as a strong, prevalent reluctance to work with a government or, especially, a military. The perceived clarity of the war in Ukraine, however, was critical to overcoming these concerns—at least for a while.7

Reaction – Ukrainian tech diplomacy

Tech diplomacy is the engagement between state authorities and tech companies, civil society organizations, other states, and multilateral fora to influence the development of both technology itself and the policy that surrounds it.8 Within the early days of the conflict, members of the Ukrainian government and especially the Minister for Digital Transformation Mykhailo Fedorov, rallied for aid across the technology sector. These calls, and the generally positive reception to them, built on arguments regarding the clarity of the conflict. Although this tech diplomacy has been the project of various Ukrainian officials and offices, both before the 2022 invasion and in the years since, a focus in on Fedorov is illustrative of the Ukrainian approach to cultivating and extracting mutual benefit from relationships with international technology companies.

In 2019, Fedorov was tapped as deputy prime minister and minister of digital transformation and was subsequently named deputy prime minister for innovation, education, science and technology and minister for digital transformation and most recently first deputy prime minister of Ukraine—minister of digital transformation of Ukraine.9 Fedorov and his team have been adept, according to government affairs executive from a US-based multinational technology corporation, at creating and using “carrots and sticks” to influence company leadership and employees to more favorably view Ukraine and to augment their willingness to contribute to its defense.10

Fedorov cultivated a strong social media presence with an audience both within Ukraine and across Europe and North America. He emphasized the importance of social media platforms—using primarily English to connect with an international audience—to bring awareness to the dire situation in Ukraine. He pointed to the social media platform X (formerly Twitter), saying it “has become an efficient tool that we are using to counter Russian military aggression.”11 In efforts like United24, the Ukrainian government’s official fundraising platform, which began with Fedorov tweeting the government’s crypto wallet addresses with an ask for donations,12 he saw it not just as a fundraising tool, but as a tool that is “keeping people around the world aware of what is going on in Ukraine.”13 Crowdfunding efforts, even if donations are small, make people feel that their contributions are making a difference and fosters a closer relationship between that person and the Ukraine regardless of the distance.

Fedorov leveraged this engaged global audience to incentivize company action, effectively mobilizing his audience’s attention. A look at Fedorov’s social media presence shows a clear pattern of this strategy in action. Between March 2022 and July 2024, Fedorov posted fifty-two requests for aid from specific companies, celebrated companies and individuals taking positive action, and called out companies engaging in business practices that he deemed detrimental to Ukrainian defense efforts. These posts served as additional public acknowledgement of the contributions of specific companies to Ukraine in a global public forum that other states were watching, as were individuals, aid organizations, and companies. One tech executive explained that not only did these callouts serve as thanks, they also leveraged the competitive nature of these companies that “one up” each other with aid as an additional driver.14

The Starlink case provides an interesting example of this strategy in action. Fedorov tagged Elon Musk in an X post and asked him directly to instruct SpaceX to provide Ukraine with Starlink stations, calling him out for trying to “colonize Mars” instead of helping civilians on Earth.15 Musk responded publicly on X less than twelve hours later that, “Starlink Service is now active in Ukraine. More terminals en route.” Two days later these stations, which would come to serve critical functions for civilians, government entities, and even military personnel, arrived. Fedorov again publicly responded on X with a photo of a truck full of terminals saying, “Starlink – here. Thanks, @elonmusk.”16

According to Fedorov’s deputy minister, Alex Bornyakov, in the months leading up to the Russian invasion, Fedorov’s office was unable to secure a meeting with Elon Musk. However, SpaceX President and COO Gwynne Shotwell indicated in March of 2022 that the company had been coordinating with Ukraine as part of its European expansion effort for several weeks before the invasion and were awaiting final approval from the Ukrainian government.  According to Shotwell, “they tweeted at Elon and so we turned it on … that was our permission. That was the letter from the minister. It was a tweet.17 These early interactions show that at the very least, Fedorov’s social media engagement functioned as a nontraditional method to accelerate the provision and delivery of essential technical equipment that would enable connectivity for civilians, government entities, and even military units.18

Six months before the February 2022 invasion, Fedorov went on a tech diplomacy tour to Silicon Valley, intent on building stronger relationships with key technology companies with Ukraine’s digital transformation on the agenda. Fedorov‘s tech diplomacy work laid a solid foundation for coordination between the Ukrainian government and these technology companies by the time the war began. These relationships and Fedorov and his ministry’s direct approach with private companies meant that his office could seek solutions in the private sector directly and more swiftly than in traditional government acquisition. For example, in less than a month, a new and improved air raid alert system was implemented across the country as a result of a direct and informal conversation between Ajax Systems Chief Marketing Officer Valentine Hrytsenko, Deputy Minister of Digital Transformation Valeriya Ionan, and a team of digital transformation officers.19 

Therefore, Ukraine’s approach to tech diplomacy represents a significant shift in how states, especially small or mid-power states, should conceptualize and shape their relationships with technology companies. Given that global technology companies’ (“big tech”) yearly revenue continually overshadows the gross domestic product (GDP) of many states,20 this evolution in states’ relationships with big corporations suggests that corporate ties are sometimes more important than a state’s relationship with another state. This was echoed in a statement from the Danish government, recognizing the extent to which technological disruption affects societal and geopolitical change, nothing that the companies driving that innovation “have become extremely influential; to the extent that their economic and political power match—or even surpass—that of our traditional partners, the nation states.”21 Fedorov’s actions therefore proved the importance of tech diplomacy as a key government priority to secure the cooperation of the tech sector in a crisis, aided by the moral clarity that many companies saw in assisting Ukraine in a time of war.

Business alignment

For companies examining whether and how to provide tech-based support to Ukraine in its defense, business alignment can take a variety of forms, but typically refers to some combination of benefits that the company receives from these activities. Although the primary driver cited publicly for tech companies’ involvement has been the desire to aid Ukraine, their customers, and employees in Ukraine against blatant Russian aggression, another factor in companies’ decision-making was in fact how the provision of assistance to Ukraine fit into and supported the overall health and security of their organizations. This included the character of preexisting relationships with both Ukraine and Russia, direct financial profit, and indirect benefits such as instructive experience, field-testing products, and reputational benefits.​

Preexisting relationships

The Russian invasion of Ukraine in February 2022 was not the start of the conflict between the two nations, nor was it the beginning of technology companies’ relationships with Ukraine and Russia. The nature and tone of these relationships provided a key foundation for these companies’ decisions throughout the post-2022 conflict. Ukraine and Russia, both as partners and as markets, had different starting points and were also on different active trajectories that informed the types and depth of engagement that tech companies wished to have with each country, both individually and comparatively.

One of the primary motivations cited for company involvement in Ukraine after the Russian invasion was the simple fact that many of these companies were already active in Ukraine to some extent and their leadership felt a responsibility to protect its employees and continue to serve its customers within Ukraine. For example, threat intelligence companies like Mandiant and CrowdStrike had been engaged in Ukraine since at least 2014, actively tracking cyber espionage, influence, and attack operations, while companies like Microsoft and Google were actively building capacity in the country despite Ukraine’s prohibitions on cloud services. In 2020, Google opened its second research and development center in Ukraine and Microsoft signed a memorandum of understanding with Ukraine’s Ministry of Digital Transformation to include a $500 million investment to build two data centers.22

Several private sector and government representatives conveyed in private interviews that one of companies’ greatest concerns in the first few weeks of the conflict was the safety of their employees in Ukraine.23 Many companies set up or contributed to programs intended to help employees leave the country, if they wished, or to provide protection measures for those who remained.24 Additionally, companies with existing customers in Ukraine saw their mission as largely unchanged, seeking to serve their customers regardless of their location.25 Companies with these preexisting relationships had more reason to continue or expand their work in the country due to these long-term connections.

By contrast, many of these companies also had preexisting, albeit weaker, ties with and in Russia. According to a 2024 report from the Center for Security and Emerging Technology, however, of the eighteen US tech companies that provided “direct assistance on the battlefield and/or services to maintain critical infrastructure or government functions,” none had “significant economic or financial linkages to Russia.”26 While Ukraine had undertaken concerted steps to foster mutually beneficial relationships, Russia had been largely coercive. The Kremlin in the years before the 2022 reinvasion sought to tighten control over the Russian information space and exert influence over international tech companies’ activities in Russia. For example, in 2021 Russia passed a law requiring large technology companies with a presence in the Russian market to establish Russian offices registered with the Federal Service for Supervision of Communications, Information Technology, and Mass Media, commonly known as Roskomnadzor, or risk severe punitive measures.27 Some in the industry viewed the move as an attempt to blackmail tech companies into complying with Russian censorship.28 Google was one such target of these coercive measures—in a push to force Google to censor the content available on its platforms within Russia, Russian authorities seized the company’s bank accounts. In response, Google’s Russian subsidiary declared bankruptcy and ceased all but its free services within Russia.29

Amplified by the clarity of conflict discussed above, and Ukrainian tech diplomacy efforts for companies to sever financial ties with Russia and the Russian market, the decision calculus for these companies was less complex than it may have been otherwise.

Not all companies chose to leave the Russian market completely. Despite the coercion that Google faced, the company chose to keep YouTube available in Russia; however, without ads for users in Russia and without the ability to monetize content that would “exploit, dismiss, or condone Russia’s war in Ukraine.”30 As discussed previously, many companies decided to continue services in Ukraine out of an obligation to existing customers. Depending on the company and the type of product sold or service provided, this same motivation was seen with respect to Russia as well. One tech executive explained that some of these products and services remained active because they provided a benefit to the Russian public, as opposed to the Russian government. For example, YouTube remained partially active, with restrictions, so that the platform could continue to serve as an alternate source of information for Russians.31

Direct profit

For companies, both those with an existing presence in Ukraine and those without, providing technical services in and to Ukraine could also serve more clear-cut business interests. Some were at least partially motivated by direct financial gain like new paid contracts and revenue potential such as additional value generated through the delivery of services and the possibility of positive publicity for the company or their products.

Although much of private companies’ work in Ukraine was (or started as) free of charge, many others were acquired in a more traditional contractual manner, with either Ukraine or an allied government footing the bill. Company representatives said in several interviews and roundtables that while they wish to continue their work in the country, as the war continues, they will require financial support to do so.32

Indirect benefit

Some of the tech companies active in Ukraine derived value from the very act of providing a service itself, with indirect gains that included instructive experience with Russian cyber operations, the ability to field-test products, and reputational benefits.

For more than a decade, many multinational threat intelligence companies have been tracking Russian cyber aggression in Ukraine as part of their core function. These services helped to drive the development of Ukrainian cyber infrastructure, but it was not solely a charitable effort. It was in these companies own interests to gain the closest possible insights into areas like Ukraine that experience a high degree and sophistication of cyberattacks. As a result, these companies sowed valuable intelligence from their experience, and improved their business offerings across the board. As one executive in threat intelligence at a US cybersecurity nonprofit put it: “for threat intelligence companies, having this depth of access is a gold mine, the details delivered out of Ukraine on Russian tactics, techniques, and procedures (TTPs) are quite amazing.”33

These benefits are not only limited to threat intelligence companies. Companies that run active platforms used by and in Ukraine, such as cloud platforms, also gained greater direct experience against Russian cyber operations. As one executive put it, “while acting as a shield, [these] companies are collecting vast intelligence that can be used to improve their products and protect all their customers.”34 The experience of defending against Russian activity at that scale and volume served as training of sorts for companies’ cybersecurity teams.

Both representatives from private companies and the Ukrainian government cited an additional benefit to working in Ukraine during the current war: it served as a testing ground for technology. As Fedorov stated, Ukraine “is the best test ground for all the newest tech … because here you can test them in real-life conditions.”35 Several company executives privately seconded this notion, saying that alongside their company’s desire to do the right thing, their work in Ukraine provided proof of concept for their capabilities.36 Ukraine also offered a means to demonstrate to potential customers the effectiveness of their offerings. Founding partner of Green Flag Ventures Deborah Fairlamb said at a European defense conference that “no one would even look at a product unless it had ‘Tested in Ukraine’ stamped on it.”37 During a roundtable conversation, a company executive said that governments were more likely, having seen a company’s work in Ukraine, to purchase their products and trust that they are secure.38

Finally, companies working actively in Ukraine were also motivated by the benefits to public perception and reputation. Popular support of Ukraine meant that companies’ support may have improved their reputation by association. In a TIME article from early 2024, author Vera Bergengruen argued that this reputational concern was part of Palantir’s decision calculus for its work in Ukraine, by helping to dispel characterization of the company’s work as a tool to support intrusive government surveillance. This would situate Palantir’s work in Ukraine among its similar efforts to “shed its reputation as a shadowy data-mining spy contractor.”39 Clearview AI’s reputational concerns also likely motivated its assistance to Ukraine. The company was sanctioned multiple times throughout Europe for privacy violations and was lambasted in a 2020 New York Times article for its controversial use by law enforcement and private companies to track people through AI-enabled facial recognition.40 Nevertheless, the company received an outpouring of positive press following public announcements that Ukraine  was using this same AI-enabled facial recognition software to identify Russian soldiers, including deceased soldiers and those suspected of committing war crimes in Ukraine.41 Whether trying to capitalize on a positive reputation or counter negative perceptions, companies benefit from their association with a cause popular across their customer base.

Reaction – Ukrainian technical capability and posture

In both the buildup to war and the conduct of it, some companies with interest in setting up operations in or with Ukraine were reluctant      to do so out of concern regarding Ukraine’s ability to act as a capable and trustworthy recipient of goods and services. Executives working in threat intelligence and information security at US-based multinational technology companies have pointed to corruption in Ukraine as a barrier to engagement prior to the invasion and a factor that was carefully considered when deciding how to provide aid in Ukraine.42 This challenge is openly acknowledged in Ukraine’s Anti-Corruption Strategy for 2021-25, which states that “corruption prevalence and distrust in the judiciary are the key obstacles to attracting foreign investment to Ukraine.”43

To mitigate these factors, Ukraine and its partners have invested heavily over the past decade to take on corruption and build out legal, economic, and technical frameworks to transform Ukraine so as to make it a more appealing target for assistance and cooperation from the public and private sectors. According to Alex Bornyakov, Ukraine’s deputy minister of digital transformation, Ukraine’s sought to develop “the largest IT hub in Eastern Europe with the fastest growing GDP, industrial parks, and its own security-focused ‘Silicon Valley.’”44

Anti-corruption efforts

The Ukrainian government’s commitment to anti-corruption efforts has been an important factor for the success of the process, which began well before the buildup of Russian tanks on its border. According to the 2025 Organization for Economic Cooperation and Development (OECD) Integrity and Anti-Corruption Review of Ukraine, since 2013 Ukraine “significantly reformed its anti-corruption framework to fight what were then historically high corruption levels in the country.”45

Ukraine’s public and private IT sectors have long been a breeding ground for software acquisition-related fraud, a scheme in which an individual reports the purchase of a legitimate software license but actually buys a pirated or outdated version of that software and pockets the difference. Before 2014, approximately 80 percent of Ukrainian government and private entities were using network software that had either never been or was no longer supported by the associated software vendor,46 making Ukraine a difficult and unappealing market for software vendors.

In 2014, anti-corruption activists started the ProZorro project, which over the past decade moved public sector procurement, including that of IT infrastructure, to a central platform built around the tenets of transparency, efficiency, and cross-sector collaboration and competition.47 According to a report by Dr. Robert Peacock, through the use of ProZorro and other anti-corruption efforts, senior officials at Ukraine’s State Special Communications Service estimated that “the share of pirated and unsupported software on the country’s networks had dropped from more than 80 percent in 2014 to only 20 percent in 2020.”48

As the conflict in Ukraine escalated into a full-scale war, Ukraine’s anti-corruption efforts became even more urgent and essential. For example, UNITED24, the country’s official fundraising platform to fund the Ukrainian war effort that has raised approximately $350 million since the beginning of the war, sends money directly into transparent national accounting systems depending on the choice of the donor, with the leading global accounting firm Deloitte auditing platform.49 In addition, in the first year of the war Ukrainian President Volodymyr Zelenskyy and his government dismissed several high-ranking government officials based on allegations of corruption. This included two of the top Ukrainian cyber officials after they were accused of participated in corrupt procurement practices. According to the country’s National Anti-Corruption Bureau, the accused allegedly embezzled $1.7 million between 2020 and 2022 through fraudulent software acquisition.50 The Ukrainian government’s efforts  largely mitigated companies’ concerns regarding corruption, and those companies that cited corruption as a barrier to working with Ukraine have since commenced programming previously denied to Ukraine on those grounds.51

For a private company to make the decision to invest more heavily in Ukraine, the benefits—financial or otherwise—must outweigh the risks. By addressing corruption within the government, and especially tech-related corruption, the Ukrainian government effectively diminished the weight of this factor in companies’ overall decision calculus. Crucially, such efforts take time to implement and yet more time to create meaningful change. Had these anti-corruption programs not been well underway before 2022, the question of corruption may have significantly deterred companies from deeper involvement in Ukraine.

Ukraine turns toward tech

Instead of sowing distrust in the idea of cyberspace as a safe space for economic and even government services, the past decade of Russian aggression against Ukraine in cyberspace motivated Ukraine to invest heavily in that space and turn its former weakness into a newfound strength. It could even be said that the continuous Russian aggression against Ukraine, through cyberspace and otherwise, helped Ukraine to better defend itself against Russia. Before the 2022 Russian invasion and even more so since, the Ukrainian government sees a flourishing technology sector within Ukraine as a key component to the economic strength of the country.52 However, to foster such a flourishing tech environment, Ukraine needed to first invest in its legal and economic foundations.

As a response to escalating Russian aggression in 2014, Ukraine began what would be an intensive decade of government reform and policy advancement on cyber issues. The figure below highlights various investment and development programs aimed at enhancing Ukrainian technological capacity, including efforts of the Ukrainian government itself and in partnership with various international entities such as the North Atlantic Treaty Organization (NATO) and the US Agency for International Development (USAID).

These, among other efforts, were essential steps to creating and expanding a technologically capable and developed Ukraine. Especially important was the increased relative cybersecurity of the Ukrainian digital environment, the development of Ukraine’s cyber workforce and general cyber literacy, and an influx of capital enabling increased investment in private sector tools and services.

On the economic front, the Ukrainian government made strides to create an attractive environment for investment. The government’s mission has been to shift the conversation from purely one of donations and aid to a direct appeal to the companies’ more pecuniary concerns. According to Bornyakov, “The best way to help Ukraine is to invest in Ukraine.”53 This call is both international and domestic. The Ukrainian government has implemented a number of projects and programs dedicated to fostering the local tech ecosystem. As of December 2024, the IT sector accounted for 4.4 percent of Ukraine’s GDP and 38 percent of the country’s total service exports. Much of this technological energy is being dedicated back to the war effort—according to a report compiled in cooperation with the Ministry of Digital Transformation of Ukraine, 97 percent of Ukrainian IT companies are “actively supporting projects that contribute” to Ukrainian defense.54

Diia City in particular, launched just two weeks before the invasion, is a tool intentionally designed to make it easier and more appealing for foreign companies to set up and run operations within Ukraine. Diia City is a “virtual free economic zone for tech companies in Ukraine” that offers a variety of legal and tax benefits.55 The connected Brave1 initiative launched in early 2023 to “create a fast track for innovation in the defense and security sectors,” especially those projects of high importance to Ukrainian military leadership, such as “drones, robotic systems, electronic warfare, artificial intelligence tools, cybersecurity, communications, and information security management systems.”56

These efforts, both domestic and international, bolstered the defense of Ukraine by building and demonstrating trustworthiness, capability, and economic value for the private sector. In other words, the political and economic engine driving technological development in Ukraine was composed of more than a decade of concentrated action from Ukraine and its international partners, and was in place well before tanks began rolling across the borders. This vital work ultimately helped to bring about conducive conditions for private sector investment or provision of services, as long-term structural factors indirectly shaping company decision-making to aid Ukraine.

Push factors

Difficulty of coordination

Difficulty of coordination refers to the friction that private companies experienced along the lifecycle of technical assistance to Ukraine—from understanding which products or services would be impactful, knowing who to coordinate with and how, or the logistics of providing that assistance. Friction, as in all domains of warfare, is the imposition of the constraints of reality upon one’s plans and impulses, and therefore each additional complexity that stands between a certain technology and its use in Ukraine increases the likelihood that that desired provision will not occur, will take longer, or will be provided in a less helpful form.

One of the most persistent hindrances to the provision of tech-related assistance from private companies in Ukraine was the difficulties that all parties involved faced, which was to effectively coordinate the assistance available with the assistance that Ukraine needed most in a fast-moving and high-pressure environment, particular as more Ukrainian organizations expressed a need for more threat intelligence, licenses, or training for tools. In almost every conversation with industry representatives about their experience in this space raised this coordination problem. The factors that most significantly impacted coordination effectiveness included whether a company had a preexisting presence in or relationship with Ukraine, the clarity with which Ukraine communicated its technical needs, and the ability to assess the effectiveness and impact of products or services provided.57 

Especially in the early months of the full-scale Russian war, much of the assistance that private tech companies provided was coordinated by companies themselves and in a largely ad hoc manner. In addition, Ukraine experienced communications challenges such as a lack of secure channels or limited visibility into networks and infrastructure on the ground.58 Companies that did not have a strong relationship with the Ukrainian public sector prior to the conflict found that direct coordination was difficult to establish once the conflict had begun.59 For some, not having a direct relationship with or in Ukraine had been an intentional choice, due to regulation complexity or corruption concerns.60 Initially, companies without a preexisting presence often struggled to pinpoint the correct office or person with which to speak. They bridged this gap most often with some combination of brand recognition driving direct outreach from the Ukrainian government and facilitation by Ukrainian private companies that had established relationships with international tech companies and could act as middlemen.61

Even in cases of existing relationships within Ukraine, complexities abound for companies. A threat intel executive indicated that, for many, there is a tension between what companies thought they could provide and what the Ukrainian government knew about its own needs. While Ukraine was effective in communicating its technical needs at the tactical level, according to various company representatives, effective coordination was somewhat hampered by their ability to effectively communicate and coordinate technical assistance needs across government at a strategic level lagged behind.62

An additional point of friction was the high degree of difficulty in deconflicting the assistance provided to Ukraine from different companies. Understandably, the Ukrainian government—and various individuals and agencies working within it—were responding to imminent threats and thus would send out the same or similar requests to various companies in the hope that one would respond.63 This meant that at times various companies were devoting time and resources to developing an assistance measure that was not actually needed and would not be implemented, or if it was in part, had a lesser relative impact on Ukrainian defense because of duplicative measures. This inability to understand and plan around the impact of assistance was broader than just the duplication issue; dozens of company representatives reported difficulties in getting a clear view as to whether their assistance was actually effective once provided.64

Without this data, future requests for and fulfillments of technical aid will continue to be based on theory rather than evidence from their growing experiences together. A 2024 paper from the Cyber Defense Assistance Collaborative (CDAC) and Columbia School of International and Public Affairs, made strides in its effort to collate and assess the effectiveness of those companies and organizations that provided cyber defense assistance to Ukraine through their program. The report identified both direct indicators, where effectiveness can be assessed via concrete measures, and proxy indicators, where possible contributing factors are assessed on a scale of perceived impact.65

Reaction – Ukrainian coordination and adaptation

On top of domestic development efforts, Ukrainian government officials spent concerted time and effort to build relationships that would serve as the foundation for future cooperation. Fedorov‘s tech diplomacy work forged new connections with these companies, as well as their leadership and employee bases, that in many ways enabled the speed of company response following Russia’s February 2022 invasion. “When the invasion began, we had personal connections to these companies,” Fedorov said. “They knew who we are, what we look like, what our values are and our mission is.”66

According to Fedorov, in the first month of the war he sent “more than4,000 requests to companies, governments, and other organizations, each one personally signed.”67 Some of these connections built on existing relationships, but companies without preestablished links either initiated conversations directly with or received direct requests from the Ukrainian Government. Beyond the Ministry of Digital Transformation, various Ukrainian offices like the State Special Communications Service of Ukraine, Security Service of Ukraine, National Security and Defense Council of Ukraine, and Ukrainian National Cybersecurity Coordination Center were engaging in relationship building and outreach efforts in order to coordinate the provision of tech assistance.68 According to Bornyakov, the early days of coordination with the international private sector were chaos.69 Various offices and employees sent out messages and requests without internal coordination, and products or services were provided without sufficient due diligence to ensure that they were truly useful to the Ukrainian war effort.

The Ukrainian government quickly updated its practices to facilitate more efficient cooperation. Among the first of these moves was a Ukrainian policy change to directly enable increased private sector participation. In February 2022, prior to the invasion, the Ukrainian parliament Verkhovna Rada amended the laws that had barred government use of Cloud services. This change meant that just days before the Russian invasion, companies including Amazon, Microsoft, Google, and Cloudflare were able the aid the Ukrainian government and several critical sector entities in migrating their critical data to their cloud servers—a critical move, as Russia’s attacks during the first few weeks of the war specifically targeted physical data centers.70 In addition, due to the imposition of martial law, Ukraine adopted two resolutions to streamline public procurement. Resolution 169, adopted on February 28, 2022, enabled government contracting authorities to ignore, when necessary, the procurement procedures required by the laws on public and defense procurement.71 Resolution 723, passed four months later, added new, more efficient requirements to the procurement process, amending both resolution 169 and resolution 822, most important of which was the introduction of the ProZorro platform as the mandatory electronic procurement system.72 As previously discussed, this platform was both a tool to facilitate procurement and to counter corruption in the procurement process at large.

Despite improvements to coordinate more effectively with private tech companies, and even as international coordination mechanisms emerged, a significant contingent of companies has maintained a preference for direct coordination. One government affairs executive noted that their company, like many others, preferred direct coordination with the Ukrainian government since it enabled more immediate and relevant support, and they were skeptical that third-party mechanisms would be as effective.73

Reaction – International aid facilitation

Since the February 2022 Russian invasion of Ukraine, and even before that, international entities—states, supranational bodies, and non-state groups— played an important role in coordinating technical-focused aid in support of Ukraine.

However, states’ coordination efforts were notably inconsistent. In the first year and a half after the Russian reinvasion, the United States allocated $113 billion in response to the war in Ukraine—largely allocated to the Department of Defense at 54.7 percent, USAID at 32.3 percent, and the Department of State at 8.8 percent.74 This money should not be viewed like a check signed over to the Ukrainian government, but rather as money allocated to respond to the Russian invasion through a combination of forms and recipients, primarily the defense industrial base in the United States.75 By contrast, private companies publicly announced and celebrated their digital and tech aid to Ukraine. In an interview, one leading tech executive observed a clear dearth of focus from the US government toward digital and tech aid, instead opting for significant humanitarian and more traditional military assistance.76 This prioritization was likely an intentional choice—the US government’s perspective seems to have been that it was leading conventional aid by a significant margin and wanted others, like European governments and the private sector, to take the lead on digital and tech matters.77Though not speaking specifically on cyber and tech elements, Secretary of Defense Pete Hegseth in February 2025 called publicly for European states to provide the “overwhelming” majority of defense funding for Ukraine, bemoaning what he saw as an “imbalanced relationship.”78 Hegseth specifically pushed for the expansion of existing Europe-led coalitions—discussed below—dedicated to coordinating technological aid.79

By contrast, industry experts agreed that the UK Foreign, Commonwealth and Development Office (FCDO) was a very effective facilitator of private sector aid.80 The UK’s efficiency on this issue was due in part to fewer restrictions on aid money between distinct civilian- and military-designated buckets.81 According to an assessment from the Independent Commission for Aid Impact, which scrutinizes UK aid spending, this flexibility enabled the FCDO to respond and adapt to the constant evolutions of the war and geopolitical environment—thereby acting as an effective channel for private sector assistance into Ukraine.82

The ad hoc nature of many of the early digital assistance programs provided by private companies was in some ways a double-edged sword. In many cases they were present and able to move more quickly than government programs, and in some places they stepped into de facto political roles—shaping the conflict and public understanding of it. However, this efficiency and effectiveness became difficult to sustain in the long run as governments and government-sponsored mechanisms were slow or insufficient to step in to support these efforts.83 US government entities were instrumental in facilitating support from private companies to Ukraine through purchase agreements, such as that of hundreds of Starlink devices and subscriptions in coordination with other governments84 and partnerships. US government entities also participated in intelligence sharing and collaboration efforts regarding Russian cyber capabilities and activities85 and even conducted hunt forward operations to assist in Ukrainian defense against Russian cyber aggression both before and after the February 2022 Russian invasion.86

In various conversations, both industry and government representatives confirmed the lack of effective governmental and supranational coordination and its impact on the private sector, and on Ukrainian defense.87 Company representatives across the United States and Europe shared the same refrain: “we can’t keep supporting Ukraine ourselves forever without government assistance.88

In addition to bilateral assistance efforts, various entities emerged across the conflict focused on cooperation organization and facilitation of digital and tech aid. The first of these was the CDAC, not a government entity, but a nonprofit organization that brought together a number of cybersecurity and technology organizations to better coordinate assistance efforts. The organization was founded by Gregory Rattray and a coalition of cyber executives to address the impediments and complications that accompanied the early days of digital and tech assistance provision from the private sector. A CDAC representative said in May 2024 that the group had facilitated $20-30 million in tech-related assistance for Ukraine since its inception.89 As Ukrainian and CDAC representatives noted, CDAC’s facilitation efforts have since slowed for a variety of reasons: decreased ability to act as an intermediary as requests have become more specific, a stabilization among companies that no longer require a coordinator after their relationships in Ukraine were established, and a lack of sufficient financial support for both CDAC and the companies willing to provide assistance.90

The vacuum noted by industry representatives and CDAC founders in the shape of a true digital and tech aid coordination body with the resources and remit to execute that mission is the planned role of the IT Coalition and the Tallinn mechanism. The IT Coalition, part of the Ukraine Defense Contact Group (UDCG; also known as the Ramstein Group), was established in September 2023 as “a dedicated group of donor nations led by Estonia and Luxembourg within the UDCG framework, focused on delivering support to Ukraine’s Defense Forces in the area of IT, communications, and cyber security.”91 The group consists of eighteen member countries, with the European Union, NATO, the United States, and France acting as observers.92 In 2024 and 2025, the coalition had raised “€1,1 billion in both financial and material assistance.”93 The coalition aims to support Ukraine cyber defense capability and command and control integration while also delivering on more long-term goals such as fostering innovation and cloud adoption. The United States is currently an observing member of the IT Coalition and have thus far has declined taking a more active role. Those familiar with the inner workings of the mechanism have emphasized the clear benefit of a more active US role in the mechanism, as most of the tech companies with whom the organization would like to coordinate are headquartered out of the United States.94

The Tallinn Mechanism was established in December 2023 with 11 states to “coordinate and facilitate civilian cyber capacity building” within Ukraine, and is intended to be complementary to military-focused cyber aid facilitation bodies like the IT Coalition.95 The Tallinn Mechanism is focused on “amplifying the cyber support of donors to Ukraine in the civilian domain.”96 The mechanism raised approximately $210 million by the end of 2024 and has focused on bolstering cyber defense capabilities, especially that of critical national infrastructure, through the public and private provision of hardware and software, incident response, satellite communication provision, and cybersecurity training for government officials.97

The international community has certainly made strides to better facilitate technology aid to Ukraine, to counteract the pushing effect that complicates such coordination for technology companies. However, it is yet unclear whether these programs and practices will meet the demands of this conflict, or those of conflicts to come. The most effective element of the tech sector at large’s efforts in Ukraine has been its speed, both in its response to the invasion itself and to individual challenges that have arisen over the course of this war. Meanwhile, government and supranational coordination—aside from those programs already in place—were much slower to implement.

Risk of retaliation

A significant factor shaping the behavior of companies’ work in and with Ukraine is the heightened threat state created by active warfare. Various technology company officials cited their concern about potential backlash—whether financial, cyber, or physical violence—from Russia against their infrastructure, products, and people.98 The real risk that these companies took on was informed by a number of factors, such as the application of their products or services by and for military ends, the required physical presence of personnel, products, or infrastructure, and also the degree to which increased Russian aggression against these companies might be a meaningful increase from prewar conditions.

Defense application

An undeniable yet complex risk that companies face as a result of providing support to Ukraine is the threat of Russian retaliatory action. Private sector behavior in Ukraine is shaped by the degree to which the goods and services provided are connected to the conduct of the conflict itself. Products and services provided to civilian groups for purely humanitarian purposes come with a different risk profile than goods that underpin government functions. Though not discrete or exhaustive, cyber and technical aid to Ukraine can be understood in four categories: humanitarian aid, critical infrastructure protection, government support, and military application. In practice, this division exists on a continuum, from purely humanitarian support to products or services that the state itself has come to rely on for the continued provision of government services, with particular importance placed on whether the good is for military use and whether that use is in direct support of combat operations. 

By and large, companies have made their own determinations as to how to amend their work in Ukraine, looking not only at the direct military application of their product or service but also examining existing and potential products or services to determine potential applicability for offensive operations—and where to avoid their abuse. A clear example of this is Google’s cessation of the live traffic display functionality within Google Maps. A team of open source researchers at the Middlebury Institute of International Studies, under the leadership of Professor Jeffrey Lewis, were allegedly able to infer the early movements of the February 2022 Russian invasion before official reporting by analyzing Google Maps traffic data in combination with radar imagery.99 Following these reports, Google announced that it would temporarily disable live traffic data so that it would not be used to plan military operations.100 An internal task force at Google largely coordinated these and similar decisions to coordinate aid to Ukraine and, most importantly, to examine their actions and decisions in order to identify and address programs that had a potential to cause harm.101 However, even after these amendments were made, Google Maps was again the subject of controversy. In November 2024, Ukrainian defense chiefs accused Google of revealing the location of key military positions following an earlier Google Maps update. According to Russian military bloggers, among these revelations was the position of new air defense systems, including US-made Patriot anti-aircraft missiles, surrounding an airport near Kyiv. According to the head of Ukraine’s counter-disinformation unit Andriy Kovalenko, Google representatives reached out to Ukrainian government officials to address the issue shortly thereafter.102

Similar in many ways was the SpaceX effort to restrict use of the Starlink satellite network close to the active front of the war. Though controversial in the public eye, and significant for military operators and planners, the SpaceX decision to restrict the use of Starlink devices near the front was an intentional one—to limit escalation directly supported by their devices. SpaceX President Gwynne Shotwell explained “our intent was never to have them use it for offensive purposes.”103 The Starlink network, despite these imposed limitations, has undeniably been an extremely useful tool for the Ukrainian military,104 but its network also supports a much wider geography of users, from individuals to government entities. The inherent dual-use nature of the Starlink network poses a much greater risk should its network be considered a military object. This risk framework is likely a significant part of the drive behind Space X’s creation of Starshield, announced in early December 2022. A partner project to Starlink, Starshield operates on a separate network and is specifically and exclusively for government—rather than consumer and commercial—use.105 With this application in mind, reports still vary as to whether such a contract, like the $1.8 billion deal with the National Reconnaissance Office, would be operated by the contractee, in this case the NRO, or whether, like Starlink, the service would remain operated by SpaceX.106 It is possible that this case will follow, in practice, the principle that the closer that the operation of a technology sits to strategic and sensitive national priorities, the higher the risk for both state and company of that technology being operated by said company, and the more likely that technology will come to be operated from within a government body.

Physicality

Products and services that require the physical presence of personnel, products, or infrastructure within Ukraine are the riskiest to undertake. Providing support in this way carries a level of risk that most companies did not have either the willingness or the infrastructure to take on.107 While some companies, for certain products, chose to partner with government entities to deliver products or services where physical presence was necessary, as in the preceding example, others chose instead to eschew options with such a requirement. In an interview, one expert said, “there were some products that you wanted to go forward with, but you couldn’t. Your informational security can only be as good as your physical security, so projects requiring new physical infrastructure development, or new infrastructure dependencies, was a major stumbling block.”108

Russia’s cyber-offensive impact

To some degree, most of the technology companies in question—especially those with a preexisting presence in Ukraine—were already a target of a significant volume of Russian cyber intrusion attempts as well as other coercive actions. As one industry executive put it when asked about the role of risk assessment in decisions to deepen their work in Ukraine following the invasion, “we knew the risk, we were already targeted on a daily basis.”109 The risk of Russian aggression and retaliation remains, but for many large tech companies, their work already took them into spaces where they were in direct or indirect conflict with Russian or Russian-affiliated groups. However, the risk of Russian cyber intrusions against their networks was already a built-in calculation for their existing cybersecurity plans.

In addition to the experience and expectations of many of these private companies, Russian cyber operations accompanying and following its February 2022 invasion were less disruptive than previously anticipated. The most prominent case of coordinated disruption in the information space remains the ViaSat satellite communications system hack during the invasion. As cyber scholar Jon Bateman writes, this intrusion demonstrated clear “timing (one hour before Russian troops crossed the border), clear military purpose (to degrade Ukrainian communications), and international spillover (disrupting connectivity in several European countries).”110 However, the incident appeared to be limited in duration and unclear in impact—senior Ukrainian official Victor Zhora acknowledged the loss to communications during the early hours of the invasion, but later stated that the incident was less disruptive than it could have been because of redundancies in Ukrainian communication methods.111

As nonresident senior fellow Justin Sherman explored in May 2025 Atlantic Council report, Unpacking Russia’s cyber nesting doll,112 the comparably muted effectiveness of Russian cyber operations during the war is the result of a multitude of factors including:

  • Cross-domain coordination difficulties
  • Resource constraints
  • Interagency competition
  • Intentional strategic prioritization
  • Ukrainian defensive strength

Sherman goes on to explain that while cyber operations against Ukraine did not have that catastrophic impact expected by some—the promised cyber Pearl Harbor—Russian cyber capabilities should not be underestimated.113

In just the first year of the war, Russia and—importantly—non-state actors in Russia’s orbit, launched a multitude of cyberattacks and intrusions against the public and private sector in Ukraine—including those entities relying on products, platforms, or infrastructure owned and operated by Western tech companies.114 In May 2025, the US Cybersecurity and Infrastructure Security Agency released a joint cybersecurity advisory highlighting this threat, and explicitly calling out Russian targeting of “those involved in the coordination, transport, and delivery of foreign assistance to Ukraine.”115 The question at hand, then, is not what level of risk is associated with these actions but how prepared the company is to encounter such risks.

Reaction – Risk definition and mitigation

In response to the risk of Russian retaliatory action, either through cyber or kinetic means, states and intranational bodies had a role to play in helping companies to navigate and mitigate these risks. The first method by which this was attempted was in an increased clarity on the types of actions that may be considered military or escalatory in nature. Additionally, in many cases states were necessary partners in securing any element of product delivery or operation required new physical presence in or movement into and across Ukraine.

Definition

Throughout the conflict, industry executives and civil society displayed a great deal of concern about where the line falls between civilian actors and military objectives, and how to ensure that their activities fall squarely on the civilian side of this line. Individuals and companies reiterated a desire for increased clarity on this question from Western governments and international legal bodies.116 Current humanitarian law requires the country at war to target only military objects, defined as objects “whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offers a definite military advantage” in a manner proportional to the military gain foreseen by the operation.117

In a 2023 report, the International Red Cross posited that, “tech companies that operate in situations of armed conflict should understand and monitor whether the services they provide may amount to a direct participation in hostilities by their employees and whether the company might qualify as a military objective.”118 Essentially, the line between civilian and military object is determined by Russia in its assessment of the battlespace, as well as the broader question of whether the Kremlin is concerned about staying within the bounds of international humanitarian law. The subjectivity of this divide allows for some range in interpretation.119 Indeed some, like Lindsay Freeman at UC Berkeley School of Law, argue that “civilian objects have been intentional, direct targets and not simply collateral damage.”120 Ukraine and its allies cannot simply dictate where such a line exists. However, greater clarity from national and supranational entities would provide some measure of cover to these companies and help solidify their ability to make more accurate risk calculations.121

Mitigation

For products and services that require physical presence, either of people or products, many companies view some kind of partnership with government, local or otherwise, as a virtual necessity to bridge the risk imposed.122

Cisco’s Project PowerUp, led by Senior Security Strategist Joe Marshall of Cisco Talos Intelligence Group,123 is a clear demonstration of this. The project innovated and delivered a new industrial ethernet switch that could ensure continued effective power grid management even when Russian GPS jamming blocked Ukrenergo substation synchronization, and avoid the resulting forced outages across the Ukrainian power grid.124 The delivery of these devices into Ukraine was coordinated via a phone call to a US government official who coordinated the first shipment on an upcoming cargo shipment to Poland and then onto a train into Ukraine to be installed by Ukrenergo engineers.125 While this project was conceived of and executed by Cisco employees, those involved in the project emphasized the importance of Cisco’s partnership with the US government on this, as well as other private assistance programs.126

Several governments and international organizations have established insurance programs, particularly political risk insurance to help shield companies from the financial risk of investment into Ukraine. In 2023, the Multilateral Investment Guarantee Agency of the World Bank issued guarantees of $9.1 million to support the construction and operation in the M10 Industrial Park in Lviv.127 Additionally, the US International Development Finance Corporation has established several financial packages guaranteeing millions in political risk insurance for a variety of projects.128 Within Ukraine, war and political risk insurance is offered by the Export Credit Agency, which insure loans for qualifying Ukrainian businesses against such risks, as well as for direct investment from or into Ukraine.129 The Ukrainian Ministry of Economy also drafted a law, in cooperation with the National Bank of Ukraine, which would create a unified framework for political or war risk insurance, with a focus on mitigating risks that may deter foreign investments.130

The physical element of presence in Ukraine and especially near the battlefield remains a clear demarcation between activities that are the realm of the public sector and those that are the realm of the private sector. In this area, cooperation and coordination between companies and governments could largely follow established practices and procedures. But, for technology whose infrastructure does not touch the territory of Ukraine, the question of where the line is between civilian product and military object, and where bodies like NATO, the European Union, and the United Nations would define that line to be, resembles a gradual gradient rather than a stark line.

Key takeaways and conclusion

Behind much of the discussions and debates among various groups on the role of the private sector in in the war in Ukraine is a deeper anxiety about the evolving character of warfare as we reach the quarter marker of the twenty-first century. The integration and implementation of new technologies and its effect on the practice of war is familiar territory for theoreticians and practitioners alike, from Douhet’s theories on the supremacy of air power to the revolution of military affairs (RMA) school of thought, to those today that focus on the effect of evolving drone tactics on the operation and strategy of war. Less comfortable, however, is the analysis of what changes in technology may mean in practice not just for the conduct of war itself, but more fundamentally for the very nature of actors whose abilities and choices shape the conduct of war.

Over the past few years, private companies, especially technology companies based in North America and Western Europe have made decisions as to whether and how to contribute to the Ukrainian war effort in ways that have greatly impacted the ability of the Ukrainian government to direct and effectuate its own defense. In other words, they have moved beyond the status of resource providers in this conflict toward something more resembling actors in and of themselves, at times approaching the importance of states in their contributions.

Clarity of conflict

The war in Ukraine—especially in the first months and years of the war— was notably less divisive in the court of public opinion in the West than many other contemporary conflicts. The historical context of the Russia-Ukraine relationship, along with the sustained aggression launched against Ukraine for more than a decade prior to this invasion and the nature of the invasion itself, combined with myriad factors including those discussed throughout this report, created conditions conducive to widespread sympathy and support across much of Western Europe and North America. The efforts of the Ukrainian government proactively built on these conditions both before and after the invasion. Ukrainian leaders, Zelenskyy in particular, both publicly and in private conversations with government and private sector representatives, clearly communicated the effects of Russian aggression against Ukraine and the actions undertaken by the Ukrainian government and its people.

Clarity of conflict, as a motivating factor for tech companies’ decision-making over the course of this conflict, was important in creating favorable conditions for such choices, but is not determinative. Most important as a lesson applicable in potential future conflicts, is that the seeds that grew these conditions into place were planted well before Russian forces rolled across the Ukrainian borders in February 2022.

Business alignment

Many firms had preexisting operations, employees, or customers in Ukraine—generating both a sense of duty and a pragmatic incentive to safeguard assets and personnel. Firms that were already active in Ukraine, or whose services directly contributed to protecting their employees and customers, were the most proactive and consistent contributors. Additionally, companies could derive direct or indirect benefits from their engagement. Several firms leveraged their involvement as an opportunity for product testing, cybersecurity innovation, and real-world validation of technologies under extreme conditions. In doing so, companies not only supported Ukraine’s defense but also advanced their own technical capabilities and reputational standing.

Ukraine’s long-term digital transformation further enhanced this alignment. Over the past decade, the government has implemented legal and technical reforms aimed at combating corruption and promoting digital industry growth, positioning the country as a prospective regional tech hub and a credible, innovation-friendly partner. This proactive transformation reassured corporate partners that their investments and assistance could be practicable and impactful.

For future conflicts, states will need to account for business alignment factors as an important driving factor in private sector’s decision-making. This includes the uncomfortable, yet important finding that this includes companies’ ability to profit, or at a minimum, sustain their operations in a conflict in a way that maintains their organizational health, noting that companies’ motivations will not always align with that of the states in which they are headquartered. While moral conviction catalyzed early engagement, sustained corporate involvement in Ukraine depended on alignment between ethical action and business strategy.

Difficulty of coordination

Even amid broad goodwill, the initial months of the war revealed the challenge of coordination. Companies often struggled to identify appropriate Ukrainian counterparts, assess needs accurately, or ensure that their offerings were deployed effectively. Early efforts were marked by confusion—with multiple government offices issuing overlapping requests and little centralized control. As Bornyakov later acknowledged, the early days of outreach “were chaos.”

Many of the most significant factors that shaped company involvement were already in place and being acted upon before the February 2022 Russian invasion. Preexisting relationships were key, both as a motivating factor and a facilitating factor, effectively minimizing coordination friction. Additionally, the technological and policy developments well underway before the February 2022 invasion created the appealing Ukrainian tech landscape and improved coordination necessary once the conflict was underway.

While private companies excelled in speed and agility, governments brought scale, reliability, and regulatory legitimacy. The war illustrated how preparedness for potential future conflicts will depend on preestablished coordination frameworks that merge these strengths—enabling rapid mobilization of technological capabilities, matching private capabilities with public needs in real time.

Risk of retaliation

Providing assistance to Ukraine exposed technology companies to new security risks from cyberattacks, sanctions, or kinetic threats against personnel or infrastructure. The degree of perceived risk—and retaliation—varied depending on each company’s exposure, particularly for firms whose technologies had direct military applications or some kind of physical presence.

Ambiguity around international law, cyber norms, and export controls can delay or discourage private assistance. Companies must understand whether providing certain technologies or services could be construed as escalatory, illegal, or sanctionable. Private firms are increasingly targeted in state-level cyber operations. The possibility of retaliation, in any of a myriad of forms, was a serious risk for companies aiding Ukraine; managing and sharing that risk is essential to sustaining long-term cooperation.

To mitigate these risks, Ukraine and allied governments played an essential supportive role, clarifying the boundaries between civilian and military assistance, helping companies avoid escalatory missteps and, in some cases, underwrote contracts or insurance to shield firms from loss. Such measures demonstrate the emerging need for risk-sharing frameworks between states and corporations. In cases where physical operations within Ukraine were necessary, governments provided logistical and security coordination to protect personnel and assets. Such collaboration underscores an emerging model of public-private security cooperation, wherein states and corporations jointly navigate the blurred boundaries between national defense and digital resilience.

If private technology companies’ decisions and actions are so impactful to the conduct of war, as they have shown themselves to be, then the character of warfare has evolved in such a way as to require states to likewise evolve in the ways that they provide military assistance and plan for potential future conflicts. The foundation for this evolution needs to be a greater understanding of the factors in the case of Ukraine that most greatly impacted company decision-making regarding their participation, or not, in the conflict space, starting with the four factors identified in this report: those that pulled companies toward cooperation, and those that pushed companies away. By assessing the factors that drove companies’ decision-making in Ukraine, states can better plan and prepare for future crises and conflicts—and not leave such critical capabilities, once again, to chance.

About the author

Emma Schroeder is an associate director with the Cyber Statecraft Initiative, part of the Atlantic Council Tech Programs. Her focus in this role is on developing statecraft and strategy for cyberspace useful for both policymakers and practitioners. Her work focuses on the role of cyber and cyber-enabled technology in conflict and crime.  

Originally from Massachusetts, Schroeder holds an MA in History of War from King’s College London’s War Studies Department. She also attained her BA in International Relations & History, with a concentration in Security Studies, from the George Washington University’s Elliott School of International Affairs. 

Acknowledgements

This report was made possible by the participation of dozens of scholars and practitioners who shared their expertise and experiences with the author.

Thank you to the Cyber Statecraft Initiative team for their support, particularly Nikita Shah and Trey Herr for their guidance. Particular thanks to Emerson Johnston, Grace Menna, and Zhenwei Gao for their research assistance, as well as to Nancy Messieh, Samia Yakub, and Donald Partyka for the creation and review of language and digital assets. All errors are the author’s own.

Explore the program

The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

1    All unattributed interviews were conducted in confidentiality with the author, and the names of interviewees are withheld by mutual agreement.
2    “Russia/Ukraine: Invasion of Ukraine Is an Act of Aggression and Human Rights Catastrophe,” Amnesty International, March 1, 2022, https://www.amnesty.org/en/latest/news/2022/03/russia-ukraine-invasion-of-ukraine-is-an-act-of-aggression-and-human-rights-catastrophe/.
3    “Majority back U.S. troop presence in Europe, but not in Ukraine itself,” Monmouth University Polling Institute, March 16, 2022, https://www.monmouth.edu/polling-institute/reports/monmouthpoll_us_031622/.
4    Catarina Thomson et al., “European public opinion: united in supporting Ukraine, divided on the future of NATO,” International Affairs 99, no. 6 (2023): 2485–2500, https://doi.org/10.1093/ia/iiad241.    
5    Interview with threat intelligence executive at US cybersecurity nonprofit, April 2, 2024.
6    Interview with government affairs executive at US multinational technology corporation, March 26, 2024.
7    Industry executive, IT coalition roundtable, Atlantic Council, February 21, 2024.
8    “The TechPlomacy Approach,” Ministry of Foreign Affairs of Denmark, accessed October 20, 2025, https://techamb.um.dk/the-techplomacy-approach.
9    “Mykhailo Fedorov,” Government Portal (Ukraine), accessed Oct 15, 2025, https://www.kmu.gov.ua/en/profile/mikhaylo-fedorov.
10    Interview with government affairs executive at US multinational technology company, March 26, 2024.
11    Joe Tidy, “Ukraine Crisis: Tech Firms Curb Services in Russia,” BBC News, March 4, 2022, https://www.bbc.com/news/technology-60608222.
12    Peter Guest, “Mykhailo Fedorov Is Running Ukraine’s War Like a Startup,” WIRED, July 25, 2023, https://www.wired.com/story/ukraine-runs-war-startup/?_sp=f5dd85ca-06aa-46ec-b716-b7cda17ce4f4.1721243250176. Tom Wilson, “Ukraine raises $13 million in crypto after crowdfunding appeal,” Reuters, February 28, 2022, https://www.reuters.com/world/china/ukraines-government-raises-crypto-worth-8-million-crowdfunding-appeal-2022-02-27/.
13    Guest, “Mykhailo Fedorov is Running.”
14    Interview with government affairs executive at US multinational technology corporation, August 28, 2024.
15    Mykhailo Fedorov (@FedorovMykhailo), “@elonmusk, while you try to colonize Mars — Russia try to occupy Ukraine! While your rockets successfully land from space — Russian rockets attack Ukrainian civil people! We ask you to provide Ukraine with Starlink stations and to address sane Russians to stand,” X, February 26, 2022, 7:06 a.m., https://twitter.com/FedorovMykhailo/status/1497543633293266944.
16    Elon Musk (@elonmusk), “Starlink service is now active in Ukraine. More terminals en route,” X, February 26, 2022, 5:33 p.m., https://twitter.com/elonmusk/status/1497701484003213317; Mykhailo Fedorov (@FedorovMykhailo), “Starlink — here. Thanks, @elonmusk,” X, February 28, 2022, 3:19 p.m., https://twitter.com/FedorovMykhailo/status/1498392515262746630?s=20&t=vtCM9UqgWRkfxfrEHzYTGg.
17    Jeff Foust, “SpaceX Worked for Weeks to Begin Starlink Service in Ukraine,” SpaceNews, March 3, 2022, https://spacenews.com/spacex-worked-for-weeks-to-begin-starlink-service-in-ukraine/.
18    Emma Schroeder with Sean Dack, A Parallel Terrain: Public-Private Defense of the Ukrainian Information EnvironmentAtlantic Council, February 27, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/report/a-parallel-terrain-public-private-defense-of-the-ukrainian-information-environment/.
19    Guest, “Mykhailo Fedorov is Running.”
20    Alphabet Inc., “Exhibit 99.1 (Q1 2023),” SEC EDGAR, April 25, 2023, https://www.sec.gov/Archives/edgar/data/1652044/000165204423000041/googexhibit991q12023.htm; Alphabet Inc., “Exhibit 99.1 (Q2 2023),” SEC EDGAR, July 25, 2023, https://www.sec.gov/Archives/edgar/data/1652044/000165204423000067/googexhibit991q22023.htm; Alphabet Inc., “Exhibit 99.1 (Q3 2023),” SEC EDGAR, October 24, 2023, https://www.sec.gov/Archives/edgar/data/1652044/000165204423000088/googexhibit991q32023.htm; Alphabet Inc., “Exhibit 99.1 (Q4 2023),” SEC EDGAR, January 30, 2024, https://www.sec.gov/Archives/edgar/data/1652044/000165204424000014/googexhibit991q42023.htm; The “GDP (current US$),” World Bank, accessed October 20, 2025, https://data.worldbank.org/indicator/NY.GDP.MKTP.CD.
21    “The TechPlomacy Approach.”
22    Alexander Query, “Google opens research and development center in Ukraine,” Kyiv Post, January 15, 2020 https://www.kyivpost.com/post/7682; “Ministry of Digital Transformation of Ukraine and Microsoft to Collaborate in Digital Transformation,” Microsoft, October 2, 2020, https://news.microsoft.com/en-cee/2020/10/02/ministry-of-digital-transformation-of-ukraine-and-microsoft-to-collaborate-in-digital-transformation/.
23    Interview with government affairs executive at US multinational technology corporation, March 1, 2024; Interview with government affairs executive at US multinational technology corporation, March 26, 2024;  Interview with threat intelligence executive at US multinational technology corporation, April 22, 2024, Interview with government affairs executive at US multinational technology corporation; Interview with information security executives at US intelligence and data analysis software technology corporation, May 8, 2024; Interview with subject matter expert on government cyber aid coordination, June, 17, 2024; Interview with threat intelligence executive at US multinational digital communications technology corporation, July 26, 2024; Interview with information security executive at US multinational technology corporation, August 28, 2024; Industry executive, IT coalition roundtable, Atlantic Council, February 21, 2024.
24    Interview with threat intelligence executive at US multinational digital communications technology corporation, July 26, 2024; Iain Martin, “US and Israeli Tech Companies Evacuate Ukrainian Staff From Possible Frontline,” Forbes, February 17, 2022, https://www.forbes.com/sites/iainmartin/2022/02/17/usand-israeli-tech-companies-evacuate-ukrainian-staff-from-possible-frontline/; Supantha Mukherjee and Paul Sandle, “Cisco CEO Says Quarter of Staff in Ukraine Have Left,” Reuters, March 1, 2022, https://www.reuters.com/business/cisco-ceo-says-quarter-staff-ukraine-have-left-2022-03-01/; “A Message to Team Members on the Conflict in Ukraine,” FedEx, March 4, 2022, https://newsroom.fedex.com/newsroom/global-english/a-message-to-team-members-on-the-conflict-in-ukraine.
25    Interview with threat intelligence executive at US cybersecurity nonprofit, April 2, 2024.
26    Sam Bresnick, Ngor Luong, and Kathleen Curlee, Which Ties Will Bind: Big Tech, Lessons from Ukraine, and Implications for TaiwanCenter for Security and Emerging Technology (Georgetown University), February 2024, https://cset.georgetown.edu/publication/which-ties-will-bind/.
27    “Putin signs law forcing foreign social media giants to open Russian offices,” Reuters, July 1, 2021, https://www.reuters.com/technology/putin-signs-law-forcing-foreign-it-firms-open-offices-russia-2021-07-01/; Human Rights Watch, Russia: Growing Internet Isolation, Control, Censorship, June 18, 2020, https://www.hrw.org/news/2020/06/18/russia-growing-internet-isolation-control-censorship.
28    Interview with government affairs executive at US multinational technology corporation, August 28, 2024.
29    “Google’s Russian Subsidiary Files Bankruptcy Document,” Reuters, May 18, 2022, https://www.reuters.com/markets/europe/googles-russian-subsidiary-files-bankruptcy-document-2022-05-18/; “Google’s Russian Subsidiary Recognised Bankrupt by Court—RIA,” Reuters, October 18, 2023, https://www.reuters.com/markets/deals/googles-russian-subsidiary-recognised-bankrupt-by-court-ria-2023-10-18/.
30    Google Wins UK Injunction over YouTube Block on Russian Broadcasters,” Reuters, January 22, 2025, https://www.reuters.com/technology/google-wins-uk-injunction-over-youtube-block-russian-broadcasters-2025-01-22/. 
31    Interview with executive at US multinational technology corporation, date withheld.
32    Industry executive, “Public-Private Cyber Support” Workshop, Royal United Services Institute, May 29, 2025. 
33    Interview with threat intelligence executive at US cybersecurity nonprofit, May 2, 2024.
34    Interview with business development executive at US information and communications technology corporation, July 18, 2024. 
35    Vera Bergengruen, “How Tech Giants Turned Ukraine into an AI War Lab,” TIME, February 8, 2024, https://time.com/6691662/ai-ukraine-war-palantir/.
36    Interview with information security executive at US intelligence and data analysis software technology corporation, May 8, 2024.
37    Bergengruen, “How Tech Giants Turned.”
38    Industry Executive, “Supporting Ukraine’s Warfighting Efforts with Digital Capabilities” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, September 13, 2024.
39    Bergengruen, “How Tech Giants Turned.”
40    Robert Hart, “Clearview AI: Controversial Facial-Recognition Firm Fined $33 Million for Illegal Database,” Forbes, September 3, 2024, https://www.forbes.com/sites/roberthart/2024/09/03/clearview-ai-controversial-facial-recognition-firm-fined-33-million-for-illegal-database/; Kashmir Hill, “The Secretive Company That Might End Privacy as We Know It,” New York Times, January 18, 2020, https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html.
41    Paresh Dave and Jeffrey Dastin, “Exclusive: Ukraine Has Started Using Clearview AI’s Facial Recognition during War,” Reuters, March 13, 2022, https://www.reuters.com/technology/exclusive-ukraine-has-started-using-clearview-ais-facial-recognition-during-war-2022-03-13/; Kashmir Hill, “Facial Recognition Goes to War,” New York Times, April 7, 2022, https://www.nytimes.com/2022/04/07/technology/facial-recognition-ukraine-clearview.html; Vera Bergengruen, “Ukraine’s ‘Secret Weapon’ Against Russia Is a Controversial U.S. Tech Company,” TIME, November 14, 2023, https://time.com/6334176/ukraine-clearview-ai-russia/; Drew Harwell, “Ukraine is scanning faces of dead Russians, then contacting the mothers,” Washington Post, April 15, 2022, https://www.washingtonpost.com/technology/2022/04/15/ukraine-facial-recognition-warfare/.
42    Interview with government affairs executive at US multinational digital communications technology corporation, May 2, 2024; Interview with information security executives at US intelligence and data analysis software technology corporation, May 8, 2024.
43    “Anti-Corruption Strategy for 2021–2025,” National Agency on Corruption Prevention (Ukraine), 2021, https://nazk.gov.ua/en/anti-corruption-strategy/.
44    Oleksandr Bornyakov, “Why Ukraine is Going All In on Tech to Rebuild Economy,” Fortune, August 24, 2022, https://fortune.com/2022/08/24/ukraine-going-all-in-tech-rebuild-economy-international-oleksandr-bornyakov/.
45    Integrity and Anti-Corruption Review of Ukraine, OECD Public Governance Reviews, OECD Publishing, May 2025, https://doi.org/10.1787/7dbe965b-en
46    Robert Peacock, The Impact of Corruption on Cybersecurity: Rethinking National Strategies Across the Global SouthAtlantic Council, July 1, 2024, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/the-impact-of-corruption-on-cybersecurity-rethinking-national-strategies-across-the-global-south/Software Management: Security Imperative, Business Opportunity, Business Software Alliance, June 2018, https://www.bsa.org/files/2019-02/2018_BSA_GSS_Report_en_.pdf.
47    Alona Savishchenko, “How Open Source E-procurement System Prozorro Helps to Sustain Ukrainian Economy,” Open Source Observatory, European Commission, November 19, 2024, https://interoperable-europe.ec.europa.eu/collection/open-source-observatory-osor/news/e-procurement-prozorro-support-ukrainian-economy; “EProcurement System ProZorro,” Observatory of Public Sector Innovation, https://oecd-opsi.org/innovations/eprocurement-system-prozorro/.
48    Robert Peacock, The Impact of corruptionSoftware Management, Business Software Alliance.
49    “About UNITED24,” UNITED24 – The Initiative of the President of Ukraine, accessed October 20, 2025, https://u24.gov.ua/about; Guest, “Mykhailo Fedorov is Running.”
50    Daryna Antoniuk, “Two Ukraine Cyber Officials Dismissed amid Embezzlement Probe,” The Record, November 20, 2023, https://therecord.media/two-ukraine-cyber-officials-dismissed-amid-embezzlement-probe; “Misappropriation of UAH 62 million during the purchase of software: the leadership of the State Special Communications Service is suspected,” National Anti-Corruption Bureau of Ukraine, news release (in Ukrainian), November 20, 2023, https://nabu.gov.ua/news/zavolod-nnia-62-mln-grn-pri-zakup-vl-programnogo-zabezpechennia-p-dozriu-t-sia-ker-vnitctvo-derzhspetczviazku/.
51    Interview with government affairs executive at US multinational digital communications technology corporation, May 2, 2024; Interview with information security executives at US intelligence and data analysis software technology corporation, May 8, 2024; Industry executive, “Public-Private Cyber Support” Workshop, Royal United Services Institute, May 29, 2024.
52    Bergengruen, “How Tech Giants Turned.” 
53    Bergengruen, “How Tech Giants Turned.”
54    “Ukrainian Tech Industry Shows Resilience in the Face of War — IT Research Ukraine 2024,” techukraine.org, December 5, 2024, https://techukraine.org/2024/12/05/ukrainian-tech-industry-shows-resilience-in-the-face-of-war-it-research-ukraine-2024/.
55    “Diia City,” Diia, accessed October 20, 2025, https://city.diia.gov.ua/en.
56    Mykhailo Fedorov, “Ukraine’s Vibrant Tech Ecosystem Is a Secret Weapon in the War with Russia,” UkraineAlert (Atlantic Council), August 17, 2023, https://www.atlanticcouncil.org/blogs/ukrainealert/ukraines-vibrant-tech-ecosystem-is-a-secret-weapon-in-the-war-with-russia/.
57    Greg Rattray, Geoff Brown, and Robert Taj Moore, The Cyber Defense Assistance Imperative: Lessons from Ukraine, Aspen Digital, May 2025, https://www.aspeninstitute.org/wp-content/uploads/2025/05/Aspen-Digital_The-Cyber-Defense-Assistance-Imperative-Lessons-from-Ukraine.pdf.
58    “CDAC: “The Scale of What We Can Do is Severely Hampered by not Having Funding for Dedicated Staff or to Fulfill Requirements Directly,” Common Good Cyber, May 29, 2025, https://commongoodcyber.org/news/interview-cdac-funding/.
59    Industry executive, “Public-Private Cyber Support” Workshop, Royal United Services Institute, May 29, 2024.
60    Interview with business development executive at US information and communications technology corporation, July 18, 2024; Interview with government affairs executive at US multinational digital communications technology corporation, May 2, 2024; Interview with information security executives at US intelligence and data analysis software technology corporation, May 8, 2024.
61    Interview with business development executive at US information and communications technology corporation, July 18, 2024.
62    Interview with threat intelligence executive at US cybersecurity nonprofit, April 2, 2024; Industry executive, “Supporting Ukraine’s Warfighting Efforts with Digital Capabilities” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, September 13, 2024.
63    Industry executive, “IT Coalition” Roundtable, Atlantic Council, February 21, 2024.
64    Industry executive, “Public-Private Cyber Support” Workshop, Royal United Services Institute, May 29, 2024; Industry executive, “Supporting Ukraine’s Warfighting Efforts with Digital Capabilities” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, September 13, 2024.  
65    “Cyber Defense Assistance Evaluation Framework,” Cyber Defense Assistance Collaborative, June 18, 2024, https://crdfglobal-cdac.org/cda-evaluation-framework/.
66    Peter Guest, “Mykhailo Fedorov is Running,” WIRED, July 25, 2023, https://www.wired.com/story/ukraine-runs-war-startup/.
67    Cat Zakrzewski, “4,000 letters and four hours of sleep: Ukrainian leader wages digital war,” Washington Post, March 30, 2022, https://www.washingtonpost.com/technology/2022/03/30/mykhailo-fedorov-ukraine-digital-front/.
68    Interview with tech assistance coordination executive, US nonprofit organization, July 17, 2025.
69    Bergengruen, “How Tech Giants Turned.”
70    Colin Demarest, “Data Centers Are Physical and Digital Targets, Says Pentagon’s Eoyang,” C4ISRNET, November 17, 2022, https://www.c4isrnet.com/cyber/2022/11/17/data-centers-are-physical-and-digital-targets-says-pentagons-eoyang/.
71    Oleh Ivanov, “Procurement During the Full-Scale War,” Vox Ukraine, October 14, 2022, https://voxukraine.org/en/procurement-during-the-full-scale-war.
72    “On Amendments to the Resolutions of the Cabinet of Ministers of Ukraine No. 822 of September 14, 2020 and No.169 of February 28, 2022,” Verkhovna Rada of Ukraine, June 24, 2022, https://zakon.rada.gov.ua/laws/show/723-2022-%D0%BF#n2.
73    Interview with government affairs executive at US multinational technology corporation, August 28, 2024.
74    Elizabeth Hoffman, Jaehyun Han, and Shivani Vakharia, Past, Present, and Future of US Assistance to Ukraine: A Deep Dive into the DataCenter for Strategic and International Studies (CSIS), September 26, 2023, https://www.csis.org/analysis/past-present-and-future-us-assistance-ukraine-deep-dive-data.
75    The difficulty, for the purposes of this paper, is understanding the breakdown of this assistance as it applies to digital and tech-focused aid to Ukraine. The author found examples breaking down US government assistance by general category (i.e., humanitarian, military, financial) and breakdowns of weapons systems aid (e.g., tanks and air defense systems) but little enumeration of the kind and amount of digital and tech aid provided by the US government. See “Ukraine Support Tracker,” Kiel Institute for the World Economy, updated October 14, 2025, https://www.ifw-kiel.de/topics/war-against-ukraine/ukraine-support-tracker.
76    Interview with government affairs executive at US multinational technology corporation, August 28, 2024.
77    Industry executive, “Supporting Ukraine’s Warfighting Efforts with Digital Capabilities” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, September 13, 2024; Interview with information security executive at US multinational technology corporation, August 28, 2024; Interview with threat intelligence executive and government affairs executive at US multinational digital communications technology corporation, October 2, 2024.
78    Alex Therrien and Frank Gardner, “Hegseth Sets Out Hard Line on European Defense and NATO,” BBC News, February 12, 2025, https://www.bbc.com/news/articles/cy0pz3er37jo.
79    Jon Harper,“Hegseth Puts Onus on Allies to Provide ‘Overwhelming Share’ of Weapons to Ukraine,” DefenseScoop, February 12, 2025, https://defensescoop.com/2025/02/12/hegseth-ukraine-defense-contact-group-allies-military-aid-trump/.
80    Industry executive, “Supporting Ukraine’s Warfighting Efforts with Digital Capabilities” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, September 13, 2024; Interview with threat intelligence executive and government affairs executive at US multinational digital communications technology corporation, October 2, 2024.
81    Industry executive, “Supporting Ukraine’s Warfighting Efforts with Digital Capabilities” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, September 13, 2024.
82    “UK aid to Ukraine,” Independent Commission for Aid Impact (ICAI), April 30, 2024, https://icai.independent.gov.uk/html-version/uk-aid-to-ukraine-2/.
83    Industry executive, “Public-Private Cyber Support” Workshop, Royal United Services Institute, May 29, 2024.
84    “SpaceX, USAID Deliver 5,000 Satellite Internet Terminals to Ukraine,” Reuters, April 6, 2022, https://www.reuters.com/technology/spacex-usaid-deliver-5000-satellite-internet-terminals-ukraine-2022-04-06/; Alex Marquardt, “Exclusive: Musk’s SpaceX Says it Can No Longer Pay for Critical Satellite Services in Ukraine, Asks Pentagon to Pick Up the Tab,” CNN, October 13, 2022, https://www.cnn.com/2022/10/13/politics/elon-musk-spacex-starlink-ukraine; Michael Sheetz, “Pentagon Awards SpaceX with Ukraine Contract for Starlink Satellite Internet,” CNBC, June 1, 2023, https://www.cnbc.com/2023/06/01/pentagon-awards-spacex-with-ukraine-contract-for-starlink-satellite-internet.html.
85    “United States and Ukraine Expand Cooperation on Cybersecurity,” Cybersecurity and Infrastructure Security Agency, July 27, 2022, https://www.cisa.gov/news-events/news/united-states-and-ukraine-expand-cooperation-cybersecurity; David Jones, “White House Warns of US of Possible Russian Cyberattack Linked to Ukraine Invasion,” Cybersecurity Dive, March 22, 2022, https://www.cybersecuritydive.com/news/white-house-warns-russian-cyberattack-ukraine/620755/; Egle Murauskaite, “U.S. Assistance to Ukraine in the Information Space: Intelligence, Cyber, and Signaling,” Asymmetric Threats Analysis Center (University of Maryland), February 2023, https://www.start.umd.edu/publication/us-assistance-ukraine-information-space-intelligence-cyber-and-signaling.
86    Maj. Sharon Rollins, “Defensive Cyber Warfare: Lessons from Inside Ukraine,” US Naval Institute Proceedings, June 2023, https://www.usni.org/magazines/proceedings/2023/june/defensive-cyber-warfare-lessons-inside-ukraine; “Before the Invasion: Hunt Forward Operations in Ukraine,” US Cyber Command (declassified briefing), November 28, 2022, https://nsarchive.gwu.edu/sites/default/files/documents/rmsj3h-751×3/2022-11-28-CNMF-Before-the-Invasion-Hunt-Forward-Operations-in-Ukraine.pdf; Dina Temple-Raston, Sean Powers, and Daryna Antoniuk, “Ukraine Hunt Forward Teams,” The Record, October 18, 2023, https://therecord.media/ukraine-hunt-forward-teams-us-cyber-command
87    Interview with tech assistance coordination executive at US nonprofit organization, July 17, 2025; Interview with government affairs executive at US multinational technology corporation, August 28, 2024.
88    “Interview with threat intelligence executive at US multinational technology corporation, April 22, 2024; Industry executive, “IT Coalition” Roundtable, Atlantic Council, February 21, 2024; Industry executive, “Public-Private Cyber Support” Workshop, Royal United Services Institute, May 29, 2024; Interview with threat intelligence executive and government affairs executive at US multinational digital communications technology corporation, October 2, 2024.
89    Industry executive, “Public-Private Cyber Support” Workshop, Royal United Services Institute, May 29, 2024.
90    Industry executive, “Public-Private Cyber Support” Workshop, Royal United Services Institute, May 29, 2024.
91    “Luxembourg, Estonia, and Ukraine Have Launched the IT Coalition,” Government of Luxembourg, September 19, 2023, https://gouvernement.lu/en/actualites/toutes_actualites/communiques/2023/09-septembre/19-bausch-itcoalition.html.
92    “Ukraine Defence Contact Group: Estonia and Luxembourg Announce New Contributions to IT Coalition,” European Pravda, April 8, 2024, https://www.eurointegration.com.ua/eng/news/2024/04/8/7183316/; “IT Coalition Established by Estonia and Luxembourg … Has Raised about 500 Million Euros in Its First Year,” Republic of Estonia Ministry of Defense, December 12, 2024, https://www.kaitseministeerium.ee/en/news/it-coalition-established-estonia-and-luxembourg-help-ukraine-has-raised-about-500-million-euros.
93    “IT Coalition Led by Estonia and Luxembourg Has Raised over One Billion Euros to Support Ukraine,” Republic of Estonia Ministry of Defense, May 28, 2025, https://kaitseministeerium.ee/en/news/it-coalition-led-estonia-and-luxembourg-has-raised-over-one-billion-euros-support-ukraine.
94    Industry executive, “Supporting Ukraine’s Warfighting Efforts with Digital Capabilities” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, September 13, 2024.
95    “Formalization of the Tallinn Mechanism to Coordinate Civilian Cyber Assistance to Ukraine,” US Department of State (Office of the Spokesperson), December 20, 2023, https://2021-2025.state.gov/formalization-of-the-tallinn-mechanism-to-coordinate-civilian-cyber-assistance-to-ukraine/.
96    “Tallinn Mechanism Raises €200 Million to Support Ukraine’s Resilience in Cyberspace,” Republic of Estonia Ministry of Foreign Affairs, December 20, 2024, https://www.vm.ee/en/news/tallinn-mechanism-raises-eu200-million-support-ukraines-resilience-cyberspace.
97    “Joint Statement Marking the First Anniversary of the Tallinn Mechanism,” US Department of State (Office of the Spokesperson), December 20, 2024, https://2021-2025.state.gov/joint-statement-marking-the-first-anniversary-of-the-tallinn-mechanism/.
98    Interview with government affairs executive at US multinational technology corporation, August 28, 2024; Industry executive, “Supporting Ukraine’s Warfighting Efforts with Digital Capabilities” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, September 13, 2024.
99    Rachel Lerman, “On Google Maps, Tracking the Invasion of Ukraine,” The Washington Post, February 25, 2022, https://www.washingtonpost.com/technology/2022/02/25/google-maps-ukraine-invasion/.
100    Marc Cieslak and Tom Gerken, “Ukraine Crisis: Google Maps Live Traffic Data Turned Off in Country,” BBC News, February 28, 2022, https://www.bbc.com/news/technology-60561089.
101    Interview with government affairs executive at US multinational technology corporation, date withheld.
102    Seb Starcevic, “Ukraine Slams Google for Revealing Location of Military Sites,” Politico, November 4, 2024, https://www.politico.eu/article/ukraine-google-reveal-location-military-site/; James Kilner, “Google Maps ‘reveals location’ of Ukrainian military positions,” The Telegraph, November 4, 2024, https://www.telegraph.co.uk/world-news/2024/11/04/ukraine-angry-google-maps-reveal-location-military-position/.
103    Alex Marquardt and Kristin Fisher, “SpaceX Admits Blocking Ukrainian Troops from Using Satellite Technology,” CNN, February 9, https://www.cnn.com/2023/02/09/politics/spacex-ukrainian-troops-satellite-technology/index.html.
104    “Russia Using Thousands of SpaceX Starlink Terminals in Ukraine, WSJ says,” Reuters, February 15, 2024, https://www.reuters.com/world/europe/russia-using-thousands-spacex-starlink-terminals-ukraine-wsj-says-2024-02-15/.
105    “Starshield,” SpaceX, accessed October 20, 2025, https://www.spacex.com/starshield/; Joey Roulette and Marisa Taylor, “Exclusive: Musk’s SpaceX Is Building Spy Satellite Network for US Intelligence Agency, Sources Say,” Reuters, March 16, 2024, https://www.reuters.com/technology/space/musks-spacex-is-building-spy-satellite-network-us-intelligence-agency-sources-2024-03-16/.
106    Tim Fernholz, “The Big Questions About Starshield: SpaceX’s Classified EO Project,” Payload, March 22, 2024, https://payloadspace.com/the-big-questions-about-starshield-spacexs-classified-eo-project/; Brian Everstine, “SpaceX: DoD Has Requested Taking Over Starship Individual Missions,” Aviation Week Network, January 30, 2024, https://aviationweek.com/space/spacex-dod-has-requested-taking-over-starship-individual-missions; Sandra Erwin, “Pentagon Embracing SpaceX’s Starshield for Future Military SATCOM,” SpaceNews, June 11, 2024, https://spacenews.com/pentagon-embracing-spacexs-starshield-for-future-military-satcom/.
107    Interview with information security executive at US intelligence and data analysis software technology corporation, May 8, 2024; Interview with government affairs executive at US multinational technology corporation, March 1, 2024; Industry executive, “Supporting Ukraine’s Warfighting Efforts with Digital Capabilities” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, September 13, 2024.
108    Interview with information security executive at US intelligence and data analysis software technology corporation, May 8, 2024.
109    Industry executive, “Supporting Ukraine’s Warfighting Efforts with Digital Capabilities” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, September 13, 2024.
110    Jon Bateman, Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and ImplicationsCarnegie Endowment for International Peace, December 16, 2022, https://carnegieendowment.org/research/2022/12/russias-wartime-cyber-operations-in-ukraine-military-impacts-influences-and-implications?lang=en.
111    Rafael Satter, “Satellite Outage Caused ‘Huge Loss in Communications’ at War’s Outset—Ukrainian Official,” Reuters, March 15, 2022, https://www.reuters.com/world/satellite-outage-caused-huge-loss-communications-wars-outset-ukrainian-official-2022-03-15/; Kim Zetter, “ViaSat Hack ‘Did Not’ Have Huge Impact on Ukrainian Military Communications, Official Says,” Zero Day (Substack), September 26, 2022, https://www.zetter-zeroday.com/viasat-hack-did-not-have-huge-impact/; Emma Schroeder with Sean Dack, A Parallel Terrain: Public‑Private Defense of the Ukrainian Information EnvironmentAtlantic Council, February 27, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/report/a-parallel-terrain-public-private-defense-of-the-ukrainian-information-environment/.
112    Justin Sherman, Unpacking Russia’s Cyber Nesting DollAtlantic Council, May 20, 2025, https://www.atlanticcouncil.org/content-series/russia-tomorrow/unpacking-russias-cyber-nesting-doll/.
113    Justin Sherman, Unpacking Russia’s Cyber.
114    Shane Huntley, “Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape,” Threat Analysis Group blog (Google), February 16, 2023, https://blog.google/threat-analysis-group/fog-of-war-how-the-ukraine-conflict-transformed-the-cyber-threat-landscape/.
115    “Russian GRU Targeting Western Logistics Entities and Technology Companies,” Cybersecurity and Infrastructure Security Agency, May 21, 2025, https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a.
116    Industry executive, “IT Coalition” Roundtable, Atlantic Council, February 21, 2024; Interview with government affairs executive at US multinational technology corporation, March 1, 2024; Industry executive, “Supporting Ukraine’s Warfighting Efforts with Digital Capabilities” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, September 13, 2024; Interview with information security executive at US intelligence and data analysis software technology corporation; Interview with threat intelligence executive at US multinational digital communications technology corporation, July 26, 2024.
117    International Committee of the Red Cross, Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol I), (June 8, 1977), United Nations High Commissioner for Refugees, https://www.refworld.org/docid/3ae6b36b4.html.
118    Protecting Civilians Against Digital Threats During Armed Conflict: Recommendations to States, Belligerents, Tech Companies, and Humanitarian Organizations, ICRC Global Advisory Board on Digital Threats during Armed Conflict, October 19, 2023, https://www.icrc.org/en/document/protecting-civilians-against-digital-threats-during-armed-conflict, 15.
119    Zhanna L. Malekos Smith, “No ‘Bright‑Line Rule’ Shines on Targeting Commercial Satellites,” The Hill, November 28, 2022, https://thehill.com/opinion/cybersecurity/3747182-no-bright-line-rule-shines-on-targeting-commercial-satellites/; Emma Schroeder and Sean Dack, A Parallel Terrain: Public‑Private Defense of the Ukrainian Information EnvironmentAtlantic Council, February 27, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/report/a-parallel-terrain-public-private-defense-of-the-ukrainian-information-environment/.
120    Lindsay Freeman, “Evidence of Russian Cyber Operations Could Bolster New ICC Arrest Warrants,” Lawfare, March 13, 2024, https://www.lawfaremedia.org/article/evidence-of-russian-cyber-operations-could-bolster-new-icc-arrest-warrants.
121    Industry executive, “Supporting Ukraine’s Warfighting Efforts with Digital Capabilities” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, September 13, 2024.
122    Industry executive, “Supporting Ukraine’s Warfighting Efforts with Digital Capabilities” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, September 13, 2024.
123    Joe Marshall, “Project PowerUp – Helping to Keep the Lights on in Ukraine in the Face of Electronic Warfare,” Cisco Talos Intelligence blog, December 4, 2023, https://blog.talosintelligence.com/project-powerup-ukraine-grid/
124    Joe Marshall, “Project PowerUp;” Interview with threat intelligence executive at US multinational digital communications technology corporation, July 26, 2024.
125    Sean Lyngass, “Exclusive: This Pizza Box-sized Equipment Could Be Key to Ukraine Keeping the Lights on This Winter,” CNN, November 21, 2023, https://www.cnn.com/2023/11/21/politics/ukraine-power-grid-equipment-cisco/index.html; Industry executive, “Tales from Ukraine” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, November 20, 2024; Industry executive, “Supporting Ukraine’s Warfighting Efforts with Digital Capabilities” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, September 13, 2024.
126    Industry executive, “Tales from Ukraine” Roundtable, Embassy of Estonia and the Estonian Ministry of Defense, November 20, 2024
127    World Bank Group, “MIGA Backs Industrial Park in Ukraine,” news release, September 28, 2023, https://www.miga.org/press-release/miga-backs-industrial-park-ukraine.
128    US International Development Finance Corporation, “DFC Announces $357 Million in New Political Risk Insurance for Ukraine,” news release, June 12, 2024, https://www.dfc.gov/media/press-releases/dfc-announces-357-million-new-political-risk-insurance-ukraine-russias.
129    “Your Business in Ukraine 2025,” KPMG Ukraine, March 2025, https://kpmg.com/ua/en/home/insights/2025/03/your-business-in-ukraine.html.
130    “Developments in War‑Risk Insurance Products for Investments in Ukraine,” Dentons, December 5, 2024, https://www.dentons.com/en/insights/articles/2024/december/5/developments-in-war-risk-insurance-products-for-investments-in-ukraine.

The post Building the digital front line: Understanding big tech decision-making in Ukraine appeared first on Atlantic Council.

]]>
Minsk in Moscow’s grip: How Russia subjugated Belarus without annexation https://www.atlanticcouncil.org/content-series/russia-tomorrow/minsk-in-moscows-grip-how-russia-subjugated-belarus-without-annexation/ Thu, 13 Nov 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=887034 The latest report in the Atlantic Council's Russia Tomorrow series examines how Belarus moved from close relations with Russia to full-scale integration under the Kremlin.

The post Minsk in Moscow’s grip: How Russia subjugated Belarus without annexation appeared first on Atlantic Council.

]]>

Russia’s full-scale invasion of Ukraine in February 2022 challenged much of the common Western understanding of Russia. How can the world better understand Russia? What are the steps forward for Western policy? The Eurasia Center’s new “Russia Tomorrow” series seeks to reevaluate conceptions of Russia today and better prepare for its future tomorrow.

Table of contents

For about five years, from 2015 to 2020, Belarus created an illusion that it was changing: a deceptive glimmer that suggested its leader, Alyaksandr Lukashenka, might steer his country away from Russia’s orbit and toward greater independence. In hindsight, this false dawn only masked the tightening grip of Moscow.

Two myths fueled misplaced optimism. First, there was a belief that Belarus could balance between the East and West through a multivector foreign policy. Second, there was a hope that Minsk’s limited reforms, release of some political prisoners, and especially its refusal to unconditionally back Moscow in the 2014 annexation of Crimea and intervention in the Donbas signaled a liberalizing turn. Both illusions ultimately frayed during this period.

At first, Lukashenka positioned Belarus as a neutral host for peace talks on the Ukraine conflict—not a participant. The Minsk agreements of 2014 and 2015 fed Western hopes: Belarus as mediator, not accomplice. Lukashenka even rejected Russian demands for a new Russian airbase in Belarusian territory, wary of appearing too dependent.

A partial thaw followed. Some Belarusian political prisoners were released. The European Union (EU) lifted sanctions. Western officials applauded Lukashenka’s apparent pragmatism. Engagement resumed.

But beneath the surface, nothing fundamentally changed. The regime remained authoritarian and Soviet in ethos. The security apparatus stayed intact. Dissent was managed, not tolerated. And Moscow remained the indispensable lifeline—providing cheap energy, market access, and strategic cover.

By the end of the decade, the signs were unmistakable. Crackdowns against dissent intensified. Economic dependence on Moscow deepened. Russia’s regional aggression hardened. The scaffolding of sovereignty remained, but the core was hollow.

When mass protests erupted in 2020 and the West recoiled at the regime’s violent crackdown on peaceful demonstrators in 2020, Lukashenka had only one direction to turn. The illusion of neutrality collapsed. So did the myth of a buffer state. What had once looked like strategic balance was instead a drift toward absorption into Russia.

A rapid unraveling ensued. After the extreme crackdown on protesters came the forced landing of a Ryanair flight to detain a dissident journalist and the weaponization of migration at EU borders, both in 2021. Clearly, Lukashenka was no longer playing both sides. He had chosen one—and it was Moscow’s.

This report examines how Belarus moved close relations with Russia to full-scale integration under the Kremlin. From political alignment to economic subjugation. From linguistic erasure to cultural annexation. What looked like independence was dependency in disguise.

Yet beneath this transformation lies a deeper truth: Belarusians themselves have not chosen this path. Public opinion surveys consistently show opposition to war and to nuclear weapons on Belarusian soil. They reject the loss of sovereignty and the transformation of Belarus into a Russian-controlled satellite. The regime has chosen absorption. The people have not.

The following chapters trace Belarus’s evolution into a de facto Russian outpost: militarily, politically, diplomatically, economically, and culturally. They also outline strategic options for ensuring that Belarus’s future is not decided solely in Moscow.

Sovereignty eroded: How Belarus became a Russian satellite

Lukashenka’s proclaimed neutrality during Russia’s 2014 invasion of Ukraine was always a fiction. Belarus remained a loyal authoritarian ally, making no meaningful reforms. Still, until 2020, Minsk maintained a degree of strategic flexibility, balancing deep ties with Moscow against limited outreach to the West and to China. Now, however, the question is no longer whether Belarus is drifting into Russia’s orbit but how much autonomy Lukashenka still retains.

From the start of his presidency in 1994, Lukashenka aligned himself with Moscow, consolidating domestic power by dismantling democratic institutions and suppressing dissent. He courted Russian elites and even positioned himself in the 1990s as a possible successor to President Boris Yeltsin, garnering the support of some nationalists in Russia. His ambition culminated in the 1999 Union State Treaty, a blueprint for deep integration: shared currency, joint institutions, and equal rights for citizens. But when Russian Federation President Vladimir Putin came to power in 2000, Lukashenka’s dreams of entering the Kremlin were dashed. Putin used that treaty to attempt to end Belarusian sovereignty. 

As a result, for over two decades, Lukashenka stalled implementation of the Union State Treaty, using the illusion of progress to extract economic concessions from the Kremlin—especially cheap energy—while avoiding genuine integration.

That strategy started to unravel in the late 2010s. Frustrated by Minsk’s endless demands for cheaper energy prices, Moscow began tying economic support to political concessions. In 2019, the two sides drafted thirty-one road maps for integration. Lukashenka sought better economic terms; Moscow wanted alignment. When Belarusians protested, he let the demonstrations proceed: a signal to Putin that public backlash might limit his flexibility.

Everything changed after the fraudulent 2020 presidential election, in which Lukashenka claimed victory over popular opposition forces led by Sviatlana Tsikhanouskaya. Mass protests left Lukashenka isolated and unrecognized by the West. Desperate, he turned fully to Moscow, and Putin seized the opportunity. In November 2021, Belarus and Russia formally endorsed twenty-eight Union State programs, reviving integration plans that aimed to harmonize legal systems, unify markets, and align policies in energy, finance, customs, and taxation. Though framed as cooperation, these measures eroded Belarusian sovereignty.

Implementation continues today with minimal transparency. Lukashenka maintains vague, noncommittal rhetoric, but the direction is clear: Moscow is embedding itself deeper into the Belarusian state. If enacted in full, these reforms would strip Belarus of real independence in key areas of governance.

The most sensitive areas—oil, gas, taxation, and customs—expose the imbalance. While the creation of a joint energy market remains stalled and more controversial steps like a single currency or union parliament have been deferred, integration is advancing quietly. A unified tax system is particularly telling. It includes a common policy, a supranational committee, and a Russian-designed digital platform with access to centralized taxpayer data. Lukashenka insists Belarus still makes its own decisions, but Moscow now has unprecedented access to its economic infrastructure.

The same dynamic plays out in customs. Lukashenka’s proposed joint customs group, framed as merely advisory, opens the door to deeper dependency. The more Russia shapes Belarus’s regulatory and administrative frameworks, the less independent Minsk becomes as bureaucracies are built to serve Moscow’s interests.

Technically, Belarus retains sovereignty—just as other members of Russia-led blocs do, including the Eurasian Economic Union (EAEU) and the Collective Security Treaty Organization (CSTO). These alliances offer the illusion of multilateralism, but are structured to preserve Russian dominance. 

Russia’s intentions are not subtle. In a 2021 essay, Putin asserted that Russians, Ukrainians, and Belarusians form a “triune Russian nation,” denying Belarus a distinct identity. Lukashenka has echoed this logic, repeatedly affirming Belarus’s eternal closeness to Russia. Yet he continues to resist full annexation. Maintaining the appearance of sovereignty helps him contain domestic resistance and preserve what limited international engagement remains. For now, Russia seems content with this arrangement: decisive control without the complications of formal annexation.

Most Belarusians support independence. But every concession, every road map, chips away at the country’s ability to determine its future. Lukashenka has traded that future to retain power. Belarus remains a state in name—but, increasingly, a satellite in function.

Military merger: From troublesome ally to armed outpost

When Russia launched its full-scale invasion of Ukraine in February 2022, NATO’s eastern flank faced a new reality. Belarus opened its skies, railways, and military infrastructure to support Moscow’s assault.

What began as logistical support has since evolved into something far more permanent: the transformation of Belarus into a de facto military outpost of the Russian state. Behind the facade of sovereignty, Lukashenka’s regime has traded independence for protection, welcoming Russian troops, hardware, and even nuclear weapons onto Belarusian soil.

Before 2022, Russia’s permanent military presence in Belarus was limited to two Soviet-era facilities: the Hantsavichy missile warning station and the Vileyka naval communication center. Moscow sought to expand its footprint as early as 2013, aiming for permanent bases and deploying fighter jets. But Lukashenka resisted. Particularly after Russia’s annexation of Crimea and armed intervention in the Donbas in early 2014, he avoided the optics of occupation, maintaining the appearance of a balancing act between the East and West. He hosted the Minsk peace talks, freed some political prisoners, courted Western engagement, and even refrained from recognizing Crimea’s annexation, while publicly mocking the Kremlin’s “Russian World” ideology.

That balancing act ended after the August 2020 fraudulent election and the mass protests that followed, when Lukashenka relied heavily on Moscow’s political and security support to stay in power. In early February 2022 Belarus held a constitutional referendum—under conditions of repression and with no genuine debate—that ended the country’s nuclear-free status. The timing was no coincidence: Within days, Russia launched its invasion of Ukraine. And Belarus was complicit from day one.

Since then, Belarus has allowed its territory and infrastructure to be used by Russian forces. Military and civilian airfields—including Homiel airport—have served as operational hubs for launching missile and drone attacks, conducting maintenance, and supporting logistics for Russian military operations against Ukraine.

But Belarus provided more than runways. Its integrated air defense systems, navigation networks, and flight control infrastructure supported Russian operations. The Mazyr Oil Refinery fueled the war machine. Belarusian railways became arteries of invasion, shuttling tanks, troops, and ammunition across the Ukrainian border. Belarusian roads, depots, and logistics hubs sustained the assault on Kyiv.

​​By December 2022, the depth of this integration became unmistakable. Putin announced that Belarusian SU-25 aircraft would be modified to carry nuclear weapons and that Russia’s Iskander-M missile systems—capable of carrying nuclear payloads—had been delivered to Belarus. Because the operational control remained with Russia, the symbolic shift was profound.

Russian President Vladimir Putin and Belarusian President Alexander Lukashenko take part in a signing ceremony following a meeting of the Supreme State Council of the Union State of Russia and Belarus in Minsk, Belarus December 6, 2024. Sputnik/Gavriil Grigorov/Pool via REUTERS.

Meanwhile, Belarus’s defense industry quietly joined the war effort: repairing Russian tanks, modernizing aircraft, and supplying optical systems for missiles. Trains loaded with weapons and parts began moving in both directions, solidifying a more profound military-industrial interdependence.

Between February 2022 and March 2023, more than seven hundred missiles were launched from Belarus into Ukraine. However, as the front lines stabilized, Belarus’s role shifted from an active launchpad to a strategic rear base.

In October 2022, as Ukrainian counteroffensives gained ground, Minsk and Moscow activated the Regional Grouping of Forces (RGF), a bilateral military formation that provided legal cover for new Russian deployments. Around nine thousand Russian troops, along with hundreds of tanks and artillery systems, arrived in Belarus under a joint command. The RGF marked a turning point: ad hoc cooperation became institutionalized military integration.

By mid-2023, most Russian troops deployed under the RGF had withdrawn, likely due to manpower constraints elsewhere. But the infrastructure remained—ready for rapid reactivation.

In March 2023, Putin announced that Russia had reached an agreement with Belarus to station tactical nuclear weapons on Belarusian territory, with the construction of a special storage facility to be completed by July. The establishment of a Russian military base complete with nuclear weapons would significantly increase Moscow’s leverage over Belarus and cement Putin’s grip on the country.

By early 2023, Belarusian crews had completed training on using the Iskander tactical missile system for potential nuclear strikes. However, independent monitors have found no visual evidence of actual nuclear weapon deployments in Belarus, casting doubt on whether Moscow’s nuclear rhetoric reflects the reality on the ground.

Throughout 2024, Belarus adopted a new military doctrine that codified deeper integration with Russia’s armed forces. For the first time, it explicitly allowed the deployment and potential use of Russian tactical nuclear weapons on Belarusian territory—framed as a deterrent against external threats. In practice, the doctrine handed Moscow strategic leverage near NATO’s borders, while letting Lukashenka claim a protective nuclear umbrella at home. The price was a further erosion of Belarusian autonomy.

Even as Russian MiG-31K fighters armed with hypersonic Kinzhal missiles maintained their presence on Belarusian territory, keeping Ukraine’s air defenses on constant alert, the relationship was becoming institutionalized rather than episodic.

In December 2024, Russia and Belarus signed the Treaty on Security Guarantees under the Union State framework. The agreement enabled permanent Russian bases and deployments in Belarus and committed both sides to mutual defense—including in response to threats against “sovereignty” or “constitutional order.” It further folded Belarus into Russia’s nuclear deterrence strategy.

As of mid-2025, roughly two thousand Russian military personnel remain in Belarus, including air defense units and aerospace forces. Russian operations continue from key locations, such as the Mazyr (Bokau) and Ziabrauka airfields.

New satellite imagery from May 2025 revealed expanded infrastructure at the Asipovichy base: new fencing, loading platforms, and air defenses—all consistent with preparations for storing and potentially deploying tactical nuclear weapons.

While Belarus has gestured toward de-escalation, suggesting it might scale back the Zapad-2025 joint exercises with Russia, these moves are largely symbolic and likely reflect Russia’s shifting priorities on the battlefield rather than a genuine reduction in military activity. In September, separate large-scale drills took place—both the Zapad-2025 exercises and joint CSTO operations—keeping the region on edge. 

Meanwhile, Minsk confirmed plans to host the Oreshnik missile system; Russia has already used this system in strikes against Ukraine. For Lukashenka, this is both a pledge of loyalty to Putin and a way to remain strategically indispensable.

In less than three years, Belarus has transitioned from a reluctant ally to a satellite state. Lukashenka has surrendered control over the country’s military and security policy in exchange for Kremlin backing. The result: Belarus is now a forward base for Russian aggression—potentially with nuclear weapons.

This development reshapes NATO’s eastern frontier, attempts to legitimize the forward deployment of Russian nuclear assets, and dismantles the boundaries between sovereign ally and subjugated proxy. The implications are stark. A former buffer state has become a Russian military outpost. Belarus is on the front line of Russia’s war against Ukraine and the West. 

From fence-sitter to foot soldier: How Belarus lost its foreign policy

After Lukashenka spent decades creating the illusion of maneuvering between the East and West to preserve regime autonomy, poof—it’s gone. Since Russia’s full-scale invasion of Ukraine in 2022, Belarus’s foreign policy has collapsed into a one-way street leading straight to Moscow.

Facing sweeping Western sanctions and mounting isolation, the Belarusian regime claims to be pivoting toward Asia, Africa, and Latin America. Officials describe this reorientation as a strategic reset, aimed at offsetting annual losses estimated at $16 billion to $18 billion due to sanctions. But the pivot is largely rhetorical. Minsk’s global engagement has narrowed to improvised alliances, symbolic gestures, and tactical outreach.

Lukashenka’s facade of neutrality—avoiding recognition of Russia’s annexation of Crimea and refraining from endorsement of Kremlin claims over Abkhazia and South Ossetia—crumbled in 2021 when he acknowledged Crimea as Russian territory. By 2024, he was hosting bilateral meetings with Denis Pushilin, the Moscow-backed head of the self-proclaimed Donetsk People’s Republic.

At the United Nations, Belarus has become one of Moscow’s most reliable allies. On March 2, 2022, it was one of just five countries to vote against a resolution condemning Russia’s invasion of Ukraine—alongside North Korea, Eritrea, Syria, and Russia itself. Diplomatic independence has all but evaporated.

Western sanctions have gutted Belarus’s traditional export markets. In 2019, Belarus exported goods valued at $8.5 billion to the EU. By 2024, that figure had dropped to just over $1 billion. Potash, oil products, and timber—key sources of revenue—have been hard-hit.

In response, Lukashenka launched an outreach campaign focused on the Global South. He visited Equatorial GuineaKenya, and Zimbabwe, promising closer ties and “anti-colonial solidarity.” Yet these trips have produced little beyond vague memoranda and photo ops. The case of Zimbabwe is telling: Lukashenka offered tractors and equipment, and trade reached $25 million in 2021. More significant, however, are Belarusian elite links to Zimbabwe’s gold and lithium sectors, and growing military ties between the two regimes. These are not signs of diversification, but transactions rooted in authoritarian clientelism.

Nowhere is the asymmetry of Belarus’s foreign policy more visible than in its relationship with China. While Minsk promotes Beijing as a key partner, the reality is marked by caution, imbalance, and diminishing returns. Lukashenka’s fifteenth visit to Beijing, delayed until June 2025, was described in state media as “family style,” which sounds like a cozy familiarity but produced no major agreements. 

Belarus remains a logistical node in China’s Belt and Road Initiative, but its value has declined amid the war in Ukraine and Western sanctions. In 2024, Lukashenka announced fifteen new “strategic” Chinese investment projects totaling three billion dollars, but much of this support is conditional and geared toward Chinese interests. The China-Belarus Industrial Park Great Stone lacks fresh momentum. With Western investors gone, it increasingly targets Russian and domestic firms.

Belarus’s 2024 accession to the Shanghai Cooperation Organization was meant to signal a turn from the West. In practice, trade with China is lopsided. Belarus exports potash and foodstuffs, while importing higher-value Chinese machinery and electronics. Belarusian defense firms are incorporating Chinese components into optics used by Russian tanks. In July 2024, Chinese and Belarusian troops held joint drills near NATO’s borders. The two countries have also codeveloped the Polonez multiple-launch rocket system.

Even as formal economic cooperation stalls, Lukashenka remains politically useful to Beijing. His public support for China on the status of Taiwan and Hong Kong reinforces shared authoritarian alignment. As China expands its global reach, Belarus’s transit infrastructure may retain some relevance. But the broader partnership remains shallow. China is watching carefully, but is not investing heavily. Not yet.

With traditional diplomacy in ruins, Minsk has embraced a model of “shadow diplomacy,” a murky blend of military deals, sanctions evasion, and autocratic alignment. The United Arab Emirates (UAE) has emerged as a key enabler. A UAE-based company acquired the Belarusian arm of Austria’s Raiffeisen Bank after it came under pressure to exit. Investigative journalists from the Belarusian Investigative Center and the Organized Crime and Corruption Reporting Project network have alleged Dubai’s involvement in laundering Belarusian assets through shell companies.

Ties with Iran have deepened. Since 2023, Minsk and Tehran have signed a string of defense agreements. A 2023 Kyiv Post article, citing unconfirmed reports and Western analysts, suggested Belarus may begin producing Iranian Shahed drones. During the 2024 military parade in Minsk, Belarus showcased its domestically produced “Geran” strike drones—closely resembling the Iranian Shahed-136 model widely used by Russia in Ukraine—marking their first public appearance. Defense ministers have met repeatedly, underscoring the growing military dimension of the partnership.

Meanwhile, Belarus is bypassing Western restrictions via new trade corridors. In 2024, the port of Makhachkala in Dagestan began handling Belarusian potash as part of the North-South Transport Corridor linking Russia and Iran.

Despite occasional overtures, such as Lukashenka’s claimed willingness to mediate peace or restore dialogue with Washington, the regime shows no signs of meaningful reform. Recent prisoner releases have been tokenistic, used as bargaining chips rather than a shift in policy.

Belarus’s foreign messaging now mirrors the Kremlin’s almost entirely. From Ukraine to NATO to US policy, Minsk speaks with Moscow’s voice. The country that once sought to straddle the East-West divide has become, decisively, a satellite of its eastern neighbor.

Hostile takeover: Russia’s control of Belarus’s economy

Since 2020, Belarus has undergone a profound economic shift: not toward growth or innovation, but into near-total dependence on Russia. What may look to some like recovery is, in fact, economic subjugation. Following a 4.7 percent decline in gross domestic product (GDP) in 2022 due to Western sanctions, the Belarusian economy rebounded by 4 percent in 2024, according to the World Bank. But this growth was driven to a large extent by Russian demand. Today, nearly every major Belarusian export, investment, and banking channel runs through Moscow. Belarusian factories feed Putin’s war machine, the Russian ruble dominates the Belarusian ruble, and tens of thousands of skilled workers have fled to EU countries. This is not a partnership—it’s an economic takeover. Russia no longer needs troops in Belarus to control it; it already controls the country through trade, credit, and industry.

State-owned enterprises have been systematically repurposed to support the Kremlin’s war in Ukraine. Electronics firms like Integral and JSC Planar, once producers of civilian components, now supply Russian weapons manufacturers. Backed by nearly $120 million in Russian investment, Integral produces microchips found in Russian cruise missiles. Legmash in Orsha, which once manufactured textile machinery, now produces components for the Grad multiple rocket launchers. StankoGomel builds machine tools for the Russian arms industry. Textile giant Mogotex signed a contract with Chechnya’s Erzu to produce military uniforms.

Even before the full-scale invasion, Belarus played a significant role in Russia’s military supply chains, but recent disclosures reveal a dramatic escalation. By early 2025, according to BelPol, a group of anti-regime former security officers, at least 287 Belarusian state enterprises have become involved in producing weapons, components, or munitions for Russia, with the real figure potentially approaching 500 when private firms are included. Belarusian factories now manufacture or supply everything from artillery shells and rocket parts to drones and electronics components, making the country a crucial node in the Russian military-industrial complex.

Belarus’s economy has long mirrored its authoritarian politics: centralized, state-controlled, and resistant to market reforms. Under Lukashenka, state-owned enterprises still account for more than half of GDP. This Soviet-style model prioritizes loyalty over innovation—a vulnerability Putin has exploited. 

Today, up to 70 percent of Belarus’s exports flow to Russia. When including transit through Russian-controlled ports and railways, Moscow effectively controls more than 90 percent of Belarus’s outbound trade.

This near-total dependence extends beyond simple trade flows. With traditional European export routes blocked, Belarus has become locked into Russian transit corridors. In 2023, Belarusian exporters utilized twenty Russian ports, double the number from the previous year. Even goods destined for third countries must pass through Russia, inflating costs and shrinking profit margins. Key exports, such as potash and oil products, are especially vulnerable, with state-owned producer Belaruskali facing costly delays at Russian-controlled ports.

Moreover, Belarus’s fiscal survival depends almost entirely on Russian support. The country owes roughly eight billion dollars in intergovernmental loans to Russia, making it Moscow’s largest debtor. Last year, Russia granted a seven-year deferral on debt repayments—effectively writing a blank check to preserve Lukashenka’s loyalty.

The Belarusian ruble is informally pegged to a currency basket, half of which is the Russian ruble, meaning it rises and falls with Moscow’s economic fortunes, limiting Minsk’s ability to pursue an independent monetary policy.

Russian banks now handle an increasing share of Belarusian exports, while local financial institutions have been integrated into Russia’s payment and messaging systems. Western sanctions have forced Belarus to adopt Russian digital infrastructure—from tax administration tools to consumer payment platforms—further eroding what remains of its economic sovereignty.

In 2024, more than half of foreign direct investment in Belarus came from Russia. Under the banner of “import substitution” and joint ventures, Russian firms aren’t merely filling gaps left by departing Western companies, they’re systematically displacing Belarusian competitors in a quiet economic conquest.

For Belarusian manufacturers, access to the Russian market represents both a lifeline and a trap. The more dependent they become on Russian demand, the more vulnerable they are to Moscow’s political whims. In critical sectors, Russia has evolved from the largest customer to the sole customer, giving Putin effective veto power over Belarus’s industrial base.

This process is hollowing out Belarus’s economy from within. Domestic policies—such as price freezes and retaliatory sanctions—have only added strain. Prices are rising, and consumer choice is shrinking. When Lukashenka occasionally pushes back, such as blocking McDonald’s rebranding to Russia’s “Vkusno i Tochka” (which means “Tasty, Period”) and instead insisting on a Belarusian brand, these gestures prove meaningless against the broader trajectory of economic surrender.

Nowhere is Belarus’s decline more visible than in its once-thriving information technology (IT) sector, formerly a symbol of innovation and Western integration. The transformation has been devastating: IT exports plummeted 45 percent from $3.2 billion in 2021 to $1.8 billion in 2023, while the sector shed over 19,000 workers.

Russian investors, who previously comprised just 10 percent of foreign IT involvement, now account for nearly a third of the market. While these contracts offer short-term stability, they represent a strategic dead end: constraining growth potential, limiting global market access, and tying Belarus’s technological future to Russia’s isolated digital ecosystem.

The brain drain extends beyond IT. As Belarus’s most talented professionals flee westward, the country loses not just individual expertise but entire innovation networks that took decades to build. This hemorrhaging of human capital ensures Belarus’s long-term economic stagnation regardless of short-term Russian subsidies.

Cultural hegemony: The appropriation of media and education 

Moscow is attempting to methodically redefine what it means to be Belarusian. Since the mass protests following the flawed election of August 2020, the Kremlin has fused its propaganda machine with Minsk’s state media, rewritten school curricula, and flooded the cultural sphere with programming promoting “brotherly unity.” The objective is unmistakable: erase the idea that Belarus can stand apart from Russia.

Russian cash and consultants now dictate prime-time narratives across Belarusian television. A joint history textbook portrays Belarus as a junior branch of Russian civilization, while concert stages and museums celebrate Kremlin-approved myths, silencing dissenting voices. This soft-power offensive, reinforced by Lukashenka’s brutal repression, amounts to a slow-motion annexation of memory and identity.

The transformation began in August 2020, when Belarusian state media workers walked off the job to protest the regime’s violent crackdown on peaceful demonstrators. Almost immediately, rumors spread that Russian journalists—particularly from Kremlin-backed outlets like RT—had replaced them. Lukashenka fueled the speculation by publicly thanking Russian media, while RT admitted only to “advising” local teams.

Soon after, state channels began parroting Moscow’s talking points. Anti-Western and anti-Ukrainian rhetoric surged. When Russia launched its 2022 invasion of Ukraine, Lukashenka was framed as a bystander, even as Belarusian territory was used as a launchpad for missile strikes and military operations. 

Russia isn’t just influencing Belarusian media—it’s bankrolling it. In 2025, a new Union State joint media holding is set to launch with a budget of one billion Russian rubles (approximately eleven million dollars), headquartered in Moscow with a representative office in Minsk. The venture will encompass television, radio, and print outlets, marking a significant step toward media integration under Kremlin direction. In February, RT hosted a two-day “media school” at the Russian House in Minsk, an unmistakable effort to cultivate a new generation of regime-aligned Belarusian journalists.

Independent outlets, by contrast, are suffocating. Since 2020, the Information Ministry has blocked about eighteen thousand websites, branding nearly seven thousand as “extremist.” Dozens of newsrooms have fled abroad; those that remain work under constant threat. For most Belarusians, uncensored news is becoming increasingly scarce.

After the 2020 protests, the regime also sharply curtailed academic freedom. Student activism is met with expulsions, imprisonment, forced “repentance” videos, and mobile court trials held at universities. The government has intensified its ideological campaign, blaming “internet technologies” and foreign influence for corrupting students and responding with stricter controls on campus life.

This campaign extends into all areas of student life. In 2023, Belarus’s largest university banned Valentine’s Day, citing it as “too Western,” following a previous ban on Halloween for similar reasons. Since 2024, military training has been introduced into curricula, and even kindergartens now host military-themed events.

The state is also strangling educational choice. Licensing rules adopted in 2022 shut dozens of private schools and those that have survived face intrusive oversight. Belarusian-language teaching is in decline: Fewer than one in ten pupils study it, and no university offers a full Belarusian curriculum. In 1999, 86 percent of citizens identified Belarusian as their native language; by 2019, that figure had dropped to 61 percent and continued to fall.

At the same time, Belarusians are being steered toward Russian universities. State‑funded places for Belarusians at Russian universities jumped from 72 in 2019 to 1,300 in 2023—plus an unprecedented 30,000‑seat quota through the Rossotrudnichestvo exchange program. The Kremlin is grooming a generation whose professional networks and intellectual loyalties lie in the East, not the West.

Russia’s cultural dominance in Belarus has grown in parallel with its political and media influence. Joint exhibitions, concerts, and museum partnerships—especially those highlighting shared military history—further embed Belarus within Russia’s ideological orbit.

Events like the Slavianski Bazaar celebrate “Slavic unity,” but the content increasingly serves pro-Kremlin narratives. Russian artists who openly support Moscow’s foreign policy are welcomed, while Belarusian and Western performers and authors critical of the war in Ukraine or Lukashenka’s regime are banned.

Since 2020, independent Belarusian culture has been gutted. State funding has shifted toward Russian-backed projects, leaving little room for local voices. The result is a cultural landscape where Belarus’s distinct identity is increasingly blurred and, in many cases, erased.

What Belarusians really want

Most Belarusians aren’t choosing Russia’s path—they’re being dragged down it.

While the Kremlin tightens its grip on Belarus’s military, economy, and foreign policy, public opinion tells a very different story. Independent polling consistently shows that the Belarusian people reject war, oppose Russian nuclear deployments, and are uneasy about their country’s deepening dependence on Moscow.

Over 85 percent of Belarusians oppose sending troops to fight in Russia’s war against Ukraine, and more than half disapprove of missile attacks launched from Belarusian soil. These numbers have remained remarkably stable over time, signaling deep and consistent anti-war sentiment that transcends political divisions. Belarusians want stability, but not if it means becoming a launchpad for Russian aggression.

Russian nuclear weapons represent another red line. Two-thirds of Belarusians oppose their deployment on Belarusian territory, though support has ticked up slightly since Moscow reportedly moved tactical nuclear weapons into the country in 2023. This resistance to militarization extends to broader security arrangements. Support for remaining in the Russia-led Collective Security Treaty Organization dropped from 63 percent in 2020 to 54 percent in 2023. When Russia invaded Ukraine, more Belarusians briefly preferred remaining outside any military bloc than staying in the CSTO—showing growing distrust of Russian-led alliances. These trends suggest Belarusians are not deeply attached to such alliances and may be open to neutrality or alternative security options.

Geopolitical preferences reveal a more complex picture. While half of Belarusians still back an alliance with Russia, 16 percent favor alignment with the EU, and 30 percent support neutrality. More telling, 57 percent believe Belarus should improve ties with the EU, with 37 percent specifically wanting stronger trade relationships.

Support for NATO remains low, between 6 percent and 11 percent, typically, but this reflects mistrust on all sides, limited access to open debate, and years of regime-driven anti-Western messaging rather than wholehearted embrace of Russia. Importantly, even among those who back integration with Russia, few envision a single state. Belarusians may accept cooperation, but not annexation.

Media access explains much of this complexity. Among those who rely on state-controlled media, 63 percent support closer ties with Russia and only 2 percent support EU integration. However, among consumers of independent media, the numbers flip: 44 percent support moving toward Europe, while just 11 percent back greater integration with Russia.

This data point carries profound implications for Western strategy. Propaganda works, but only when it monopolizes the conversation. Where independent journalism survives, even underground or in exile, it shapes opinions and maintains space for alternative futures. Belarusians who access independent information are more likely to oppose war, support Ukraine, and envision a sovereign development path.

The regime may have crushed street protests, but resistance persists through underground sabotage, cyber leaks, and digital dissent. These aren’t isolated acts of defiance; they signal a society that refuses to surrender its agency.

Belarusians are not ideologues. They are pragmatic. While geopolitical views are fragmented, public support for economic reforms is strong. Nearly 80 percent support fair competition between the public and private sectors. Most also want stock market development, tax cuts for small businesses, and less state interference.

That said, there are anxieties. Inflation, shrinking social safety nets, and the risk of economic shock are real concerns. Attitudes are nuanced: people support market mechanisms but fear short-term pain. Trust in the business elite is limited, but support for entrepreneurship is high.

The regime’s choices do not reflect the will of the Belarusian people. Most Belarusians oppose the war, reject nuclear deployments, and favor neutrality over dependence on Moscow. Despite repression and propaganda, quiet resistance persists: in attitudes, media habits, and daily acts of dissent. This gap between state and society is strategic. The regime is brittle; the people are not. Western policy must begin here: Belarus is not lost, and its future is still in play.

Conclusion

Belarus has not been formally annexed, but it has been absorbed. Militarily, politically, economically, and culturally, it has become a Russian outpost: a launchpad for aggression and repression alike. Yet this transformation is not complete, and it is not irreversible. The Belarusian regime survives through coercion and dependence, not legitimacy. Beneath the surface lies a society that still aspires to sovereignty, stability, and connection to the democratic world.

This report has shown how absorption happened, sector by sector—but also why it matters. A captive Belarus threatens NATO’s flank, enables Kremlin aggression, and offers a template for authoritarian consolidation elsewhere. For the United States and its allies, the time to act is now. Containing Russia, defending Europe, and supporting democracy all run through Minsk. The path to long-term regional security runs not only through Kyiv but also through a free and sovereign Belarus.

Belarus in the balance: Strategic recommendations for US and allied policy

The West can no longer afford to treat Belarus as a sideshow. Since Russia’s full-scale invasion of Ukraine, Belarus has become a critical platform for Kremlin aggression: militarily, economically, and ideologically. Restoring Belarusian sovereignty is now a strategic imperative for NATO’s eastern security and the broader defense of democratic values.

To counter Belarus’s deepening alignment with Russia, Western policymakers must adopt a four-part strategy: reframe Belarus as a frontline issue, enforce synchronized pressure, build democratic resilience, and prepare for regime rupture.

First, the United States must elevate Belarus as a national security priority. It should be fully integrated into NATO and EU threat assessments, treated alongside Ukraine and the Baltic states in strategic planning. Russian bases, nuclear deployments, and hybrid threats from Belarus are not theoretical: They are already altering Europe’s security landscape.

Second, sanctions must be expanded, enforced, and fully aligned with allies. Belarus is a central hub for sanctions evasion and war logistics, leveraging smuggling networks, trade rerouting, and Russian support. The United States, the EU, and the Group of Seven should synchronize measures against Belarus’s military-industrial complex, financial institutions, and dual-use sectors, extend secondary sanctions to enablers in China, Iran, and elsewhere, and close loopholes to raise the cost of Minsk’s subjugation to Moscow and deter further aggression.

Third, pressure must be matched by investment in Belarusian democratic infrastructure. This includes independent media, secure digital tools, exile education, and cultural preservation. These aren’t symbolic; they sustain the capacity for democratic self-rule and offer a credible alternative to Kremlin domination.

American leadership is vital. Appointing a US special envoy for the Belarusian democratic forces would centralize policy coordination and ensure Belarus stays on the transatlantic agenda. Belarusian democratic leaders must also be present in any future diplomatic process on postwar regional security. No high-level engagement with Lukashenka should resume until more than one thousand political prisoners are freed. 

Thanks to US mediation, a number of Belarusian political prisoners and foreign nationals have been freed this year. This humanitarian track should continue. However, it is crucial not to legitimize Lukashenka or ease pressure prematurely. The United States must adopt long-term strategic thinking on Belarus. Ultimately, Western policy should be guided by the understanding that only a democratic Belarus can ensure lasting stability for the entire region.

Finally, contingency planning is essential. Lukashenka’s regime is fragile. The West must be prepared for scenarios ranging from internal collapse to Russian destabilization. Planning should cover political transition, humanitarian assistance, and infrastructure security. Clear public guarantees of post-Lukashenka support—from economic aid to security cooperation—could hasten regime erosion and incentivize elite defections.

Belarus’s future must be embedded in the broader strategy to end the war in Ukraine and roll back authoritarian influence. A free Belarus would deny Moscow a key launchpad, reduce NATO’s exposure, and weaken Russian and Chinese leverage in the region.

The window for action is narrowing. A coherent Western strategy that combines pressure with preparation can still tip the balance.

Read the full issue brief

About the author

Hanna Liubakova is a Belarusian journalist and political analyst. She is a nonresident senior fellow at the Atlantic Council and has reported on developments in Belarus for international outlets including the Washington Post, the Economist, and others.

Liubakova began her career at Belsat TV, the only independent Belarusian television channel, which has been banned by the regime in Minsk. She later worked for Radio Free Europe/Radio Liberty (RFE/RL) in Prague, Czechia, and is currently writing a book about Belarus.

Her reporting has earned multiple honors, including the Freedom of the Media Award from the Transatlantic Leadership Network and the One Young World Journalist of the Year Award. She was also a finalist for the European Press Prize. In retaliation for her work, the Lukashenka regime sentenced her in absentia to ten years in prison. She is wanted by authorities in Russia and across all Commonwealth of Independent States countries.

Related content

Explore the program

The Eurasia Center’s mission is to promote policies that strengthen stability, democratic values, and prosperity in Eurasia, from Eastern Europe in the West to the Caucasus, Russia, and Central Asia in the East.

The post Minsk in Moscow’s grip: How Russia subjugated Belarus without annexation appeared first on Atlantic Council.

]]>
The future of food in the Americas https://www.atlanticcouncil.org/in-depth-research-reports/report/the-future-of-food-in-the-americas/ Tue, 11 Nov 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=883923 Though the Americas have traditionally been a food-secure region, even moderate shocks can have profound consequences for agriculture. But there are concrete steps policymakers can take to protect the Western Hemisphere's breadbaskets from climate disruption, rising protectionism, and other risks. 

The post The future of food in the Americas appeared first on Atlantic Council.

]]>

Bottom lines up front

  • The Americas have traditionally been a food-secure region, but interlocking ecological, technological, and political trends could change that.
  • Ecological risks pose the greatest threat to hemispheric food production, though rising protectionism and the resultant market uncertainty also have a destabilizing effect.
  • There is little margin for error, as even moderate shocks can have profound consequences, and food insecurity raises the risk of political and social instability.

Table of contents

Introduction

Food security is at the core of national, regional, and global security. When societies are food secure, they stand a much greater chance of social and political stability; when they are food insecure, the opposite is true. Fortunately, the Western Hemisphere—the Americas—is a food-secure region. Although access to food is an ongoing challenge deserving greater attention in every country (as there are hungry people across the hemisphere), food abundance generally characterizes the Americas. Historically, the hemisphere has owed its unique position to several factors: a favorable natural resource base; equally benign geopolitical conditions; and extensive public and private cooperation to improve production methods and support innovation.

However, the future is not guaranteed to look like the past. Several key drivers of change are afoot that could alter the trajectory of hemispheric food security. These drivers bring with them uncertain outcomes, alternatively threatening the stability and productivity of current agrifood systems or offering hope that they could become even stronger and more resilient in the years to come.

This report assesses the future of food in the Western Hemisphere. It focuses on the major uncertainties that are driving change in the agrifood systems within the hemisphere and the world. These drivers represent risks or opportunities, and sometimes both. They include the decline of healthy and stable ecosystems, rapidly changing geopolitics, the erosion of multilateral institutions, increasingly inflationary and volatile food prices, the promise of innovation and emerging technologies, and generational shifts in farming and agricultural production.

These forces are not siloed. Rather, they intersect. There might be an awareness that these individual drivers of change represent obstacles to (or opportunities for) achieving durable food-security solutions in the future, yet many leaders see them as isolated challenges rather than as intersecting ones, obscuring the bigger picture.

The drivers discussed in this report therefore are not just accumulating layers of risks and opportunities. Rather, their interaction multiplies the system’s dynamism. This emerging dynamism will require policymakers, business leaders, investors, and farmers to find innovative solutions in the face of a rapidly changing, and not entirely predictable, agrifood landscape. Yet such outlooks may not arise. Complacency is a big risk, if leaders believe that the status quo will continue to improve, requiring changes only at the margins. In such a situation, the hemisphere would become far more vulnerable to unexpected shocks because there would not be enough appreciation for how ecological, technological, geopolitical, and institutional changes are reshaping the future.

This concern is not hyperbolic. A very recent external shock—the COVID-19 pandemic—erased major progress that the hemisphere had made on reducing hunger, which should remind us that the foundations of food security remain shaky. Looking ahead, there is little margin for error, as even moderate shocks can have profound consequences.

Flint corn, seeds, beans, peppers, and other dried goods are displayed on a wooden wall-mounted rack in the indigenous town of Zinacantán, México. (Unsplash/Alan De La Cruz)

Food, society, and politics

Food security is at the core of national, regional, hemispheric, and global security. When societies are food secure, they stand a much greater chance of social and political stability; when they are food insecure, the opposite is true.

This axiom, although a simple one, has been demonstrated time and again throughout history. High food prices occasioned by war, poor harvests, or high taxation of the peasantry (or all three) preceded the onset of the French Revolution in 1789 and the Russian revolutions of 1905 and 1917, to name just a couple of famous examples from history.

Today, despite far greater agricultural production at national and global levels, such disturbances still recur with alarming frequency: The 2007–2008 food riots across Africa followed commodity price spikes for agricultural inputs (oil, principally) that inflated the price of food; the 2010–2011 Arab Spring was preceded by food-price spikes owing to multiple breadbasket harvest failures across several world regions; and Russia’s war in Ukraine, which disrupted wheat, fertilizer, and natural gas exports, blocked the flow of agricultural inputs and outputs and dramatically raised food prices globally. Millions of additional people became food insecure around the world.

No other good has such an impact on society and politics as food because people need to eat every day. “Food riots are as old as civilization itself,” as one food security analyst summarized the impact of food on social and political stability. Often, it will only take a single big food-price shock to change social and political dynamics within a country or even an entire region. Although high food prices have a disproportionately negative impact on vulnerable, poor, and fragile countries, they also can have an outsized impact on otherwise wealthy and stable ones. Japan offers a recent example. In July 2025, soaring rice prices in Japan directly contributed to the defeat of Prime Minister Shigeru Ishiba’s Liberal Democratic Party in parliamentary elections.

The Food and Agriculture Organization (FAO) adopted a definition of food security at the 1996 World Food Summit (see box 1 for the history of the concept), which has persisted with only slight revision:

  • Food security exists when all people, at all times, have physical, social, and economic access to sufficient safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life.

This definition contains four main dimensions, or pillars:

  1. The physical, supply-side availability of food, typically assessed at the national level and consisting of domestic agricultural production plus food imports.
  2. Household access to food, which is dependent on household incomes and food prices (set by a combination of market and nonmarket forces).
  3. Nutritional intake by individuals, which is not the same thing as caloric intake; nutrition depends in part on dietary diversity.
  4. Stability of the first three pillars over time.

A couple important pieces of the food security puzzle are missing from this formulation. One is ecological stability. Food security depends on the sustainability of the underlying Earth systems that are essential to food production. Maintaining the integrity of these Earth systems, including the integrity of the world’s soils, water, biodiversity, nutrients, and atmospheric conditions (precipitation and temperature, primarily), is critical. A second missing piece is the stability of the international systems, specifically stability of a rules-based trading order that ensures that food moves easily from food-surplus to food-deficit countries. Such a trading order improves food security through enhancing agriculture productivity and (under emergency conditions) enables swift distribution of humanitarian aid in the form of food. Such a system helps to avoid trade conflicts and establishes international norms for the notion that food security is in the collective interest and responsibility of all parties.

The capacity of the current international system to encourage global production and trade in food has increased over time, dramatically so over the past several decades: The FAO reported that in 2021, the world traded some 5,000 trillion kilocalories of food, more than double the amount that it did in 2000. A central piece of this equation has been the existence of key multilateral institutions that have had the credibility and authority to provide a forum for states to negotiate trade agreements, resolve trade disputes, and monitor and enforce commitments.

None of these conditions should be treated as a given. Looking ahead, the odds are high that the world will become more dynamic rather than less so, with no guarantee that dynamism will have more upside than downside. To adapt and thrive within changing conditions (with both positive and negative impacts), the world’s agrifood systems will need to become more resilient and adaptable. The good news is that humankind has the tools—or can develop the necessary tools—to ensure such outcomes.

Box 1: Food security: History of a concept
Although concerns surrounding hunger and famine are ancient, dating to human prehistory, the formal concept of food security is only about a half century old. Its institutional origins are often traced to a 1974 World Food Conference that defined the concept in terms of the global supply of food. The thinking at the time linked hunger with global supply (chiefly of staple crops, especially cereals), the idea being that hunger would be solved through adequate supply. Over the following decades, the concept of food security evolved in multiple key respects including: moving away from a sole focus on food supply and toward food distribution and access, especially by households and individuals; an acknowledgment that food security is not just a function of quantitative intake of calories but also of nutrition; the acceptance that importing food is a legitimate national means of achieving food security (as opposed to defining a food-secure country as one that domestically produces the entirety of its needs); an incorporation of social considerations (for example, inequalities in food access owing to ethnicity or gender). The definition adopted at the 1996 World Food Summit has become the default definition of food security: “Food security exists when all people, at all times, have physical, social, and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life.” (The word “social” in this definition postdates the 1996 summit.)

Food security in the Americas

The Western Hemisphere is in a fortunate position regarding agriculture and food. Its natural endowment is significant, consisting of arable soils and plentiful rainfall distributed across numerous regions suitable for agriculture (temperate, subtropical, and tropical). The hemisphere’s highly productive agriculture benefits from relatively stable political and economic environments, medium-to-high income levels, and reasonably well-functioning domestic and international markets, all stimulated by public, private, and academic sector investments in agricultural research and development (R&D).

As a result, the hemisphere’s aggregate production capacity in both staple and specialized crops gives it an indispensable role in providing domestic food security but also meeting the world’s food needs.

There are several caveats to this picture, which this report endeavors to make clear. First, several driving forces are changing baseline conditions that will alter the hemisphere’s future, for better or worse. Second, the Americas might be fortunate in many respects, but it is not a single bloc of countries acting in unison. Trade disputes, unfortunately, are becoming a sharper and more common part of the hemisphere’s diplomatic landscape, for example. Finally, as this report also makes clear, food security is not just about supply-side agricultural production. Food insecurity remains a problem in the Americas as it does everywhere in the world.

Supply side: Agricultural production
in the Americas

The five largest primary crop producing countries (by tonnage) in the world are all in the Americas: Brazil, the United States, Argentina, Mexico, and Canada. As shown in table 1 and figure 1, the hemisphere also contains top exporters of all four primary crops: soybeans, corn, wheat, and rice. The largest producers of food in the Americas are, therefore, critical for ensuring global food security. What happens in the region matters greatly, because developments in the Americas have an outsized effect on global trade in food.

In addition to the largest primary crop producers, the Americas also lead in the production of a wide range of specialty crops, including coffee, avocados, lemons, limes, oranges, blueberries, cranberries, quinoa, almonds, and more. Numerous countries in the hemisphere are leading producers of these crops. For example, Peru is in the top three global producers of avocados, blueberries, and quinoa, while Colombia is a leading global producer of coffee, sugar cane, avocados, and agave fibers.

For many countries in the Americas, agriculture continues to be a critical piece of their national economies. As shown in figure 2, agriculture’s share of gross domestic product (GDP) is above five percent in most countries and is above ten percent in a handful of countries in Central America, the Caribbean, and South America. Over the 2023–2024 period, agriculture’s share of Brazil’s GDP was 6.24 percent while its agricultural exports represented nearly half (49 percent, at $164 billion) of Brazil’s total exports by value. Both figures demonstrate the spectacular growth in Brazil’s intensive farming, especially of soybeans (see also box 2).

Box 2. Case study: Brazil
Brazil might be the single most interesting agrifood production story in the entire hemisphere, and perhaps the most important as well. Brazil today is one of the world’s great breadbaskets, being among the largest producers and exporters of primary crops and many specialized ones as well. Yet Brazil was a net food importer for much of its history, becoming a net exporter only over the past several decades. Starting in the 1960s, an agrifood production revolution occurred in Brazil, based on both extensification (expansion of agricultural land) and, just as critically if not even more so, an intensive modernization program based around research, capital investment, and technological development. Brazil’s modernization program included cutting-edge research conducted by universities and its now world-famous agricultural research agency, Embrapa, into tropical soybean and corn cultivation. These efforts led to new seed varieties and technologies that in turn enabled primary crop production to occur at scale in vast regions of Brazil including the Cerrado. Over roughly the same period, the liberalization of agricultural trade allowed Brazil to grow into a global agricultural exporter. On the demand side of the food security equation, a combination of rising wealth plus innovative social safety programs, including the Bolsa Familia and Fome Zero (zero hunger) programs, helped to reduce hunger among the poor in Brazil. Yet Brazil’s story has not been without its downsides, which in the past have included high deforestation rates in the Cerrado and Amazon regions, and related ecological damage.

Demand side: calories and nutrition

The FAO’s definition of food security, which is broadly accepted among experts, emphasizes that food security is as much about access and affordability, especially by vulnerable populations, as it is about the aggregate production of food. If people cannot access a nutritious diet at affordable and stable prices, they will not be food secure.

In recent decades, the Western Hemisphere has gradually decreased its level of food insecurity. In comparative terms, it has done well. Between 1990 and 2015, for example, Latin America and the Caribbean (LAC) was the only region in the world to reduce hunger by half.

As shown in table 2, the FAO’s latest data indicates that the Western Hemisphere continues to be relatively food secure. Over 2022–2024, the two major subregions in the Americas, North America on the one hand and LAC on the other, performed better than the world average. This is reflected in several key metrics related to the reduction of caloric intake of food, in particular undernourishment (calorie deprivation over time), severe food insecurity (a measurement of households going without food for periods of time), and the prevalence of wasting in small children (an indicator of undernourishment). On metrics related to poor diets such as overweight and obesity (both of which are indicators of too many calories rather than too few), the Americas performed less well.

These outcomes are consistent with levels of wealth. Although an oversimplification, as national wealth increases, per capita consumption of food rises. Most countries in the Americas are classified by the World Bank as either high- or upper middle-income countries. (Note, however, that lower-income populations, including those within both lower- and higher income economies, are at increasing risk of obesity, in part due to easy availability of inexpensive processed foods with low nutritional value.)

There are several countries in the Americas that underperform. According to the FAO, over half (54.2 percent) of Haitians are undernourished, while just 10.7 percent of adults are obese (compared with over 40 percent of US citizens); Haiti is the most fragile state in the Americas. Although undernourishment is much lower across the hemisphere now than in previous decades, it nonetheless remains high in several countries including Bolivia (21.8 percent), Honduras (14.8 percent), Ecuador (12.1 percent), and Guatemala (11.8 percent).

There is a gendered dimension to deprivation, with women being more likely to be food insecure than men. This difference worsened during the COVID-19 pandemic, increasing to a 3.3 percent gap between the genders in Latin America in 2021, before reducing again by 2024. In North America, the gap has worsened every year since 2020, from 0.1 percent in 2020 to 0.5 percent in 2024.

Fully stocked shelves of packaged rice and beans for sale in a grocery store in Utiva, Costa Rica. (Unsplash/Bernd Dittrich)

Drivers of change in the Americas and beyond

Strategic foresight asserts that the future likely will not conform to our expectations. It is risky to assume that the future will consist of a simple linear extrapolation of one or two current trends. Hence, the discipline focuses as much on the intersections of the drivers that together will drive multiple possible futures. Food security in the Americas is no different, as there are several significant intersecting drivers of change that will
shape the hemisphere’s future.

Changing ecology

Ecological risks are among the greatest threats to food security in the Americas. A rapidly changing climate creates the primary set of risks, from rising heat and worsening drought and flooding. Other ecological risks exist as well in specific subregions, for example deforestation, biodiversity loss, and soil erosion and degradation.

Of these changing ecological conditions, perhaps the worst for agricultural production is the combination of drought and heat, or “dry-hot” conditions. Trend data show that such conditions are becoming more frequent and intense. An Organisation for Economic Co-operation and Development (OECD) study of drought patterns, released in July 2025, found that the share of land globally exposed to drought has doubled since 1900.

Dry-hot conditions threaten to become more frequent across the Americas. In North America, for example, scientists estimate that the now decades-long megadrought that has impacted northern Mexico and the southwestern United States might be the worst in 1,200 years. In South America, the frequency of dry, hot, and flammable weather has increased across much of the continent since the early 1970s. Such changes are highly consequential for agriculture. A 2021 study, for instance, showed that increases in Brazil’s dry-hot conditions, combined with the impacts of deforestation on temperature and rainfall, have already pushed 28 percent of the country’s agricultural land beyond its optimum productive range, with further projections of 51 percent by 2030 and 74 percent by 2060.

One of the more discouraging climate-driven outcomes is the possibility, even probability, of future multiple breadbasket failures (i.e., “simultaneous harvest failures across major crop-producing regions” around the world). Climate change likely will make such failures more common in the future. A 2021 study projected that the probability of multiple harvest failures globally was “as much as 4.5 times higher by 2030 and up to 25 times higher by 2050.”21 Another, focusing on the impacts that oscillations such as the El Niño-Southern Oscillation (ENSO) and North Atlantic Oscillation (NAO) might have under future warming, concluded that shifting ENSO and NAO patterns might “expose an additional 5.1–12% of global croplands” to such oscillations, with strong ENSO/NAO negative phases “likely to cause simultaneous yield losses across multiple key food-producing regions.”

The Americas, home to several of the world’s major producers of staple crops including soybeans, corn, and wheat, faces the possibility of multiple breadbasket failures. It is entirely possible that in the years to come, severe dry-hot conditions could strike simultaneously in the United States, Mexico, Brazil, and Argentina. The consequences for agricultural production and global food security would be enormous.

A changing climate also will negatively impact most—perhaps all—of the other crops grown across the Americas. Coffee and banana production, to name just two examples, likely will be severely affected by increased heat and altered precipitation patterns. A recent scientific study conducted by the University of Exeter forecasts that 60 percent of the regions currently producing bananas—including regions in Central America—will be unable to do so before the end of this century, owing principally to increased temperature. The world will not have to wait nearly that long to see such effects because climate-driven impacts are already occurring. In 2024, the FAO reported a 38.8 percent annual increase in global coffee prices “primarily driven by supply-side disruptions, stemming from adverse weather conditions” including drought, heat, and flooding in major coffee-producing countries including Brazil, Vietnam, and Indonesia.

Because farmers are on the receiving end of changing ecological conditions, it is critical to understand how they are impacted by such change and how they process those changes.

Doing so will assist in defining the policy and investment options with the greatest likelihood of mass adoption on farms and in farming communities. Farmers will be impacted differently depending on where in the hemisphere they farm, their farm sizes and resources (financial and otherwise), whether they are subsistence farmers or integrated into national, regional, and global markets, and the types of crops they grow. Taken together, farmers do not experience changing ecological conditions in the same way at the same time. Smallholder farmers in poorer settings, for example, will be at greatest risk from climate-driven impacts given the small size of their landholdings and a lack of access to insurance and other sources of resilience. It follows that farmers’ perceptions of ecological impacts on their farming operations will not follow a straight line. Farmers will parse the impacts of environmental hazards such as drought, heat, or flooding differently.

In sum, ecological change dramatically increases the risk of declining crop yields while shifting the locations where crops can be grown. Potentially, ecological change with impacts at scale could generate significant shortfalls in global food supply, causing market panics, high prices, hoarding, and a breakdown of trade. Food insecurity would spike.

A tractor trailer fills seed boxes in a Michigan field. (Unsplash/Loren King)

Geopolitical and geoeconomic turbulence

A second set of risks stems from rising geopolitical and geoeconomic competition and uncertainty. An open, rules-based trading system has been essential to improving hemispheric and global food security. Trade in that system has precipitated more economic integration of the region—more bilateral trade and investment agreements, greater investment flows, and exchange of technical know-how—which benefits food security via higher economic growth, greater employment opportunities and rising incomes, poverty reduction, and general economic dynamism. It also has allowed governments to see that a set of policies, including more focus on innovation and competitiveness and less on trade distortions and protectionism, is the best path forward.

Yet this trajectory is now subject to geopolitical risk. Over the past two decades, the global food trading system has been disrupted by several significant events including wars and related phenomena (e.g., civil strife, terrorism). Such events generate (largely) unanticipated shocks to agricultural inputs, supply chains, and agrifood exports, resulting in higher production prices and, therefore, consumer prices. The most well-known and significant of these events is the full-scale war in Ukraine, which upon its onset in 2022 immediately resulted in higher global prices for key commodities including natural gas and nitrogen fertilizers (because Russia is the world’s third ranking natural gas exporter and natural gas is a critical input for nitrogen fertilizers); potash fertilizers (primarily from Russia and Belarus) and wheat (before the war, Ukraine was the world’s seventh-largest wheat exporter).

Although global input markets, for example for fertilizers, are broadly resilient, at the same time they also clearly are affected by geopolitical turbulence arising from trade policies, sanctions, shocks such as wars, and other phenomena. While the war in Ukraine is an important case, it hardly exhausts the list of current examples. In July 2025, the World Bank said that sanctions and restrictive trade policies “are playing an increasingly significant role in reshaping global fertilizer markets,” citing China’s discretionary export restrictions on nitrogen and phosphate fertilizers to protect its domestic agriculture, and the European Union’s (EU) June 2025 tariffs against Belarusian and Russian fertilizers to reduce EU dependence on these countries.

An even more difficult problem is the risk that the hemispheric and global agrifood trading system is returning to a protectionist order, which risks the benefits that have accrued since the emergence of a rules-based trading model in the 1990s for agriculture established under the World Trade Organization (WTO) 1994 Agreement on Agriculture. Under that model, countries tended to place high tariffs only on a few politically sensitive crops (such as sugar or cotton). Yet today’s rising protectionism is much broader, affecting a larger number of crops, including staple crops, and implemented by an ever-longer list of countries. The result is likely to undermine food security by increasing food prices—with impacts falling most harshly on poor households—and reducing profitability by raising both producers’ and exporters’ costs, lowering investment and decreasing productivity.

Over the past several decades, the largest agricultural producers in the Americas, including the United States and Brazil, have become the world’s largest agrifood exporting nations. Southern Cone states have pushed agricultural exports as key pieces of their export-led growth strategies, especially to China given its rapidly growing demand for commodities. With such a high dependence on global agricultural exports, the biggest agricultural producers in the Western Hemisphere ought to be the most heavily invested in a global agrifood free-trading regime. Tariff and nontariff barrier uncertainty negatively impacts agrifood producers, processors, distributors, and consumers.

These disruptions have other distorting effects. Trade patterns within the Americas, and between the Americas and the rest of the world, are shifting because of trade tensions. China’s behavior in international agricultural markets is a significant example, with direct relevance to the Western Hemisphere. A decade ago, China imported more agricultural goods from the United States than from Brazil; today, China imports almost twice as much from Brazil as from the United States, including in soybeans and corn. China’s shift toward non-US sources (including but not limited to Brazil) began even before the 2018 trade dispute with the United States. In addition to supply diversification, China also has dramatically increased its stockpiling of food (grains, soybeans, and frozen meat), which it defines as a strategic good.

Further, China’s decoupling from the US agricultural market has had major consequences for trade patterns in that it has helped Brazil become the world’s largest exporter of soybeans. Since the 2018 Sino-American trade dispute, Brazil’s global soybean exports have increased by 40 percent, while those from the US have remained flat.

Geopolitical and geoeconomic turbulence has distorting effects on global trade in food. The biggest concern for global food security is the impact on food prices, both in terms of inflation but also price variability. Such turbulence also can generate trade disputes and, therefore, contribute to fractured relations among states. After the United States levied tariffs in August 2025 of up to 50 percent against certain Brazilian agricultural goods including coffee, beef, and sugar, Brazil immediately asked the WTO for consultation, arguing that the tariffs violate international trade rules. A likely immediate effect of the tariffs is to hasten Brazil’s interest in developing alternative markets for its agricultural products, including with China. A second and (often) underappreciated concern is that unstable trade rules and fluctuating market access make it more difficult for farmers to plan and make production and investment decisions, increasing their economic uncertainty.

Geopolitical tensions and rising trade protectionism are also likely to lead to slower economic growth. This is important because in the Americas, as everywhere, economic growth coupled with rising incomes are keys to increased food security. If slower economic growth combines with higher food prices owing to increasing trade friction, then there is a greater risk of more food insecurity in the future. International food trade is being shaped increasingly by geopolitical considerations rather than market signals, thereby realigning trade patterns in unpredictable ways.

Institutional uncertainty

Multilateral institutions are a hallmark of the current international order. Most of the world’s biggest and most important institutions that exist today were created after 1945. Although not without criticism, much of it deserved, these institutions have been central to building a global order which has delivered unprecedented—if also uneven—prosperity. When it comes to trade, the data say as much: Today’s global trade is 45 times by volume and 382 times by value greater than it was in 1950. Moreover, since the mid-1990s, global trade growth has accelerated, averaging 4 percent growth by volume annually and 5 percent by value.

However, the multilateral institutions that have facilitated this growth in trade now are under enormous pressure from all sides. One reason is that the world’s largest trading powers as well as many smaller ones have been willing to bend or even break established norms and international trade law. China, for example, has taken advantage of its status as a developing country under the WTO to engage in unfair practices, including massive subsidies, heavy use of state-owned enterprises, forced technology transfer, and protection of its domestic market (for example, limiting foreign companies’ and investors’ access to its technology and financial markets).36 Further, the United States is preventing the WTO’s Appellate Body from functioning as designed, preventing the organization from enforcing its own rules.

Such developments are important because they create uncertainty surrounding trading rules and thereby increase friction among countries when it comes to trade. Even worse, these developments create space wherein the breaking of rules by some countries prompts others to believe they can as well. Both India and Indonesia, for example, recently have taken advantage of the lack of a functioning Appellate Body to
implement policies that likely are in violation; Indonesia instituted a ban on nickel exports (to induce nickel processors to relocate to Indonesia) while India heavily subsidized steel and pharmaceuticals. By some estimates, two-thirds of initial WTO rulings made about trade disputes have been appealed, but the Appellate Body cannot convene itself.

The decline of multilateral institutions is significant because the Americas benefit more than other regions from an open global trading system in agricultural goods, per table 1 above. Agriculture always has been a controversial topic in trade negotiations, extending back to the origins of the Global Agreement on Tariffs and Trade (GATT) in the 1940s. Despite this fact, functional multilateral institutions are valuable because
they create a stable, rules-based global marketplace that in turn enables trade in food at scale.

In sum, a breakdown of multilateral institutions and rising protectionism portend headwinds for agriculture in the years to come, increasing risks and possibly disincentivizing investments by farmers. Such developments erode the open agrifood trading system that globalization made possible. The Americas have utilized open trade to expand agriculture production and exports and, therefore, is most at risk from the unraveling of that system

Price inflation and variability

The price of food is a core metric for food security: For the world’s consumers, the most desirable food prices are both low and stable over time. Food insecurity is made worse when the opposite applies: rapid price inflation combined with high price variability. Unfortunately, as shown in figure 3, the latter situation has characterized global food prices for much of the past quarter century.

Since the 2000s, shocks have occurred with such frequency that prices settle on a new higher baseline rather than returning to previous levels. The FAO noted this trend as early as 2009: Prior to the 2006–2008 global food-price shock, “real prices [in food had] shown a steady long-run downward trend punctuated by typically short-lived price spikes.” But by the mid-2000s, the FAO observed, this trend no longer held. As of 2008, its own food-price index “still averaged 24 percent above 2007 and 57 percent above 2006.” Indeed, as shown in figure 3, since the mid-2000s, global food prices have risen to a new and higher level after each exogenous shock. The most recent global shocks—the COVID-19 pandemic followed by the full-scale invasion of Ukraine—has had the greatest impact on sustained high food prices.

The upward trend in the price of food has important implications for food security around the world. Food is less affordable; households have more difficulty consuming a healthy diet, and they are forced to switch to less nutritious foods and/or reduce their total consumption of food. This cost-of-living crisis erodes food security gains and threatens to make societies less stable.

Food-price inflation and volatility is as problematic in the Americas as elsewhere in the world, increasing food insecurity and becoming a key social and political issue. In Latin America, rising food prices have been a major driver of inflation across the region. In some cases, such as Argentina, food prices have contributed to extreme inflation rates. In North America, food prices also continue to rise and are a major cause of the cost-of-living crisis experienced by many households.

Investment: Innovation, technology, and infrastructure

Public- and private-sector investments in on- and off-farm innovation and productivity have been critical enablers of modern agrifood systems. A question to be answered in the years to come is whether such investments will increase agricultural productivity and sustainability enough to match or exceed demand-side pressures for more food (from population and income growth), even as baseline conditions from other drivers—ecological, institutional, geopolitical—become more challenging.

Historically, on- and off-farm innovation and productivity increases, which stem from process and technological developments plus infrastructural improvements, have been fundamental to increasing the supply of food to meet rising demand. Since the 1990s, global efficiency gains have been the largest contributors to global growth in agricultural output. Efficiency gains have far outstripped the other contributors, including the use of more inputs per hectare of land, greater extension of irrigation to cropland, and expansion of new agricultural land (e.g., expansion of agriculture into previously forested lands).

In agriculture, efficiency is gauged using total factor productivity (TFP), a metric of inputs relative to outputs. If total on-farm output (e.g., volume of crops produced) is growing faster than inputs (defined as labor, capital, and material resources), then TFP is increasing.

That is the good news. The bad news is that global TFP growth is now slowing. After steadily increasing from a 0.55 percent annual growth rate during the 1970s to a peak of 1.97 percent annual growth rate in the 2000s, TFP has since fallen back to 1.1 percent annually (figure 4). Within the Americas, the picture is even more dire. Between 2011 and 2020, TFP increased by only 0.9 percent annually in Latin America and the Caribbean. In North America, typically at the global forefront in productivity and efficiency gains, TFP grew over the same period by just 0.2 percent annually. The Americas significantly lagged the global average (figure 5).

The decline in TFP over the past fifteen years is a worrisome development, as it threatens to undermine progress toward an elusive goal, which is to produce enough food to meet growing global demand while simultaneously retaining on-farm profitability and reducing environmental impact. Analysts at the US Department of Agriculture recently made this argument. “At the global level,” they wrote, “improvements in agricultural productivity have not been rapid or universal enough to make a significant dent in the effect of agriculture on the environment.” If TFP were to continue to slow down in the future, the impact “could [negatively] affect food prices, [lead to] the expansion of agriculture into more natural lands, and [threaten] global food security.”

Nor is underinvestment in innovation the only form of investment risk. Despite the hemisphere’s reliance on trade in agriculture and food, infrastructure across much of the Americas remains underdeveloped. The so-called infrastructure gap in the Americas refers to how the hemisphere’s ports, railways, bridges and roads, telecommunications, and other forms of infrastructure are insufficiently robust in kind, quality, and/or maintenance. In 2021, for example, the Inter-American Development Bank (IDB) estimated that countries in Latin America and the Caribbean alone would need to invest $2.2 trillion in “water and sanitation, energy, transportation, and telecommunications infrastructure” to meet the UN’s Sustainable Development Goals. The IDB’s estimate included not just funds for new infrastructural investment but for maintenance and replacement as well (at some 41 percent of the total).

North America is not exempt from this problem, as both Canada and the United States face large infrastructure deficits. As is well-known, for decades the United States has largely underinvested in infrastructure. Despite passage of the 2021 Infrastructure Investment and Jobs Act, which directed the federal government to spend some $1.2 trillion over five years on infrastructure, investment levels in the United States will remain insufficient absent systematic changes in how funds are raised by local, state, and federal governments.

Likewise, in Canada, the infrastructure deficit, which is estimated at $196 billion, is of particular importance to that country’s globally important agricultural exports, which include foodstuffs such as grains (wheat, principally) and key agricultural inputs such as fertilizers, largely produced in the country’s vast interior. Getting bulky grains and inputs to external markets more cheaply and efficiently will require Canada to upgrade its transport infrastructure, including railway lines, bridges, and ports, which are key in all circumstances but especially so during periods when unexpected disruptive factors, such as recent port labor strikes or extreme weather events, create choke points that necessitate rerouting. The recent announcements by the government of Canada to expand the Port of Montreal is a step in the right direction. However, significantly greater ambition will be required to push Canada’s infrastructure investments to levels comparable to other leading OECD countries.

Policymakers, the private sector, farmers, investors, and the scientific and technological communities will need to find solutions to these challenges. Doing so will require some combination of enhanced public and private investment in on- and off-farm infrastructure, R&D, improved piloting and scaling of new technologies, and implementation of policies to encourage farmers to become more innovative, productive, and efficient.

A Colombian grocery store displays a variety of vegetables for sale. (Unsplash/nrd)

Demographic shifts

Agricultural employment as a share of global GDP has been trending downward for decades, owing to the ongoing mechanization of farmwork, increasing urbanization and industrialization, and other factors. According to the World Bank, in 1991, 43 percent of the world’s population was employed in agriculture. By 2023, that figure had fallen by almost half, to 26 percent.

The Western Hemisphere has followed this trendline. In Latin America and the Caribbean, agricultural employment fell over the same 1991–2023 period from 21 percent to 13 percent and in North America from 2.8 percent to 1.6 percent. As can be expected, given differences in income levels, structure of national economies, and crop specialization, there are widespread differences in agricultural employment across the hemisphere. In 2023, several countries still had employment levels in agriculture above 20 percent: Haiti (by far the most, at 45 percent), Ecuador, Guatemala, Bolivia, Nicaragua, Peru, and Honduras. In contrast, the hemisphere’s biggest producers of staple crops—the United States, Canada, Mexico, Brazil, and Argentina—are all well below the global average of 26 percent, in most cases in low single digits.

This demographic transition underscores how agriculture is becoming more capital-intensive and productive: more food is being produced per person employed in the sector. The largest food producers also typically have the lowest share of farmers and agricultural workers employed in the national economy, as the United States, Canada, and Argentina all show (each is at less than 2 percent of their populations employed
in agriculture).

However, there is a generational downside to this demographic trend: farmers worldwide are aging in part because on-farm employment opportunities are declining. The trend appears to be worse in the wealthiest regions having the smallest share of employment in agriculture. In the EU, for example, only 11.9 percent of farmers were under forty years old in 2020.52 In the United States, only 9 percent were under thirty-five years of age in 2022.

Toward a food-secure future

The world needs a bold new way of thinking about food security, one that incorporates a comprehensive understanding of how divergent forces, including those identified in this report, are creating a dynamic and unsettled agrifood landscape that will shape the future in unpredictable ways. To avoid negative future scenarios and increase the odds of positive ones, what is needed is a shift in the prevailing debate about food security that incorporates all these driving forces. That debate should stress that these forces combine in important and not entirely predictable ways to disrupt agrifood systems.

Such an outlook recognizes, for example, that geopolitical tensions add risk to other phenomena such as climate change to make an already perilous situation more difficult.

Policymakers and other leaders across the Americas should recognize that these drivers intersect and combine, in turn reshaping the hemisphere’s agrifood outlook. The challenge is clear: They will need to develop strategies and design policies that will lead to resilient and sustainable food systems that minimize the impact of shocks—both natural and human-made—on the production, distribution, and access to food.

Ecology

As stated above in the introduction, a central challenge will be to ensure that food production can remain profitable and resilient in the face of disruptive change. Ecological changes and the environmental resources that the world relies upon for productive and healthy agriculture systems are critical pieces of this equation.

A key task concerns how best to frame this problem for policymakers, business leaders, and farmers, to relay that ecological changes threaten to undermine progress toward a food-secure future. How these stakeholders act through policies, investments, and practices to mitigate and adapt to ecological changes will go a long way to determining whether the hemisphere’s future is food secure or insecure.

Farming is inherently uncertain because of the vagaries of weather and disease, so efforts to minimize the instability caused by ecological changes, including climate change, extreme weather, disasters, and other phenomena, will help farmers to manage this complex set of risks. Integration across risks is an important way to frame the problem, not only because the problem itself is multifaceted but so too are the solutions. Synergies among healthy ecosystem services, robust agricultural production, and profitability can be found with the right application of imagination, creativity, policymaking, investment, and on-the-ground application by utilizing input and knowledge from farmers and farming communities.

Agriculture is a major driver of ecological change, including land-use patterns and carbon emissions. Yet at the same time, agriculture also holds enormous potential, under the right domestic and international conditions, to provide robust and lasting solutions. Doing so would require that policymakers, investors, farmers, scientists, and technologists and society writ large coordinate efforts toward effecting scalable change.

Synergistic approaches include a range of alternative farming techniques and practices as well as novel technologies that collectively hold great potential not only to perform at a high level of output but at the same time go some way toward repairing the natural world. These strategies, which overlap in practice, include regenerative agriculture, no-till farming, agroforestry, climate-smart agriculture, and 4R nutrient stewardship practices (referring to nutrient-management practices focusing on the right sources, right rates, right times, and right places for nutrients). Such approaches aim to improve resource efficiency, reduce waste, protect ecosystems and ecosystem services including freshwater sources, soils, and biodiversity, while retaining profitability. Through the more efficient use of resources, carbon sequestration in soils, land and forest conservation, and improved management (for example, of water and waste processes), these strategies also can mitigate the agricultural sector’s significant greenhouse gas emissions.

Although many of these approaches once were considered experimental, novel, and unproven, that is far less the case today. Regenerative farming, for example, now has more adherents (including farmers) who believe that the diverse methods falling under it deliver tangible environmental benefits without sacrificing on-farm yields—a claim that is also drawing greater financial-sector interest and investment. A global survey of farmers, conducted in 2024 by McKinsey and Company found that over three-quarters of farmers in Argentina, Brazil, Canada, and the United States were adopting no-till or reduced tillage practices. Farmers’ willingness to adopt these and other regenerative practices were “underpinned by economics,” according to McKinsey, with respondents in the Americas ranking increased yields as their primary motive for adoption, followed by lower production costs and additional revenue streams.

There is an enormous amount of land worldwide and in the Americas that could be revitalized through such approaches. Land degradation, which by extension means the degradation of the world’s soils, is a massive problem. The world is losing at least one hundred million hectares of productive land each year, with some forecasts suggesting up to 95 percent of the world’s arable land could be in some kind of degraded state
by 2050.

In the Americas, degradation is a serious problem but also a big opportunity for soil and land regeneration. Brazil alone has enormous swathes of degraded pastureland. Embrapa, Brazil’s agricultural research agency, estimated in 2024 that the country has approximately twenty-eight million hectares of degraded pastureland (classified as intermediately or severely degraded). Bringing this land back into production using regenerative methods would help alleviate forest conversion pressures in Brazil’s Cerrado and Amazon regions.

One important consideration for policymakers is that if trade in agriculture and food becomes more costly, there is a risk that the fiscal capacity to invest in policies to make agrifood systems more productive and resilient in the face of ecological change will be reduced. Hence, this report focuses on understanding how these issues are linked and addressing them through greater international cooperation to promote more sustainable and resilient agrifood systems.

Trade, geopolitics, and institutions

Rising protectionism and geopolitical competition undermine the incentives for states to cooperate. Trade tensions risk spilling over into diplomatic tension, eroding international trust. In such conditions, states will be less likely to collaborate, which can sour international relations. If the world’s biggest economies are becoming more protectionist and eschewing a rules-based trading system, a zero-sum world returns, with many states, concerned by protectionist measures placed on them from elsewhere, believing they must adopt such policies. More dialogue among states, not less, is an antidote.

An increasing number of governments around the world appear to no longer see the equation in these terms. China, for example, is seeking greater self-reliance in food through stockpiling and other measures. It also has weaponized tariffs for its own purposes, imposing large tariffs on grain imports from Australia and more recently on Canada. These are not isolated incidents but part of how China exercises its power, given its outsized impact on world markets.

As articulated in this report, global trade in food depends on the strength of multilateral institutions and international agreements. These institutions are often underappreciated contributors to global food security. Today these institutions are being eroded by rising geopolitical and diplomatic conflict and other forces. The rapid rate of their erosion is worrisome.

Despite the WTO’s flaws—of which there are many—it remains valuable because it has the reach and standing to create and enforce global trading rules. Yet the organization is failing at doing so, in large part because of its own rules (decisions are made by consensus) and even more so because the largest trading countries no longer want to abide by a rules-based system. The risk is a collapse of the entire multilateral trading system. “The reversal of global economic integration [if the multilateral trading system were to fail] would bring with it growing lawlessness, conflict, and disorder in the global economy,” one scholar writes, and with it “the international system at large.”

One aim should be to build alternative institutions within the hemisphere consisting of states having the critical mass to achieve desired outcomes. One such solution would be to mimic the Group of Seven and Group of Twenty, two examples of institutions that bring leaders from the world’s largest economies together to attempt to coordinate solutions to various global challenges. One possibility would be to start with just the largest agricultural producers in the hemisphere—an “A5” consisting of the United States, Brazil, Mexico, Canada, and Argentina—to bring agriculture ministers together for systematized dialogue about hemispheric trade. Dialogue outcomes might include regional food-security compacts that generate commitments to invest in agricultural research leading to breakthrough technologies (“agtech”), to avoid the most trade distorting policies (export bans, for example), and more.

A related idea is to construct a standing (as opposed to episodic) hemispheric food security council to bring willing governments together for discussing responses to future shocks, identifying pathways for greater scientific and technological cooperation, and buttressing the norm regarding the hemisphere’s responsibility to the rest of the world as a major food supplier. Hemispheric institutions such as the Organization of American States (OAS) and Inter-American Development Bank can be leveraged to convene this council, given their credibility in addressing hemispheric affairs, including in trade. Using the inter-American system to convene a hemispheric food security council consisting of foreign, environment, and agriculture ministers—alongside representatives from industry and producer groups—should appeal to a wide set of stakeholders.

A drone hovers above a field. (Unsplash/Job Vermeulen)

Investment in innovation, technology, and infrastructure

The constant improvement of on- and off-farm activities, including innovative use of new technologies and processes, and capital investment in the phenomena that enable them (including infrastructure), are central to ensuring that the hemisphere and the world are food secure. Innovation and investment also are critical components of agrifood systems that not only are productive but also sustainable and resilient, given
the need to prepare for climate-driven shocks in the future. Innovative technologies and processes, and the infrastructure that undergirds them, can build redundancy and efficiency into the agrifood system in anticipation of such shocks.

Regenerative agriculture and other agrifood systems focused on sustainability can be enhanced through the application of advanced technologies. Examples include:

  • Alternative energy sources can enhance on- and offfarm systems while reducing carbon footprints.
  • Geospatial remote sensing tools for precision farming can identify and help safeguard ecological assets.
  • Robotics and mobile digital technologies (including deeper integration of handheld devices into farming practices) can improve agricultural efficiencies while reducing environmental impact.
  • AI-driven analytics can integrate and utilize data streams from numerous applications.

Such technologies will become more critical in the future, as ecological changes make farming more difficult. Rising heat, for example, will create harsher working conditions for farm labor, in turn requiring machines and other technologies to alleviate workers’ outdoor exposure during periods of extreme heat.

Biotechnologies should be added to this list, given their promise to improve on-farm productivity and nutrient use efficiency while protecting ecological assets such as soils and water. Biofertilizers, for example, aim to improve soil fertility and nutrient use efficiency through application of living organisms including bacteria, fungi, and algae, with crop yields increasing by an estimated 10 percent to 40 percent. They also help
plants withstand abiotic stressors, some brought on by climate change, including drought, salinity, and extreme temperatures.

How can governments, the private sector, and other actors together ensure that the right mix and scale of investments are being made that will lead to innovative technologies and processes across the hemisphere’s agrifood systems? Additionally, how can they ensure that innovative technologies and processes are transformative at all scales, including for the hemisphere’s millions of smallholder farmers in addition to its largest producers? Some technologies and processes are more suitable for large-scale applications because of high cost or other considerations, for example. Improving access to the benefits of such technologies will require improved pathways for dissemination of knowledge, practical know-how, access to capital, and other services (e.g., training).

Every year, researchers at Virginia Tech produce the Global Agricultural Productivity Report, which tracks and analyzes TFP trends. The 2025 version asserts that reversing the decline in TFP growth—including low growth in the Americas—will require five “policy, investment and research priorities,” which are:

  • Invest more in strengthening and expanding multistakeholder dialogues, agriculture extension services, and incentive structures for technology transfer to smallholder farmers.
  • Expand access to markets for all participants in the agrifood value chain, including smallholder farmers.
  • Strengthen trade as it “enhances competitive prices” which incentivizes investment in improved inputs and technologies” while facilitating “the exchange of knowledge, innovations, and best practices across borders, driving productivity gains.”
  • Reduce food loss and waste.
  • Invest in public-private partnerships, joint ventures, knowledge sharing agreements and platforms, and interdisciplinary research.

These types of innovative practices have real impact on agrifood systems at every level, down to the farm itself. Innovation delivers new seeds and crop varieties, creates more efficient production methods, solves practical problems faced by farmers (pests and disease), and creates new markets for goods and services provided by farmers (such as using sugarcane to produce ethanol to reduce carbon emissions of transport
fuels).

Farmers are both users and creators of innovative technologies and processes, so their knowledge and experience should be included in robust feedback loops. Moreover, farmers must be able to adopt and utilize innovative technologies and processes to realize their full positive contributions. This is not an automatic process, as on-farm adoption is not the same thing as laboratory invention. When making investment decisions, farmers are businesspersons, concerned about the upfront costs and return on investment (ROI). Global surveys of farmers indicate they are hesitant to adopt new technologies and processes if the technologies and processes are unfamiliar or they face high initial investment costs or uncertain ROI.

Publicly funded agricultural extension programs, which connect researchers at universities and other institutions to farmers—in the process, enabling mutual learning and successful technology transfer—are critical to improving agtech adoption. Maintaining and strengthening extension services (including public funding) should be central to any country’s aspiration to build world-class agrifood systems based on widespread technology and process adoption by farmers.

Improving infrastructure to strengthen agrifood supply chains is also critical, especially as higher temperatures, changing precipitation patterns, more frequent and powerful disasters, and other problems will put more infrastructure—e.g., ports, bridges, roads, railroads, canals— at risk. Ports are especially at risk, with most food trade moving by cargo ships. The Panama Canal, which in recent years has had low water levels due to Central American drought, is a good example. (Chinese ownership of port facilities also has proven controversial in the United States.) Beyond adaptation measures designed to improve individual pieces of infrastructure, there is much need for strategies that will frame the challenge in terms of societal and even transboundary (international) resilience. Canada, for example, in 2023 released a whole-of-society National Adaptation Strategy that emphasizes the need to make physical infrastructure (and communities) more resilient to climate-driven impacts.

Three locomotives haul goods over the Ascotán Pass to the Bolivian border. (Wikimedia/Kabelleger)

Farmers for the future

Ensuring a food-secure future in the Americas must place human beings at its center. This formula long has been the focus on the demand side of the food-security equation: The goal always is to ensure that all humans always have access to affordable and nutritious food.

Yet the same logic also holds on the supply side of the equation. To avoid the demographic decline of farming amid the chronic aging of the world’s farmers, it is imperative that farming be made financially, socially, and culturally attractive to younger generations. Unfortunately, such conditions are not prevalent in many countries (perhaps most) around the world. The reasons for this are many. To young people, particularly those without a family heritage in agriculture, farming can be perceived as backward, unprofitable, difficult, alien, or uncool—or all the above.

There is no single set of recognized solutions to assist in turning the demographic trendlines around. However, evidence from around the world suggests that a combination of interventions, some obvious and others not so much, might suffice. The obvious ones are to make it easier to gain access to farming in the first place by reducing barriers to entry (access to affordable financing or access to farmland through ownership or long-term contract), and closing knowledge and skills gaps through on-farm training programs, scholarships, and apprenticeships. There are less obvious interventions, too. One such intervention is to incentivize nontraditional candidates to enter farming, for example, young women, in addition to traditional candidates (typically men). Another is to stress the increasingly important role played by digital technologies, robotics, big data and remote sensing, artificial intelligence, and other technical applications that appeal to tech-savvy and ambitious young people.

Although none of these solutions will guarantee a demographic rebound in farming, there are examples of where the curve has been bent toward youth. Brazil’s farmers are getting younger rather than older. They appear to be attracted by the prospect of getting rich in Brazil’s booming, forward-facing, and tech-savvy industry.

A combine harvests corn in a field in Southern Michigan. (Unsplash/Loren King)

Conclusion

The issues outlined in this report should be seen as a starting point for discussion. The challenges and the opportunities facing agrifood systems in the Americas in the coming decades will be profound. A central question is whether the hemisphere’s key actors—governments, farmers, the private sector, researchers, foundations, civil society groups, and the public—will be willing to invest in the transformative processes and approaches that will reduce risk while increasing prosperity, sustainability, and resilience.

This report has put great emphasis upon generating productive dialogues among key stakeholders. Promoting the diffusion of critical innovations for food security will be an important piece of this process. It is imperative that governments and multilateral institutions in the hemisphere find financing and pool technological know-how to support programs tailored to meet the needs of the region.

Beyond that, however, it is critical that nongovernmental stakeholders, including investors, the private sector, researchers, scientists, analysts, farmers, and farming communities, act in concert with one another. They must themselves build the transnational dialogues to assist in envisioning, creating, and strengthening the tools that will be needed to ensure a food-secure future.

Acknowledgments

This report was produced by the Atlantic Council with support from The Mosaic Company as part of the Food security: Strategic alignment in the Americas project.

About the authors

Peter Engelke is a senior fellow with the Atlantic Council’s Scowcroft Center for Strategy and Security as well as a senior fellow with its Global Energy Center. His diverse work portfolio spans strategic foresight; geopolitics, diplomacy, and international relations; climate change and Earth systems; food, water, and energy security; emerging and disruptive technologies and tech-based innovation ecosystems; and demographics and urbanization, among other subjects, and he is the creator of the Council’s most widely read long-form publication series, Global Foresight. Engelke’s previous affiliations have included the Geneva Centre for Security Policy, the Robert Bosch Foundation, the World Economic Forum, and the Stimson Center.

Matias Margulis is associate professor of the School of Public Policy and Global Affairs and a faculty member of Land and Food Systems at the University of British Columbia. His research and teaching interests are in global governance, development, human rights, international law, and food policy. In addition to his academic research, Margulis has extensive professional experience in the field of international policymaking and is a former Canadian representative to the World Trade Organization, Organisation for Economic Co-operation and Development, and the UN Food and Agriculture Organization.

Explore the program

The GeoStrategy Initiative, housed within the Scowcroft Center for Strategy and Security, leverages strategy development and long-range foresight to serve as the preeminent thought-leader and convener for policy-relevant analysis and solutions to understand a complex and unpredictable world. Through its work, the initiative strives to revitalize, adapt, and defend a rules-based international system in order to foster peace, prosperity, and freedom for decades to come.

The post The future of food in the Americas appeared first on Atlantic Council.

]]>
El futuro de la alimentación en las Américas https://www.atlanticcouncil.org/in-depth-research-reports/report/el-futuro-de-la-alimentacion-en-las-americas/ Tue, 11 Nov 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=885594 Un informe del Centro Scowcroft para la Estrategia y la Seguridad evalúa los mayores desafíos y oportunidades que enfrenta la seguridad alimentaria del hemisferio occidental en un panorama estratégico cambiante.

The post El futuro de la alimentación en las Américas appeared first on Atlantic Council.

]]>

Introducción

La seguridad alimentaria está en el núcleo de la seguridad nacional, regional y global. Cuando las sociedades tienen garantizado el acceso a los alimentos, poseen una probabilidad mucho mayor de mantener la estabilidad social y política; cuando carecen de ella, sucede lo contrario. Afortunadamente, el hemisferio occidental—las Américas—es una región con seguridad alimentaria. Aunque el acceso a los alimentos sigue siendo un desafío constante, la abundancia alimentaria caracteriza en general a las Américas, gracias a una base favorable de recursos naturales, condiciones geopolíticas benignas y una amplia cooperación pública y privada orientada a mejorar los métodos de producción y fomentar la innovación. 

Sin embargo, el futuro podría no parecerse al pasado. Varios factores clave de cambio podrían alterar la trayectoria de la seguridad alimentaria hemisférica, amenazando la estabilidad y productividad de los actuales sistemas agroalimentarios o, por el contrario, ofreciendo esperanza de que estos se vuelvan aún más sólidos y resilientes. Estos factores incluyen el deterioro de ecosistemas sanos y estables, la rápida transformación de la geopolítica, la erosión de las instituciones multilaterales, la creciente inflación y volatilidad de los precios de los alimentos, la promesa de la innovación y las tecnologías emergentes, y los cambios generacionales en la agricultura y la producción agropecuaria. 

Aunque estas fuerzas se cruzan, muchos líderes las perciben como desafíos aislados. Su interacción multiplica el dinamismo del sistema, lo que exigirá que los responsables de políticas públicas, líderes empresariales, inversionistas y agricultores encuentren soluciones innovadoras frente a un panorama agroalimentario que cambia rápidamente y cuyo futuro no es del todo predecible. 

Maíz duro, semillas, frijoles, pimientos y otros productos secos se exhiben en un estante de madera montado en la pared en el pueblo indígena de Zinacantán, México. (Unsplash/Alan De La Cruz)

Alimentación, sociedad y política 

Ningún otro bien tiene un impacto tan profundo en la sociedad y la política como los alimentos, porque las personas necesitan comer todos los días. A menudo, basta con un solo gran aumento en los precios de los alimentos para alterar las dinámicas sociales y políticas dentro de un país o incluso de toda una región. Aunque los precios altos de los alimentos afectan de manera desproporcionada a los países vulnerables, pobres y frágiles, también pueden tener un gran impacto en naciones que, en principio, son ricas y estables

La definición estándar de seguridad alimentaria, adoptada en 1996 por la Organización de las Naciones Unidas para la Alimentación y la Agricultura (FAO) y solo ligeramente revisada desde entonces, establece que: 

La seguridad alimentaria existe cuando todas las personas, en todo momento, tienen acceso físico, social y económico a alimentos suficientes, inocuos y nutritivos que satisfacen sus necesidades dietéticas y preferencias alimentarias para llevar una vida activa y sana. 

Sin embargo, faltan algunos elementos importantes en esta formulación de la seguridad alimentaria. Uno de ellos es la estabilidad ecológica. La seguridad alimentaria depende de la sostenibilidad de los sistemas naturales de la Tierra que son esenciales para la producción de alimentos. Un segundo elemento es la estabilidad del sistema internacional, específicamente la estabilidad de un orden comercial basado en normas que garantice que los alimentos puedan desplazarse fácilmente desde los países con excedentes hacia aquellos con déficits alimentarios. 

Estas condiciones no deben darse por sentadas. Mirando hacia el futuro, es probable que el mundo se vuelva más dinámico y menos estable, con aspectos tanto positivos como negativos. Para prosperar, los sistemas agroalimentarios mundiales deberán volverse más resilientes y adaptables. 

Estantes completamente abastecidos de arroz y frijoles empacados a la venta en un supermercado en Utiva, Costa Rica. (Unsplash/Bernd Dittrich)

Seguridad alimentaria en las Américas 

El hemisferio occidental desempeña un papel indispensable en la seguridad alimentaria global. 

Lado de la oferta: Producción agrícola en las Américas 

Los cinco países con mayor producción primaria de cultivos (por tonelaje) en el mundo se encuentran todos en las Américas: Brasil, Estados Unidos, Argentina, México y Canadá. El hemisferio también cuenta con los principales exportadores de los cuatro cultivos básicos: soya, maíz, trigo y arroz. Además, las Américas producen una amplia variedad de cultivos especializados, entre ellos café, aguacates, limones, limas, naranjas, arándanos, cranberries, quinua, almendras y muchos más. 

La agricultura continúa siendo un componente esencial de las economías nacionales en las Américas. La participación de la agricultura en el PIB supera el 5% en la mayoría de los países y llega a más del 10% en algunos de ellos. 

Lado de la demanda: Calorías y nutrición 

La definición de seguridad alimentaria de la FAO subraya que, si las personas no pueden acceder a una dieta nutritiva a precios estables y asequibles, no se puede hablar de seguridad alimentaria. 

En las últimas décadas, el hemisferio occidental ha reducido gradualmente su nivel de inseguridad alimentaria. En términos comparativos, ha tenido un buen desempeño. Entre 1990 y 2015, América Latina y el Caribe fue la única región del mundo que logró reducir el hambre a la mitad. Actualmente, el hemisferio presenta mejores resultados que el promedio mundial en cuanto a subalimentación, inseguridad alimentaria severa y prevalencia de emaciación infantil (niños pequeños con bajo peso). 
(Aunque varios países tienen un rendimiento inferior, como Haití, Bolivia, Honduras, Ecuador y Guatemala.) 

En los indicadores relacionados con dietas poco saludables, como el sobrepeso y la obesidad, las Américas muestran un desempeño menos favorable. 

Finalmente, las mujeres en las Américas son ligeramente más propensas que los hombres a sufrir inseguridad alimentaria. 

Un tráiler llena cajas de semillas en un campo de Míchigan. (Unsplash/Loren King)

Factores de cambio en las Américas y más allá

La seguridad alimentaria en las Américas enfrenta varios factores de cambio significativos que se cruzan e interactúan entre sí. 

Cambio ecológico 

Los riesgos ecológicos se encuentran entre las mayores amenazas para la seguridad alimentaria. Los principales riesgos incluyen el cambio climático, la deforestación, la pérdida de biodiversidad y la erosión y degradación del suelo. Quizás la amenaza más grave para la producción agrícola sea la combinación de sequía y calor extremo, condiciones “secas-calientes” que se volverán más frecuentes tanto en el mundo como en las Américas. 

Una posibilidad desalentadora para el futuro es la aparición de fallas simultáneas en múltiples regiones productoras de granos básicos (“fallas en las canastas de pan” del mundo). Las Américas, hogar de varios de los principales productores mundiales de cultivos básicos, enfrentan esta posibilidad. El cambio climático también afectará negativamente a la mayoría de los cultivos especializados, incluidos el café y los plátanos

Los agricultores se verán afectados de manera diferente dependiendo de dónde trabajen dentro del hemisferio, el tamaño y los recursos de sus fincas (financieros y de otro tipo), si son agricultores de subsistencia o están integrados en los mercados nacionales, regionales y globales, y los tipos de cultivos que producen. Los pequeños agricultores en contextos más pobres estarán en mayor riesgo debido al tamaño reducido de sus parcelas y a la falta de acceso a seguros y otros recursos. 

Potencialmente, los cambios ecológicos con impactos a gran escala podrían generar importantes déficits en el suministro mundial de alimentos, provocando pánicos en los mercados, precios altos, acaparamiento y una ruptura del comercio internacional. La inseguridad alimentaria se dispararía. 

Turbulencia geopolítica y geoeconómica 

Un segundo conjunto de riesgos proviene de la incertidumbre geopolítica y geoeconómica creciente. Un sistema comercial abierto y basado en normas ha sido esencial para mejorar la seguridad alimentaria, al fomentar una mayor integración económica que, a su vez, contribuye a la seguridad alimentaria mediante mayor crecimiento económico, más empleo, aumento de ingresos, reducción de la pobreza y dinamismo económico. 

Sin embargo, el sistema mundial de comercio de alimentos ha sido perturbado por varios acontecimientos geopolíticos importantes, incluyendo guerras (como la de Ucrania), políticas comerciales y sanciones que generan choques imprevistos en los insumos agrícolas, las cadenas de suministro y las exportaciones agroalimentarias, lo que resulta en mayores costos de producción y precios de los alimentos. 

El sistema agroalimentario mundial podría estar regresando a un orden proteccionista previo a los años 1990, cuando los países solían aplicar aranceles elevados solo a unos pocos cultivos políticamente sensibles (como el azúcar o el algodón). Hoy, el proteccionismo emergente es mucho más amplio, afecta a un número mayor de cultivos y lo implementa una lista cada vez más larga de países. 

Los patrones comerciales también están cambiando debido a la geopolítica. El comportamiento de China es un ejemplo significativo. Hace una década, China importaba más productos agrícolas de Estados Unidos que de Brasil; hoy, importa casi el doble de Brasil que de EE. UU. La desvinculación de China del mercado agrícola estadounidense ha ayudado a que Brasil se convierta en el mayor exportador mundial de soya. 

Además, después de que Estados Unidos impusiera aranceles en agosto de 2025 a ciertos productos agrícolas brasileños, Brasil probablemente intensificará su interés en desarrollar mercados de exportación alternativos, incluidos los acuerdos con China. 

Incertidumbre institucional 

Las instituciones multilaterales han contribuido a generar una prosperidad sin precedentes—aunque desigual—al fomentar el comercio global y hemisférico. Sin embargo, hoy estas instituciones están bajo una enorme presión. Las principales potencias comerciales del mundo, junto con muchas naciones más pequeñas, han estado dispuestas a romper normas establecidas y leyes internacionales de comercio, creando una gran incertidumbre en torno a las reglas comerciales. 

Las Américas se benefician más que otras regiones de un sistema global de comercio agrícola abierto. La agricultura siempre ha sido un tema controvertido en las negociaciones comerciales, desde los orígenes del Acuerdo General sobre Aranceles Aduaneros y Comercio (GATT) en la década de 1940. A pesar de ello, las instituciones multilaterales funcionales son de gran valor porque crean un mercado global estable y basado en normas, lo cual posibilita el comercio de alimentos a gran escala. 

Inflación y variabilidad de precios 

La inseguridad alimentaria se agrava con una inflación rápida de precios y una alta variabilidad de precios. Desde los años 2000, los sucesivos choques han generado nuevos niveles base de precios más altos. Los alimentos son menos asequibles, y los hogares enfrentan más dificultades para mantener una dieta saludable. 

La inflación y la volatilidad de los precios de los alimentos son tan problemáticas en las Américas como en otras partes del mundo, y se han convertido en un tema clave social y político. En América Latina, el aumento de los precios de los alimentos ha sido un principal impulsor de la inflación regional, mientras que en América del Norte, el alza de precios ha sido una de las principales causas de la crisis del costo de vida que afecta a muchos hogares. 

Un supermercado colombiano exhibe una variedad de verduras a la venta. (Unsplash/nrd)

Inversión: Innovación, tecnología e infraestructura 

Las innovaciones y aumentos de productividad dentro y fuera del ámbito agrícola —derivadas de los avances tecnológicos, las mejoras en los procesos y las inversiones en infraestructura— han sido fundamentales para aumentar la oferta de alimentos y satisfacer la creciente demanda mundial. 

Desde la década de 1990, las ganancias globales en eficiencia han superado ampliamente otros factores, como el uso de más insumos por hectárea, la expansión del riego en tierras de cultivo o la apertura de nuevas áreas agrícolas (por ejemplo, la conversión de tierras forestales en agrícolas). 

Sin embargo, el crecimiento mundial de la Productividad Total de los Factores (PTF) —una medida de eficiencia que evalúa los insumos agrícolas en relación con los resultados— se está desacelerando. Después de aumentar de forma constante durante décadas, la PTF ha comenzado a caer, especialmente en las Américas

Las inversiones en infraestructura en gran parte del hemisferio también siguen siendo insuficientes, con trillones de dólares necesarios para mejorar las redes de transporte, energía y logística. 

Por ejemplo, en Canadá, el déficit de infraestructura, estimado en casi 200 mil millones de dólares, es particularmente relevante para las exportaciones agrícolas de ese país, que incluyen tanto productos alimenticios (como granos) como insumos agrícolas clave (como fertilizantes) producidos en su vasto interior. Reducir los costos y aumentar la eficiencia del transporte de estos bienes hacia los mercados internacionales exigirá modernizar la infraestructura de transporte

Cambios demográficos 

El empleo agrícola como proporción del PIB mundial lleva décadas en descenso. El hemisferio occidental ha seguido esta tendencia, lo que demuestra que la agricultura se está volviendo más intensiva en capital y más productiva. 
Hoy se produce más alimento por persona empleada en el sector. 

Sin embargo, existe un efecto generacional negativo asociado a esta tendencia. En todo el mundo, los agricultores están envejeciendo, en parte porque las oportunidades laborales en las fincas están disminuyendo. 
Esta tendencia es más pronunciada en las regiones más ricas, donde la proporción de empleo agrícola es menor, como en la Unión Europea y los Estados Unidos

Un dron sobrevuela un campo. (Unsplash/Job Vermeulen)

Hacia un futuro con seguridad alimentaria 

El mundo necesita una nueva y audaz forma de pensar sobre la seguridad alimentaria, una que incorpore una comprensión integral de cómo fuerzas divergentes están creando un panorama agroalimentario dinámico e inestable, que moldeará el futuro de maneras impredecibles. 

Ecología 

Un desafío central será garantizar que la producción de alimentos siga siendo rentable y resiliente frente a los cambios ecológicos disruptivos. 
Las sinergias entre los servicios ecosistémicos saludables, una producción agrícola robusta y la rentabilidad pueden encontrarse mediante la aplicación adecuada de imaginación, creatividad, formulación de políticas, inversión y acción práctica, utilizando el conocimiento y la participación de los agricultores y sus comunidades. 

La agricultura es un importante impulsor del cambio ecológico, incluido el uso del suelo y las emisiones de carbono. Sin embargo, al mismo tiempo, la agricultura posee un enorme potencial —bajo las condiciones nacionales e internacionales adecuadas— para ofrecer soluciones sólidas y duraderas. 

Los enfoques sinérgicos incluyen una amplia gama de técnicas y prácticas agrícolas alternativas, así como tecnologías novedosas, entre ellas: 

  • La agricultura regenerativa 
  • La siembra directa (no-till farming)
  • La agroforestería 
  • La agricultura climáticamente inteligente 
  • El Manejo 4R de Nutrientes (Right sources, Right rates, Right times, Right places: fuentes, dosis, momentos y lugares correctos para aplicar nutrientes). 

Aunque muchos de estos enfoques se consideraban antes experimentales o no comprobados, hoy eso es mucho menos cierto. Por ejemplo, la agricultura regenerativa cuenta con un número creciente de adeptos —incluidos agricultores— que creen que puede generar beneficios ambientales tangibles sin sacrificar los rendimientos en las fincas. Existe una enorme cantidad de tierras y suelos degradados que podrían revitalizarse mediante estas prácticas.

 
En las Américas, la degradación representa un problema serio, pero también una gran oportunidad. Brasil, por ejemplo, posee vastas extensiones de pastizales degradados que podrían volver a ser productivas utilizando métodos regenerativos, lo que ayudaría a reducir la presión sobre la conversión de bosques en las regiones del Cerrado y la Amazonía. 

Comercio, geopolítica e instituciones 

El aumento del proteccionismo y la competencia geopolítica socavan la cooperación entre Estados y erosionan la confianza internacional. El comercio mundial de alimentos depende de la fortaleza de las instituciones multilaterales y de los acuerdos internacionales, que suelen ser contribuyentes subestimados a la seguridad alimentaria global. Hoy, estas instituciones están siendo erosionadas, y el riesgo es la posible caída de todo el sistema multilateral de comercio. 

Una mayor cantidad de diálogo entre los Estados es un antídoto necesario. 
Un objetivo podría ser la creación de nuevas instituciones regionales, empezando, por ejemplo, con los principales productores agrícolas del hemisferio —un posible grupo “A5” compuesto por Estados Unidos, Brasil, México, Canadá y Argentina— para reunir a los ministros de agricultura en torno al diálogo comercial. 

Los resultados de dicho esfuerzo podrían incluir: 

  • Pactos regionales de seguridad alimentaria 
  • Compromisos de inversión en investigación agrícola
  • Acuerdos para evitar políticas comerciales que distorsionen los mercados 

Una idea relacionada es la creación de un Consejo Hemisférico Permanente de Seguridad Alimentaria, que reúna a los gobiernos para coordinar respuestas a crisis y choques, identificar vías para una mayor cooperación científica y tecnológica, y reforzar la norma que reconoce la responsabilidad del hemisferio como principal proveedor de alimentos para el resto del mundo. Instituciones hemisféricas existentes, como la Organización de los Estados Americanos (OEA) y el Banco Interamericano de Desarrollo (BID), podrían desempeñar un papel clave en la convocatoria y apoyo de este consejo. 

Tres locomotoras transportan mercancías sobre el paso de Ascotán hacia la frontera con Bolivia. (Wikimedia/Kabelleger)

Inversión en innovación, tecnología e infraestructura

La mejora constante de las actividades dentro y fuera de las fincas —incluyendo el uso innovador de nuevas tecnologías y procesos, así como la inversión de capital en los factores que las posibilitan (como la infraestructura)— es fundamental para garantizar que el hemisferio y el mundo sean seguros en materia alimentaria. 

La agricultura regenerativa y otros sistemas agroalimentarios sostenibles pueden potenciarse mediante la aplicación de tecnologías avanzadas. Algunos ejemplos incluyen

  • Fuentes de energía alternativas que mejoran las operaciones dentro y fuera de la finca, reduciendo al mismo tiempo la huella de carbono. 
  • Herramientas de teledetección geoespacial aplicadas a la agricultura de precisión, que permiten identificar y proteger los activos ecológicos. 
  • Robótica y tecnologías digitales móviles (incluyendo una mayor integración de dispositivos portátiles en las prácticas agrícolas) que pueden mejorar la eficiencia y reducir el impacto ambiental. 
  • Analítica impulsada por inteligencia artificial (IA), que puede integrar y utilizar flujos de datos provenientes de múltiples aplicaciones. 
  • Biotecnologías que mejoran la productividad agrícola y la eficiencia en el uso de nutrientes, al tiempo que protegen activos ecológicos como el suelo y el agua. 

Los agricultores son tanto usuarios como creadores de tecnologías y procesos innovadores, y deben tener la capacidad de adoptar y aprovechar estos avances. Sin embargo, la adopción en el campo no es lo mismo que la invención en laboratorio. 

Las encuestas globales de agricultores muestran que muchos son reacios a adoptar nuevas tecnologías o procesos cuando enfrentan altos costos iniciales de inversión y rendimientos inciertos. 

Por ello, los programas públicos de extensión agrícola, que conectan a investigadores y agricultores para fomentar el aprendizaje mutuo y la transferencia tecnológica, son críticos. Fortalecer los servicios de extensión debe ser una prioridad central para lograr una adopción amplia de innovaciones agrícolas. 

Asimismo, mejorar la infraestructura para fortalecer las cadenas de suministro agroalimentarias es esencial. Se necesitan estrategias que aborden este desafío desde la perspectiva de la resiliencia social e incluso transfronteriza (internacional). 

Una cosechadora recolecta maíz en un campo en el sur de Míchigan. (Unsplash/Loren King)

Los agricultores del futuro 

Para evitar el declive demográfico del sector agrícola, es fundamental que la agricultura se vuelva financieramente, socialmente y culturalmente atractiva para las nuevas generaciones. 

Para muchos jóvenes —especialmente aquellos sin una herencia familiar agrícola—, dedicarse al campo puede parecer anticuado, poco rentable, difícil, ajeno o poco atractivo… o todo lo anterior. 

No existe un conjunto único de soluciones reconocidas para revertir esta tendencia demográfica. Sin embargo, la evidencia global sugiere que una combinación de intervenciones podría ser suficiente

  • Facilitar el acceso a la agricultura, reduciendo las barreras de entrada, como el acceso limitado al financiamiento asequible y a la tierra cultivable. 
  • Cerrar las brechas de conocimiento y habilidades mediante programas de capacitación en campo, becas y programas de aprendizaje. 
  • Incentivar la participación de candidatos no tradicionales, como mujeres jóvenes, en la agricultura. 
  • Resaltar el papel creciente de la tecnología digital, la robótica, los macrodatos (Big Data), la teledetección, la inteligencia artificial y otras aplicaciones técnicas que resultan atractivas para los jóvenes ambiciosos y con afinidad tecnológica. 

En resumen, el futuro de la agricultura dependerá de su capacidad para integrar la innovación con el atractivo social y económico, de modo que las nuevas generaciones vean en el campo una oportunidad de progreso y liderazgo, no una ocupación del pasado. 

Conclusión breve 

Una cuestión central es si los actores clave del hemisferio —gobiernos, agricultores, sector privado, investigadores, fundaciones, grupos de la sociedad civil y el público— estarán dispuestos a invertir en procesos y enfoques transformadores que reduzcan riesgos a la vez que incrementen la prosperidad, la sostenibilidad y la resiliencia. 

Promover la difusión de innovaciones críticas para la seguridad alimentaria será una parte importante de esta ecuación. Es imperativo que los países y las instituciones multilaterales del hemisferio encuentren financiamiento y compartan el conocimiento tecnológico necesario para apoyar programas adaptados a las necesidades de la región. 

Otros actores no gubernamentales, incluyendo inversores, sector privado, investigadores, científicos, analistas y comunidades agrícolas, también deben actuar de manera concertada para visualizar, crear y fortalecer las herramientas necesarias que aseguren un futuro con seguridad alimentaria. 

agradecimientos

Este reporte fue elaborado por el Atlantic Council con el apoyo de The Mosaic Company como parte del proyecto Seguridad alimentaria: alineación estratégica en las Américas

Acerca de los autores

Peter Engelke es experto sénior del Centro Scowcroft para Estrategia y Seguridad del Atlantic Council, y experto sénior del Centro Global de Energía. Su diverso portafolio de trabajo abarca previsión estratégica; geopolítica, diplomacia y relaciones internacionales; cambio climático y sistemas terrestres; seguridad alimentaria, hídrica y energética; tecnologías emergentes y disruptivas y ecosistemas de innovación basados en tecnología; y demografía y urbanización, entre otros temas. Es el creador de la serie de publicaciones extensas más leída del Consejo, Global Foresight. Las afiliaciones previas de Engelke han incluido el Centro de Política de Seguridad de Ginebra, la Fundación Robert Bosch, el Foro Económico Mundial y el Centro Stimson.

Matias Margulis es profesor asociado de la Escuela de Políticas Públicas y Asuntos Globales y miembro de la facultad de Tierras y Sistemas Alimentarios de la Universidad de Columbia Británica. Sus intereses de investigación y docencia se centran en la gobernanza global, el desarrollo, los derechos humanos, el derecho internacional y la política alimentaria. Además de su investigación académica, Margulis tiene una amplia experiencia profesional en el ámbito de la formulación de políticas internacionales y fue representante canadiense ante la Organización Mundial del Comercio, la Organización para la Cooperación y el Desarrollo Económicos y la Organización de las Naciones Unidas para la Alimentación y la Agricultura.

Explora el programa

La Iniciativa GeoStrategy, alojada dentro del Centro Scowcroft para Estrategia y Seguridad, utiliza el desarrollo estratégico y la previsión a largo plazo para servir como el principal referente y convocante de análisis y soluciones relevantes para las políticas públicas, con el fin de comprender un mundo complejo e impredecible. A través de su trabajo, la iniciativa se esfuerza por revitalizar, adaptar y defender un sistema internacional basado en normas para fomentar la paz, la prosperidad y la libertad durante las próximas décadas.

The post El futuro de la alimentación en las Américas appeared first on Atlantic Council.

]]>
O futuro da alimentação nas Américas https://www.atlanticcouncil.org/in-depth-research-reports/report/o-futuro-da-alimentacao-nas-americas/ Tue, 11 Nov 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=885644 Um relatório do Centro Scowcroft para Estratégia e Segurança avalia os principais desafios e oportunidades que a segurança alimentar enfrenta no Hemisfério Ocidental em um cenário estratégico em transformação.

The post O futuro da alimentação nas Américas appeared first on Atlantic Council.

]]>

Introdução

A segurança alimentar está no núcleo da segurança nacional, regional e global. Quando as sociedades possuem segurança alimentar, elas têm muito mais chances de alcançar estabilidade social e política; quando não a possuem, ocorre o contrário. Felizmente, o hemisfério ocidental — as Américas — é uma região com segurança alimentar. Embora o acesso aos alimentos continue sendo um desafio constante, a abundância de alimentos geralmente caracteriza as Américas, graças a uma base favorável de recursos naturais, condições geopolíticas estáveis e ampla cooperação entre os setores público e privado para aprimorar os métodos de produção e promover a inovação.

Entretanto, o futuro pode não se parecer com o passado. Diversos fatores determinantes de mudança podem alterar a trajetória da segurança alimentar no hemisfério, ameaçando a estabilidade e a produtividade dos atuais sistemas agroalimentares ou, alternativamente, oferecendo a esperança de que esses sistemas se tornem ainda mais fortes e resilientes. Esses fatores incluem o declínio de ecossistemas saudáveis e estáveis, as rápidas transformações na geopolítica, a erosão das instituições multilaterais, o aumento da inflação e da volatilidade dos preços dos alimentos, o potencial da inovação e das tecnologias emergentes, bem como as mudanças geracionais na agricultura e na produção agropecuária.

Embora essas forças se interconectem, muitos líderes as veem como desafios isolados. A interação entre elas multiplica o dinamismo do sistema, o que exigirá que formuladores de políticas públicas, líderes empresariais, investidores e produtores rurais encontrem soluções inovadoras diante de um cenário agroalimentar em rápida transformação — e não totalmente previsível.

Milho duro, sementes, feijões, pimentas e outros produtos secos são exibidos em uma prateleira de madeira na comunidade indígena de Zinacantán, México. (Unsplash/Alan De La Cruz)

Alimentação, sociedade e política           

Nenhum outro bem exerce impacto tão significativo sobre a sociedade e a política quanto os alimentos, pois as pessoas precisam se alimentar todos os dias. Muitas vezes, basta um único grande choque nos preços dos alimentos para alterar as dinâmicas sociais e políticas dentro de um país ou até mesmo em toda uma região. Embora preços elevados de alimentos tenham um impacto desproporcionalmente negativo sobre países vulneráveis, pobres e frágeis, eles também podem afetar de maneira significativa países que, de outra forma, seriam ricos e estáveis.

A definição padrão de segurança alimentar, adotada em 1996 pela Organização das Nações Unidas para a Alimentação e a Agricultura (FAO/Food and Agriculture Organization) e apenas ligeiramente revisada desde então, é:

A segurança alimentar existe quando todas as pessoas, em todos os momentos, têm acesso físico, social e econômico a alimentos seguros, nutritivos e em quantidade suficiente para atender às suas necessidades dietéticas e preferências alimentares, permitindo uma vida ativa e saudável.  

Algumas peças importantes do quebra-cabeça da segurança alimentar estão ausentes nesta formulação. Uma delas é a estabilidade ecológica. A segurança alimentar depende da sustentabilidade dos sistemas terrestres subjacentes, essenciais à produção de alimentos. A segunda é a estabilidade do sistema internacional, especificamente a estabilidade de uma ordem comercial baseada em regras, que garante que os alimentos possam se mover com facilidade de países com excedentes para países com déficits alimentares.

Essas condições não devem ser tratadas como garantidas. Olhando para o futuro, é provável que o mundo se torne mais dinâmico — e não o contrário — com ganhos e perdas. Para prosperar, os sistemas agroalimentares globais precisarão se tornar mais resilientes e adaptáveis.

Prateleiras repletas de arroz e feijão embalados à venda em um supermercado em Utiva, Costa Rica. (Unsplash/Bernd Dittrich)

Segurança alimentar nas américas

O hemisfério ocidental desempenha um papel indispensável na segurança alimentar global.

Lado da oferta: Produção agrícola nas Américas

Os cinco maiores países produtores de culturas agrícolas primárias do mundo (em volume) estão todos nas Américas: Brasil, Estados Unidos, Argentina, México e Canadá. O hemisfério também abriga os principais exportadores das quatro principais culturas globais: soja, milho, trigo e arroz. Além disso, as Américas produzem uma ampla variedade de culturas especiais, incluindo café, abacate, limões, limas, laranjas, mirtilos, cerejas, quinoa, amêndoas e outras.

A agricultura continua sendo uma peça fundamental das economias nacionais nas Américas. Em grande parte dos países, sua participação no PIB é superior a 5%, e em alguns casos ultrapassa 10%.

Lado da demanda: Calorias e nutrição

A definição de segurança alimentar da FAO enfatiza que, se as pessoas não tiverem acesso a uma dieta nutritiva a preços acessíveis e estáveis, elas não estarão em situação de segurança alimentar.

Nas últimas décadas, o hemisfério ocidental reduziu gradualmente seu nível de insegurança alimentar. Comparativamente, teve um bom desempenho. Entre 1990 e 2015, a América Latina e o Caribe foram as únicas regiões do mundo a reduzir a fome pela metade. Atualmente, o hemisfério apresenta desempenho superior à média mundial em indicadores de desnutrição, insegurança alimentar grave e prevalência de emagrecimento em crianças pequenas, (embora vários países apresentem desempenho inferior, incluindo Haiti, Bolívia, Honduras, Equador e Guatemala). Em métricas relacionadas a dietas inadequadas, como sobrepeso e obesidade, as Américas tiveram desempenho menos favorável.

Por fim, as mulheres nas Américas têm uma probabilidade ligeiramente maior do que os homens de enfrentar insegurança alimentar.

Um caminhão carrega caixas de sementes em um campo em Michigan. (Unsplash/Loren King)

Fatores de transformação nas américas, e além

A segurança alimentar nas Américas enfrenta diversos fatores significativos e interconectados de transformação.

Transformações ecológicas

Os riscos ecológicos estão entre as maiores ameaças à segurança alimentar. Os principais riscos incluem mudanças climáticas, desmatamento, perda de biodiversidade e erosão e degradação do solo. Talvez o mais preocupante para a produção agrícola seja a combinação de seca e calor — as chamadas condições “quentes e secas” — que ameaçam se tornar mais frequentes em todo o mundo e nas Américas. Um cenário desanimador para o futuro é a ocorrência de múltiplas falhas nas “breadbaskets (quebras simultâneas de safra em regiões produtoras de grãos-chave). As Américas, que abrigam vários dos principais produtores mundiais de culturas alimentares básicas, enfrentam essa possibilidade. As mudanças climáticas também terão impacto negativo sobre a maioria das culturas especiais, incluindo café e bananas.

Os agricultores serão impactados de maneiras diferentes, dependendo de onde se localizam no hemisfério, do tamanho e dos recursos de suas propriedades (financeiros e de outra natureza), de serem agricultores de subsistência ou estarem integrados aos mercados nacionais, regionais e globais, e dos tipos de culturas que cultivam. Os pequenos produtores em contextos menos favorecidos estarão sob maior risco, devido ao tamanho reduzido de suas propriedades e à falta de acesso a seguros e a outros recursos.

Potencialmente, transformações ecológicas com impactos em larga escala podem gerar déficits significativos na oferta global de alimentos, provocando pânico nos mercados, elevação de preços, acúmulo de estoques e colapso do comércio. A insegurança alimentar aumentaria drasticamente

Turbulência geopolítica e geoeconômica

Um segundo conjunto de riscos decorre da crescente incerteza geopolítica e geoeconômica. Um sistema comercial aberto e baseado em regras tem sido essencial para o avanço da segurança alimentar, promovendo maior integração econômica — o que beneficia a segurança alimentar por meio de crescimento econômico mais elevado, maior geração de empregos, aumento de renda, redução da pobreza e dinamismo econômico.

Ainda assim, o sistema global de comércio de alimentos tem sido impactado por diversos eventos geopolíticos significativos, incluindo guerras (como a guerra na Ucrânia), políticas comerciais e sanções que geram choques inesperados sobre insumos agrícolas, cadeias de suprimentos e exportações agroalimentares — resultando em aumento dos custos de produção e dos preços dos alimentos.

O sistema de comércio agroalimentar pode estar retornando a uma ordem protecionista anterior aos anos 1990, quando os países costumavam aplicar tarifas elevadas apenas sobre algumas culturas politicamente sensíveis (como açúcar ou algodão). O protecionismo atual, no entanto, é significativamente mais amplo, afetando um número maior de culturas e sendo implementado por uma lista cada vez mais extensa de países.

Os padrões de comércio estão se transformando em função da geopolítica. O comportamento da China é um exemplo significativo. Há uma década, a China importava mais produtos agrícolas dos Estados Unidos do que do Brasil; atualmente, importa quase o dobro do Brasil em relação aos EUA. Esse processo de desacoplamento da China em relação ao mercado agrícola norte-americano contribuiu para que o Brasil se tornasse o maior exportador mundial de soja. Além disso, após a imposição de tarifas pelos Estados Unidos, em agosto de 2025, sobre determinados produtos agrícolas brasileiros, é provável que o Brasil intensifique seu interesse em desenvolver mercados de exportação alternativos para produtos agrícolas, incluindo a China.

Incerteza institucional

As instituições multilaterais têm contribuído para proporcionar uma prosperidade sem precedentes — embora desigual — ao impulsionar o comércio global e hemisférico. No entanto, essas instituições estão agora sob enorme pressão. As maiores potências comerciais do mundo, assim como muitos países menores, têm demonstrado disposição para romper normas estabelecidas e leis internacionais de comércio, gerando incertezas em torno das regras que regem o sistema comercial.

As Américas se beneficiam mais do que outras regiões de um sistema global de comércio aberto de produtos agrícolas. A agricultura sempre foi um tema controverso nas negociações comerciais, desde a origem, na década de 1940, do Acordo Geral sobre Tarifas e Comércio (GATT/General Agreement on Tariffs and Trade). Apesar disso, instituições multilaterais funcionais são valiosas, pois criam um mercado global estável e baseado em regras, que, por sua vez, possibilita o comércio de alimentos em larga escala.

Inflação e volatilidade dos preços

A insegurança alimentar se agrava com a rápida inflação de preços e a elevada volatilidade dos preços. Desde os anos 2000, choques geraram novos patamares mais altos de preços. Os alimentos se tornaram menos acessíveis, e as famílias enfrentam maior dificuldade para consumir uma dieta saudável.

A inflação e a volatilidade dos preços dos alimentos são tão problemáticas nas Américas quanto em outras regiões do mundo, tornando-se uma questão social e política fundamental. Na América Latina, o aumento dos preços dos alimentos tem sido um dos principais impulsionadores da inflação em toda a região, enquanto na América do Norte, o aumento dos preços dos alimentos é uma das principais causas da crise do custo de vida enfrentada por muitas famílias.

Um supermercado colombiano exibe uma variedade de vegetais à venda. (Unsplash/nrd)

Investimento: Inovação, tecnologia e infraestrutura

A inovação dentro e fora das propriedades rurais, aliada ao aumento da produtividade, decorrentes de avanços processuais e tecnológicos, além de melhorias na infraestrutura, têm sido fundamentais para aumentar a oferta de alimentos e atender à crescente demanda. Desde a década de 1990, os ganhos globais de eficiência superaram amplamente os demais fatores, incluindo o uso de mais insumos por hectare de terra, a extensão da irrigação em áreas cultivadas e a expansão de novas terras agrícolas (por exemplo, a expansão da agricultura em áreas anteriormente florestadas).

Infelizmente, o crescimento global da Produtividade Total dos Fatores (PTF — métrica de eficiência que relaciona os insumos agrícolas aos resultados obtidos) está desacelerando. Após décadas de crescimento contínuo, a PTF passou a registrar queda, especialmente nas Américas.

Os investimentos em infraestrutura em grande parte das Américas também permanecem subdesenvolvidos, sendo necessários trilhões de dólares para impulsionar a infraestrutura do hemisfério. No caso do Canadá, por exemplo, o déficit de infraestrutura — estimado em cerca de US$ 200 bilhões — é particularmente relevante para as exportações agrícolas do país, que têm importância global. Essas exportações incluem produtos alimentares como grãos e insumos agrícolas essenciais, como fertilizantes produzidos no vasto interior canadense. Para viabilizar o transporte desses produtos volumosos aos mercados externos de forma mais barata e eficiente, será necessário modernizar a infraestrutura logística do país.

Mudanças demográficas

A participação do emprego agrícola no PIB global vem diminuindo há décadas. O hemisfério ocidental tem seguido essa tendência, evidenciando que a agricultura está se tornando mais intensiva em capital e mais produtiva. Cada vez mais alimentos são produzidos por pessoa contratada no setor.

No entanto, há um efeito geracional negativo associado a essa tendência demográfica. Os agricultores em todo o mundo estão envelhecendo, em parte devido à redução das oportunidades de emprego no campo. Essa dinâmica é mais acentuada nas regiões mais ricas, que apresentam a menor participação relativa de empregos no setor agrícola, como a União Europeia e os Estados Unidos.

Um drone paira sobre um campo. (Unsplash/Job Vermeulen)

Construindo a segurança alimentar do futuro

O mundo precisa de uma nova e ousada forma de pensar sobre a segurança alimentar — uma abordagem que incorpore uma compreensão abrangente de como forças divergentes estão criando um cenário agroalimentar dinâmico e instável, que moldará o futuro de maneiras imprevisíveis.

Ecologia

Um dos principais desafios será garantir que a produção de alimentos continue sendo lucrativa e resiliente diante das mudanças ecológicas disruptivas. É possível encontrar sinergias entre serviços ecossistêmicos saudáveis, uma produção agrícola robusta e lucratividade, por meio da aplicação adequada de imaginação, criatividade, formulação de políticas públicas, investimentos e ações práticas, baseadas na contribuição e no conhecimento de agricultores e comunidades rurais.

A agricultura é um dos principais vetores das mudanças ecológicas, incluindo as relacionadas aos padrões de uso da terra e emissões de carbono. No entanto, ao mesmo tempo, a agricultura também possui um enorme potencial — sob as condições domésticas e internacionais adequadas — para oferecer soluções sólidas e duradouras.

Abordagens sinérgicas incluem uma variedade de técnicas e práticas agrícolas alternativas, bem como tecnologias emergentes, como agricultura regenerativa, cultivo sem revolvimento do solo (no-till farming), sistemas agroflorestais, agricultura inteligente para o clima (climate-smart agriculture) e o Manejo 4R de Nutrientes (4R Nutrient Stewardship) — um conjunto de práticas de gestão de nutrientes que prioriza o uso das fontes corretas, nas doses certas, nos momentos adequados e nos locais apropriados.

Embora muitas dessas abordagens tenham sido consideradas, no passado, experimentais, inovadoras e não comprovadas, hoje essa percepção mudou significativamente. A agricultura regenerativa, por exemplo, conta hoje com um número crescente de adeptos — incluindo produtores rurais — que acreditam em seu potencial para gerar benefícios ambientais concretos sem comprometer a produtividade das lavouras. Há uma quantidade expressiva de terras, incluindo solos, que poderiam ser revitalizadas por meio dessas práticas. Nas Américas, a degradação representa um problema grave, mas também uma grande oportunidade. O Brasil, por si só, possui extensas áreas de pastagens degradadas que poderiam ser reincorporadas à produção agrícola por meio de métodos regenerativos, contribuindo para reduzir a pressão por conversão de florestas nas regiões do Cerrado e da Amazônia. 

Comércio, geopolítica e instituições

O aumento do protecionismo e da competição geopolítica enfraquece a cooperação entre os Estados, desgastando a confiança internacional. O comércio global de alimentos depende da força das instituições multilaterais e dos acordos internacionais — instituições que, muitas vezes, não recebem o devido reconhecimento por sua contribuição à segurança alimentar mundial. Atualmente, essas instituições vêm sendo enfraquecidas, e o risco é o colapso de todo o sistema multilateral de comércio.

Mais diálogo entre os Estados é um antídoto para esse cenário. Um dos objetivos deve ser a construção de instituições alternativas — por exemplo, começando com os maiores produtores agrícolas do hemisfério, um grupo “A5” formado por Estados Unidos, Brasil, México, Canadá e Argentina — para reunir ministros da agricultura em torno de um diálogo sobre comércio. Os resultados potenciais incluem convenções regionais de segurança alimentar, compromissos de investimento em pesquisa agrícola e acordos para evitar as políticas que mais distorcem o comércio.

Uma ideia relacionada é a criação de um conselho hemisférico permanente de segurança alimentar, destinado a reunir governos para discutir respostas a choques, identificar caminhos para uma cooperação científica e tecnológica mais ampla e reforçar a norma que reconhece a responsabilidade do hemisfério perante o restante do mundo como um dos principais fornecedores de alimentos. Instituições hemisféricas, como a Organização dos Estados Americanos (OEA) e o Banco Interamericano de Desenvolvimento (BID), podem ser mobilizadas para convocar esse conselho.

Três locomotivas transportam mercadorias pela Passagem de Ascotán até a fronteira com a Bolívia. (Wikimedia/Kabelleger)

Investimento em inovação, tecnologia e infraestrutura

A melhoria contínua das atividades dentro e fora das propriedades rurais — incluindo o uso inovador de novas tecnologias e processos, além do investimento de capital nos elementos que os viabilizam (como a infraestrutura) — é fundamental para garantir a segurança alimentar no hemisfério e no mundo.

A agricultura regenerativa e outros sistemas agroalimentares voltados à sustentabilidade podem ser aprimorados por meio da aplicação de tecnologias avançadas. Exemplos incluem:

  • Fontes alternativas de energia podem aprimorar os sistemas dentro e fora das propriedades rurais, ao mesmo tempo em que reduzem as marcas das emissões de carbono.
  • Ferramentas de sensoriamento remoto geoespacial aplicadas à agricultura de precisão podem identificar e contribuir para a preservação dos recursos ecológicos.
  • Tecnologias robóticas e digitais móveis (incluindo a integração mais ampla de dispositivos portáteis às práticas agrícolas) podem aumentar a eficiência da produção agrícola, ao mesmo tempo em que reduzem o impacto ambiental.
  • As análises orientadas por inteligência artificial podem integrar e utilizar fluxos de dados provenientes de diversas aplicações.
  • As biotecnologias podem melhorar a produtividade no campo e a eficiência no uso de nutrientes, ao mesmo tempo em que protegem recursos ecológicos, como o solo e a água.

Os agricultores são tanto utilizadores quanto criadores de tecnologias e processos inovadores, e precisam ter condições de adotar e aplicar essas inovações. A adoção no campo não é o mesmo que a invenção em laboratório. Pesquisas globais indicam que os produtores rurais tendem a hesitar em adotar novas tecnologias e práticas quando os custos iniciais de investimento são elevados e os retornos financeiros são incertos.

Programas de extensão agrícola financiados com recursos públicos — que conectam pesquisadores a produtores, promovendo aprendizado mútuo e transferência de tecnologia — são fundamentais. O fortalecimento dos serviços de extensão deve estar no centro das estratégias para ampliar a adoção de inovações pelos agricultores.

Aprimorar a infraestrutura para fortalecer as cadeias de suprimento do sistema agroalimentar também é fundamental. Há uma necessidade premente de desenvolver estratégias que enquadrem esse desafio em termos de resiliência social e até mesmo transfronteiriça (internacional).

Uma colheitadeira colhe milho em um campo no sul de Michigan. (Unsplash/Loren King)

Agricultores para o futuro

Para evitar o declínio demográfico da agricultura, é fundamental tornar a atividade agrícola financeiramente, social e culturalmente atrativa para as novas gerações. Para os jovens — especialmente aqueles sem vínculo familiar com o setor —, a agricultura pode ser percebida como uma atividade ultrapassada, pouco lucrativa, difícil, distante da realidade ou “sem apelo” — ou todas essas coisas ao mesmo tempo.

Não existe um único conjunto de soluções reconhecidas para reverter as tendências demográficas no setor agrícola. No entanto, evidências de diversas partes do mundo indicam que uma combinação de intervenções pode ser eficaz: facilitar o acesso à atividade agrícola, por meio da redução de barreiras de entrada (como o acesso a financiamento acessível e a terras cultiváveis); reduzir lacunas de conhecimento e habilidades por meio de programas de capacitação prática nas propriedades rurais, bolsas de estudo e estágios supervisionados; incentivar a entrada de perfis não tradicionais na agricultura — como jovens mulheres — e destacar o papel cada vez mais relevante desempenhado pelas tecnologias digitais, pela robótica, pelo Big Data, pelo sensoriamento remoto, pela inteligência artificial e por outras aplicações técnicas que despertam o interesse de jovens ambiciosos e familiarizados com tecnologia.

Breve conclusão

Uma questão crucial é saber se os principais atores do hemisfério — governos, produtores rurais, setor privado, pesquisadores, fundações, organizações da sociedade civil e o público em geral — estarão dispostos a investir em processos e abordagens transformadoras capazes de reduzir riscos e, ao mesmo tempo, aumentar a prosperidade, a sustentabilidade e a resiliência.

Promover a difusão de inovações essenciais para a segurança alimentar será um elemento crucial dessa equação. É indispensável que os países e as instituições multilaterais do hemisfério encontrem fontes de financiamento e reúnam o conhecimento tecnológico necessário para apoiar programas adaptados às necessidades específicas da região.

Outras partes interessadas, não governamentais — incluindo investidores, o setor privado, pesquisadores, cientistas, analistas, além de agricultores e comunidades agrícolas — também deve agir em conjunto para conceber, criar e fortalecer as ferramentas que serão necessárias à garantia de um futuro com segurança alimentar.

agradecimentos

Este relatório foi produzido pelo Atlantic Council com o apoio da The Mosaic Company como parte do projeto Segurança alimentar: Alinhamento estratégico nas Américas.

Sobre os autores

Peter Engelke é pesquisador sênior do Scowcroft Center for Strategy and Security do Atlantic Council, bem como pesquisador sênior do seu Global Energy Center. Seu portfólio diversificado abrange prospecção estratégica; geopolítica, diplomacia e relações internacionais; mudanças climáticas e sistemas terrestres; segurança alimentar, hídrica e energética; tecnologias emergentes e disruptivas e ecossistemas de inovação baseados em tecnologia; e demografia e urbanização, entre outros temas, sendo o criador da série de publicações de formato longo mais lida do Atlantic Council, Global Foresight. As afiliações anteriores de Engelke incluem o Geneva Centre for Security Policy, a Robert Bosch Foundation, o World Economic Forum e o Stimson Center.

Matias Margulis é professor associado da School of Public Policy and Global Affairs e membro do corpo docente de Sistemas Agrícolas e Alimentares da University of British Columbia. Seus interesses de pesquisa e ensino abrangem governança global, desenvolvimento, direitos humanos, direito internacional e política alimentar. Além de sua pesquisa acadêmica, Margulis possui vasta experiência profissional na área de formulação de políticas internacionais e foi representante canadense na Organização Mundial do Comércio, na Organização para a Cooperação e Desenvolvimento Econômico e na Organização das Nações Unidas para a Alimentação e a Agricultura.

explore o programa

A GeoStrategy Initiative, sediada no Scowcroft Center for Strategy and Security, utiliza o desenvolvimento de estratégias e a prospecção de longo prazo para servir como principal referência e articuladora de análises e soluções relevantes para políticas públicas, visando a compreensão de um mundo complexo e imprevisível. Por meio de seu trabalho, a iniciativa busca revitalizar, adaptar e defender um sistema internacional baseado em regras, a fim de promover a paz, a prosperidade e a liberdade nas próximas décadas.

The post O futuro da alimentação nas Américas appeared first on Atlantic Council.

]]>
The European Commission’s role in steering Europe’s strategic outlook https://www.atlanticcouncil.org/in-depth-research-reports/report/the-european-commissions-role-in-steering-europes-strategic-outlook/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=882365 Over the past decade, the European Commission has led the EU’s pivot toward balancing and “de-risking” China. Trade and investment have been at the heart of this strategy, not only because of the Commission’s authority in these domains, but also because they are the primary channels through which China challenges Europe’s economic and political interests.

The post The European Commission’s role in steering Europe’s strategic outlook appeared first on Atlantic Council.

]]>
This is the third chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy.Read the full report here.

The European Commission has played a central role in the evolution of the European Union’s (EU) relationship with China since the 1970s. For more than four decades, it championed the normalization and strengthening of bilateral ties in the spirit of engagement. In the past decade, however, it has also emerged as the leading force behind the EU’s shift toward balancing and “de-risking.” In doing so, it has leveraged its trade authority to tackle the areas where China poses the greatest challenges to its member states.

While the EU—and particularly the Commission—initially supported China’s integration into the world economy, it became clear by the early 2010s that the hopes and expectations of the EU’s engagement strategy were not materializing.1 Instead, China was rising to the status of a great power despite stalled liberalization and limited political integration. Its state-centered and protectionist economic policies presented the EU with structural issues: limited market access, industrial overcapacity and dumping, state subsidies, forced mergers, forced technology transfer, intellectual property theft, and currency manipulation. At the same time, Xi Jinping’s ascendance to power in 2012 ushered in an era of growing domestic authoritarianism and greater assertiveness abroad.

The Commission responded to this challenge in June 2016 with its document “Elements for a new EU strategy on China.” The strategy noted “a lack of progress in giving the market a more decisive role in the economy” and warned that “China’s authoritarian response to domestic dissent is undermining efforts to establish the rule of law and to put the rights of the individual on a sounder footing.” The Commission argued that the EU should therefore “promote reciprocity, a level playing field and fair competition across all areas of cooperation,” press Beijing to respect human rights and the rule of law, and ensure EU unity in dealing with China.2 Responding to China’s industrial overcapacity, which posed significant challenges to the German steel industry, the Commission launched investigations and imposed anti-dumping duties on Chinese steel imports in July 2016.3

Building on growing concerns about China’s unfair economic practices, the Commission has driven the EU’s shift from the engagement strategy towards an engage-and-balance approach and later to a more explicit balancing strategy vis-à-vis Beijing. In response to the structural issues in the relationship with China, the Commission adopted a new strategy in 2019 under President Jean-Claude Juncker. Its joint communication titled “EU-China: A strategic outlook” broke with decades of engagement policy by framing China not only as a strategic partner but also as a competitor and a systemic rival in the so-called European triptych: “[China is] simultaneously… a cooperation partner with whom the EU has closely aligned objectives… an economic competitor in the pursuit of technological leadership, and a systemic rival promoting alternative models of governance.”4

Ursula von der Leyen was elected Commission president in July 2019—and her first Commission both followed the essence of the Juncker strategy and expanded upon it. Under her leadership, from 2019 to 2022, the von der Leyen Commission shifted EU strategy from engagement to an engage-and-balance posture. In 2020 and 2021, China’s reputation and EU-China relations suffered a major setback as a result of Beijing’s role in the COVID-19 pandemic and its crackdown in Hong Kong and Xinjiang. At the same time, the first Trump administration negotiated the “phase one” trade agreement with China, which the Commission assessed, “gives America advantages over the EU in terms of trade and investment with China.”5 As a result, the von der Leyen Commission negotiated the landmark Comprehensive Agreement on Investment (CAI) with the Chinese government, which was viewed “as a ‘leveling up” with the US on trade terms relating to China.”6 Through the CAI, the Commission sought to improve the investment environment for European and Chinese investors and to remedy “level playing field issues” with provisions addressing “Chinese state-owned enterprises, transparency of subsidies, and forced technology transfer as well as on authorisations and administrative procedures.”7 However, the CAI came under intense pressure from the incoming Biden administration, which saw the agreement as a fait accompli and a potential obstacle to its plans for a coordinated transatlantic approach to China.8 The European Parliament opposed the CAI on account of China’s bans against several of its members and decided to suspend its ratification.9 As a result, the EU ultimately abandoned the agreement.

Russia’s invasion of Ukraine in February 2022 and China’s support for the Russian war effort reshaped European attitudes toward China, prompting another shift in the Commission’s approach. Beginning in 2022, the Commission moved away from the EU triptych, increasingly viewing China as a systemic rival and shifting its strategy from an engage-and-balance posture toward explicit balancing. As von der Leyen underlined at the time, China’s “overcapacities in protected industries… can undermine our industrial base… China has increasingly resorted to trade coercion… China pursues a global order that is sino-centric and hierarchical… China’s assertive posture [in its neighborhood] affects… our own global interests… [We also have to look at China] as a technological competitor, a military power, a global player with a distinct and diverging idea of the global order.”10 In June 2023, the Commission unveiled its European Economic Security Strategy, which, although nominally country-ambivalent, was in practice largely aimed at addressing China‘s challenges.11 In the following years, the Commission advanced this strategy by proposing new instruments targeting pressing structural issues with China, including the Anti-Coercion Instrument (ACI), the Foreign Subsidies Regulation (FSR), and the International Procurement Instrument (IPI).12

The second Trump administration’s turnaround on Ukraine, Russia, and trade tensions with the EU sent transatlantic relations into a tailspin beginning in February 2025, putting EU-China relations in a new context for many. Politicians and experts alike began floating the idea of rapprochement between the EU and China.13 Chinese leaders immediately courted EU officials, arguing that Brussels and Beijing could together defend “the rules-based order” from “unilateralism, protectionism and economic bullying,”—a not-so-veiled reference to President Trump’s tariff war. The Commission’s leadership initially showed openness to China’s overtures, hoping Beijing would make “the right offer” in the form of major concessions on long-standing structural issues threatening the EU’s economic and physical security.14 In March, EU Trade Commissioner Maroš Šefčovič met with Chinese leaders in Beijing to discuss ways “to improve and rebalance China-EU trade and investment relations.”15 In April, von der Leyen held a phone call with Chinese Premier Li Qiang to discuss improving bilateral relations.16 In May, China and the European Parliament agreed to lift restrictions on mutual exchanges, including China’s sanctions on some members of European Parliament.17

However, the Chinese leadership showed no willingness to significantly modify China’s positions on overcapacity dumping, market access, and other structural issues, as well as its support for Russia’s war effort. Meanwhile, the Trump administration and the European Commission continued negotiations, edging closer to a trade deal, and the US position on Ukraine began to converge with the earlier transatlantic consensus. In the changed geopolitical situation and the absence of a serious Chinese offer, the Commission concluded that the EU could not pursue a “grand deal” with China as long as Beijing remained unwilling to change its policies on structural economic issues or its role as an enabler of Russia’s war on Ukraine. Commission President von der Leyen and Council President António Costa communicated this stance to the Chinese leadership during the EU-China Summit in Beijing in July 2025.18

Trade and investment: Toward an economic security agenda

Trade and investment have been the focus of the European Commission’s China policy, both because of the Commission’s trade competence within the EU’s division of labor and because trade and investment are the core dimensions of EU-China relations. China is the EU’s largest trading partner for goods while the EU is China’s second largest trading partner, with China exporting €519 billion ($609 billion) to the EU and the EU exporting €213 billion to China in 2024. China accounts for 20.5 percent of the EU’s total imports.19

In EU-China trade and investment relations, the Commission has had to contend with a number of unfair practices through which China has repeatedly violated the rules of the international economic order, including overcapacity and dumping, state subsidies, restricting market access, forced mergers, public procurement, forced technology transfer, intellectual property theft, and currency manipulation. The von der Leyen Commission has attempted to address these issues in different ways, with tools aligned to its evolving posture. During the first period (2019-2023) when the Commission pursued an engage-and-balance approach, it sought to negotiate the CAI with China. During the second period (2023-2025), when the Commission shifted toward a balancing posture, it adopted an economic security and de-risking approach, designing the European Economic Security Strategy.

In the investment domain, the Commission has adopted the EU Foreign Investment Screening Regulation, which entered into force in October 2020.20 It serves as the framework for EU-wide screening of foreign direct investment (FDI) to protect security across member states. As with other economic security measures championed by the Commission, implementation has been limited by member states’ uneven participation. Between 2019 and 2020, the Commission then negotiated the CAI with China, addressing some of the unfair practices in the investment area but purposefully excluding similar practices in the trade domain. Under pressure from the Parliament and the Biden administration, the Commission ultimately abandoned the CAI.

In the trade area, the Commission focused primarily on economic security, de-risking, and reducing dependencies. The von der Leyen Commission recognized that many of these issues not only gave China unfair advantages over the EU but also threatened European economic security by undermining the sustainability of EU industries. Accordingly, in 2023, the Commission introduced the European Economic Security Strategy.21 This document established the EU’s counterpart to the United States’ decoupling strategy: an EU de-risking approach toward China. The strategy called for reassessing risks, re-examining regulations on inbound and outbound investments, and fully implementing export-control regulations.

In recent years, the Commission has advanced this de-risking strategy by creating new instruments, each of which targets a different dimension of the EU’s economic exposure to China. In July 2023, the Commission introduced the FSR to address one of the most serious concerns about Beijing’s economic conduct: the unfair advantages generated by widespread state subsidies to Chinese companies competing globally.22 The FSR aims “to address distortions caused by foreign subsidies [and] allows the EU to ensure a level playing field for all companies operating in the single market.”23

Complementing this effort, the ACI, adopted in December 2023, targets practices of economic coercion.24 While it does not single out China, most of the practices it targets have been employed by Beijing. The regulation defines economic coercion “as a situation where a third country attempts to pressure the EU or a Member State into making a particular choice by applying, or threatening to apply, measures affecting trade or investment against the EU or a Member State.”25 The instrument creates a process through which EU businesses or other stakeholders can report instances of economic coercion by third countries to a single point of contact. If the third country refuses to remove the coercion, the Commission can consider a broad spectrum of countermeasures, including “the imposition of tariffs, restrictions on trade in services and trade-related aspects of intellectual property rights, and restrictions on access to foreign direct investment and public procurement.” While this represents a significant step, its effectiveness will depend on actual implementation.26

Finally, the IPI, established in December 2022, seeks “to promote reciprocity in access to international public procurement markets.”27 Under this instrument, the Commission can “investigate alleged measures or practices negatively affecting the access of EU businesses, goods and services to non-EU procurement markets, and consult with the non-EU countries concerned.”28 If a foreign country’s public procurement practices are found to violate EU and international norms, the Commission may exclude the country’s companies from the EU’s public procurement processes. In its first application, ahead of the EU-China Summit in 2025, the Commission excluded Chinese companies from EU public procurement of medical devices after finding that EU manufacturers were denied equal access to procurement in China.29

Technology: Establishing resilience in critical industries

Technology has been a central pillar of the European Commission’s China policy because advanced technologies lie at the heart of Europe’s economic security, industrial competitiveness, and digital sovereignty. Since 2019, the Commission’s posture has shifted from an engage‑and‑balance approach to a more explicit de‑risking approach, framing China as “an economic competitor in the pursuit of technological leadership.”30 This new strategy aims to reduce critical dependencies and limiting the leakage of sensitive know‑how while keeping Europe open and competitive.

During the engage-and-balance period (2019-2023), the Commission focused on technology protection. When it shifted toward a balancing posture (2023-2025), it adopted the European Economic Security Strategy, launched joint risk assessments for ten critical technology areas—with a particular focus on advanced semiconductors, artificial intelligence (AI), quantum, and biotechnologies—and introduced the January 2024 economic‑security package.31

In EU-China technology relations, the Commission has had to address a cluster of persistent risks and practices that mirror—and often intensify—the challenges seen in trade and investment: cyber‑enabled IP theft and espionage against EU networks and firms; leakage of dual‑use and frontier technologies through exports, outbound investment, and research ties; reliance on high‑risk suppliers in critical infrastructure (notably 5G/6G); influence in standards‑setting that can lock in non‑reciprocal advantages; platform‑level risks to users (minors, personal data, democratic processes); and strategic dependencies on critical raw materials that underpin clean‑tech and digital supply chains. These risks—and the “de‑risk, not decouple” approach to mitigate them—were codified in the 2023 European Economic Security Strategy and operationalized through its critical‑technologies list and follow‑on initiatives.32

Hardening critical infrastructure began with the EU’s 5G Security Toolbox in 2020, a common risk‑based framework that allows member states to assess suppliers and apply restrictions or exclusions where warranted. In June 2023, the Commission urged full implementation and stated that member‑state decisions to restrict or exclude Huawei and ZTE from 5G networks are “justified and compliant with the 5G Toolbox.”33 Together, these measures aim to reduce systemic exposure in core and access networks while supporting interoperable, secure deployments across the single market.34

Controlling sensitive technology flows has proceeded on two tracks. First, the recast Dual‑Use Regulation modernized export controls, including a human‑rights‑focused “catch‑all” for certain cyber‑surveillance items, while the Commission pushed for tighter coordination and guidance for uniform practice.35 Second, the January 2024 “White Paper on Export Controls” proposed short‑ and medium‑term steps to make EU controls more effective and more coordinated; the companion “White Paper on Outbound Investments” opened a structured path toward a risk‑based EU framework for outward investments in narrowly defined, security‑relevant technologies.36 Building on this, the January 2025 recommendation asks member states to review recent and ongoing outbound investments in semiconductors, AI, and quantum technologies, and to share results to inform potential EU‑level action.37 The problem with these regulations is that the Commission cannot implement them without the active participation of member states. As a result, putting them into practice has been a challenge.

The EU Chips Act forms the backbone of Europe’s effort to rebuild semiconductor capacity and resilience. It establishes a framework of measures to strengthen Europe’s semiconductor ecosystem, including a crisis response mechanism, funding instruments (the Chips Joint Undertaking), and support for design, fabrication, advanced packaging, and skills.¹¹ The aim is to reduce strategic dependencies across both leading‑edge and mature nodes while anchoring more of the value chain inside the EU.38 Securing inputs for strategic technologies has advanced through the Critical Raw Materials Act, which sets benchmarks for domestic extraction, processing, and recycling by 2030 and, crucially, diversifies supply away from single‑country concentration. This directly addresses Europe’s exposure to Chinese dominance in several inputs essential to clean‑tech and digital industries and complements trade‑defense and industrial policies.39 The Commission has also moved to protect Europe’s research base and knowledge flows. For instance, a 2022 research‑security toolkit provides universities and labs with practical due‑diligence measures on values, governance, partnerships, and cybersecurity when cooperating internationally.40

Horizontal digital‑rule enforcement and baseline resilience complement these measures. Under the Digital Services Act, the Commission opened formal proceedings against TikTok in February 2024 on several risk‑management and transparency grounds, reflecting platform‑level concerns that also feature in EU–China relations.41 Earlier, EU institutions restricted TikTok on official devices as a protective measure.42 The EU Artificial Intelligence Act establishes market‑entry guardrails—prohibitions on certain uses, requirements for high‑risk systems, and an AI office—with phased application through 2026 and 2027.43 In parallel, the NIS2 Directive and the Cyber Resilience Act raise cybersecurity baselines for essential and important entities, as well as for products with digital elements across the single market, reducing the attack surface for data exfiltration and supply‑chain compromise.44 Finally, the Commission’s standardization strategy seeks to restore European leadership in global technical standards so that interoperability norms reflect EU security interests rather than entrench strategic dependencies.45

Security: From partnership to systemic rivalry

The European Commission’s policy on China in the security area may have undergone the most significant transformation of any policy domain in the past few decades. From envisioning a “strategic security partnership” with China in its 2003 communication “EU-China relations: A Maturing Partnership,” the Commission in recent years has come to view China primarily as a “systemic rival.46 Once focused mainly on the economic aspects of the EU’s external affairs—including trade, investment, aid, and energy—the Commission has shifted its outlook to emphasize the EU’s security interests as the world around Europe has become more complex and dangerous. In recent years, it has begun to look at the EU economy’s resilience in terms of “economic security” and the EU’s technological vulnerabilities in terms of cybersecurity and critical infrastructure security. Furthermore, the Commission has in recent years assumed a significant role in diplomatic, political, and military efforts to guarantee the EU’s physical security vis-à-vis Russia and China, in cooperation with the United States and other allies and partners.

This shift toward security and the process of securitization have been especially prominent since Russia’s unlawful invasion of Ukraine in February 2022. The Commission has actively supported Ukraine’s self-defense by mobilizing EU resources and diplomatic efforts. Crucially, it considers China’s role in supporting Russia’s war effort as a direct threat to European security. In President von der Leyen’s words, “China’s unyielding support for Russia is creating heightened instability and insecurity here in Europe. We can say that China is de facto enabling Russia’s war economy. We cannot accept this.”47 Since 2023, the Commission has introduced anti-circumvention tools and a contractual “no Russia” clause for exporters, banning EU exporters from re-exporting to Russia.48 In December 2024, the EU’s fifteenth sanctions package listed Chinese entities and individuals that helped Russia procure sensitive components—and subsequent packages in 2025 tightened controls further.49

The European Commission is increasingly concerned about Chinese intelligence and espionage activities, citing growing evidence of cyberattacks, human intelligence operations targeting EU institutions, and the infiltration of critical infrastructure by Chinese companies. It has therefore sharpened its response to suspected Chinese intelligence activity, raising the issue directly with Beijing, calling out malicious cyber operations, and urging Beijing to respect international norms.50 On the issue of cyber espionage, it raised the EU institutions’ cyber baseline by proposing and implementing a new cybersecurity regulation that strengthens networks and boosts CERT-EU’s capacity. Moreover, the Commission ordered TikTok to be removed from staff work devices as a precaution.51 To address risks from human intelligence, it proposed the “Defense of Democracy” package, including a law requiring transparency from actors lobbying on behalf of foreign governments.52 On critical infrastructure, it pressed EU countries to apply the 5G Security Toolbox and helped launch an EU-NATO task force to bolster infrastructure resilience.53

In response to China’s regional hegemonic ambitions, the Commission has also shifted its approach to Indo-Pacific security. In 2003, the Commission wrote that there was an “undeniable interest in acting as strategic partners” and that “China could play a fundamental role… in promoting peace and stability in Asia.54 Nearly twenty years later, the Commission and the High Representative of the Union for Foreign Affairs and Security Policy published “The EU strategy for cooperation in the Indo-Pacific.” The document framed the Indo-Pacific as the EU’s “natural partner region” and expressed concern about China’s aggressive posturing, arguing that “the display of force and increasing tensions in regional hotspots such as in the South and East China Sea and in the Taiwan Strait may have a direct impact on European security and prosperity.”55 As the challenges posed by China in the region have increased, the connection between European security and Indo-Pacific security has grown. As Commission President von der Leyen recently stated: “Security is more interlinked between the Euro-Atlantic and the Indo-Pacific than it has been in several generations.”56

The Commission has taken concrete steps to put this strategy into practice by partnering with Indo-Pacific countries to strengthen the region’s prosperity and security. It brought the EU-New Zealand trade agreement into force on May 1, 2024, and signed a digital trade agreement with Singapore in 2025.57 It also launched the EU-India Trade and Technology Council to deepen cooperation on trade and digital policy with New Delhi.58 Through its Global Gateway strategy, the Commission announced new projects with Southeast Asia in 2024, such as a Philippines Digital Economy Package and support for the rehabilitation of a national road in Laos.59 Moreover, it funds maritime safety and information sharing in the region through the Critical Maritime Routes Indo Pacific program.60 The Commission has also helped open air links by advancing a bloc-to- bloc air transport agreement between the EU and the Association of Southeast Asian Nations.61 Together, these steps aim to strengthen Indo Pacific security and—given the interlinkage—Euro-Atlantic security.

Conclusion

The European Commission has played an outsized role in shaping the EU’s China policy over the past several decades. During the late Cold War and the post-Cold War period, it pursued an engagement strategy toward China and sought to integrate Beijing into the international economy and the rules-based world order. By the 2010s, however, it recognized—alongside the US government, other EU institutions, and member states—that its engagement with China had not led to Beijing becoming a “responsible stakeholder.”

Instead, China took advantage of its “partners,” violated the rules of the international economic system, and emerged as a global great power. In response, the European Commission has driven the EU’s gradual shift away from engagement with China—first to a mixed engage-and-balance posture and, more recently, to a strategy centered on balancing and de-risking. Intensifying US-China strategic competition—and the recalibration of US China policy under the Trump and Biden administrations—have significantly pushed the Commission (and the EU more broadly) in this direction. This shift was further accelerated by Russia’s unlawful aggression against Ukraine in February 2022 and by China’s support for the Russian war machine. While periods of perceived US disengagement from global affairs—and from Europe—have at times made the Commission hesitant to pursue a balancing approach toward China, these developments have nonetheless strengthened its resolve to defend EU interests more firmly.

Similarly, China’s economic practices have pushed the Commission toward a more assertive and security-conscious stance, aligning it more closely with US balancing efforts. By advancing this shift and shaping the EU’s de-risking strategy, the Commission—especially under President Ursula von der Leyen’s leadership—has assumed a central role in steering the EU’s China policy to protect the bloc’s economic, technological, and security interests.

About the author

Related content

Explore the programs

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    Yoko Iwama, “The EU’s Reaction to the Rise of China,” Project for Peaceful Competition, February 21, 2022, https://www.peaceful-competition.org/pub/ry5b8lou/release/1.
3    “Commission, Implementing Regulation (EU) 2016/1328 of 29 July 2016 Imposing a Definitive Anti-Dumping Duty and Collecting Definitively the Provisional Duty Imposed on Imports of Certain Cold Rolled Flat Steel Products Originating in the People’s Republic of China and the Russian Federation,” European Commission, July 29, 2016, https://eur-lex.europa.eu/eli/reg_impl/2016/1328/oj/eng.
4    “EU-China—A Strategic Outlook,” European Commission, March 12, 2019, https://commission.europa.eu/system/files/2019-03/communication-eu-china-a-strategic-outlook.pdf.
5    David Hutt, “EU-China Deal May Give Biden’s Team More Options,” Asia Times, December 31, 2020, https://asiatimes.com/2020/12/eu-china-deal-may-give-bidens-team-more-options/.
6    Ibid.
7    Gisela Grieger, “EU-China Comprehensive Agreement on Investment (EU-China CAI),” Legislative Train Schedule, European Parliament, August 15, 2025, https://www.europarl.europa.eu/legislative-train/theme-a-global-europe-leveraging-our-power-and-partnerships/file-eu-china-investment-agreement.
8    Robert Delaney, “China-EU Investment Deal: Joe Biden Repeats Call for ‘Coordinated Approach’ to Handle Beijing,” South China Morning Post, December 31, 2020, https://www.scmp.com/news/china/diplomacy/article/3115917/china-eu-investment-deal-joe-biden-repeats-call-coordinated.
9    Grieger, “EU-China Comprehensive Agreement on Investment (EU-China CAI).”
10    Ursula von der Leyen, “Speech by Ursula von der Leyen at the European China Conference 2023,” Mercator Institute for China Studies, November 16, 2023, https://merics.org/en/speech-ursula-von-der-leyen-european-china-conference-2023.
11    “Joint Communication to the European Parliament, the European Council and the Council on ‘European Economic Security Strategy,’” European Commission, June 2023, https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=JOIN:2023:20:FIN.
12    “Anti-Coercion Instrument: New Tool to Enable EU to Withstand Economic Coercion Enters into Force,” European Commission, December 26, 2023, https://ec.europa.eu/commission/presscorner/detail/en/ip_23_6804; “Foreign Subsidies Regulation,” European Commission, July 12, 2023, https://competition-policy.ec.europa.eu/foreign-subsidies-regulation_en; “International Public Procurement Instrument,” European Commission, last visited September 5, 2025, https://trade.ec.europa.eu/access-to-markets/en/content/international-public-procurement-instrument.
13    Valbona Zeneli and Zoltán Fehér, “How the U.S. Is Pushing the EU Closer to China,” National Interest, May 13, 2025, https://nationalinterest.org/feature/how-the-u-s-is-pushing-the-eu-closer-to-china.
14    Huizhong Wu, “China Accuses US of Unilateralism, Protectionism and Economic Bullying with Tariffs,” Associated Press, April 7, 2025, https://apnews.com/article/china-us-tariffs-trade-trump-5dd928eabb83b9cc560e1d6971f52e7f.
15    “Read-out of the Meetings between Commissioner Šefčovič and Chinese Vice Premier He Lifeng, Commerce Minister Wang Wentao and Customs Minister Sun Meijun,” European Commission, March 30, 2025, https://ec.europa.eu/commission/presscorner/detail/en/read_25_923.
16    “Read-out of the Phone Call between President von Der Leyen and Chinese Premier Li Qiang,” European Commission, April 7, 2025, https://ec.europa.eu/commission/presscorner/detail/en/read_25_1004.
17    “China to Lift Sanctions on Members of European Parliament,” Reuters, May 16, 2025, https://www.reuters.com/world/china/china-lift-sanctions-eu-parliament-members-official-says-2025-04-30.
18    Zoltán Fehér and Valbona Zeneli, “The Great Wall Between China and the EU,” Diplomat, July 19, 2025, https://thediplomat.com/2025/07/the-great-wall-between-china-and-the-eu.
19    “China: EU Trade Relations with China,” European Commission, August 6, 2025, https://policy.trade.ec.europa.eu/eu-trade-relationships-country-and-region/countries-and-regions/china_en.
20    “EU Foreign Investment Screening Regulation Becomes Fully Operational,” European Commission, October 8, 2020), https://ec.europa.eu/commission/presscorner/detail/en/ip_20_1867.
21    “Joint Communication to the European Parliament, the European Council and the Council on ‘European Economic Security Strategy.’”
22    “Regulation (EU) 2022/2560 of the European Parliament and of the Council of 14 December 2022 on Foreign Subsidies Distorting the Internal Market,” European Union, December 23, 2022, https://eur-lex.europa.eu/eli/reg/2022/2560/oj/eng.
23    “Foreign Subsidies Regulation.”
24    “Regulation (EU) 2023/2675 of the European Parliament and of the Council of 22 November 2023 on the Protection of the Union and Its Member States from Economic Coercion by Third Countries,” European Union, November 22, 2023, https://eur-lex.europa.eu/eli/reg/2023/2675/oj/eng.
25    “Anti-Coercion Instrument.”
26    Ibid.
27    “International Public Procurement Instrument.”
28    “The EU’s International Procurement Instrument—IPI,” European Union, last visited September 8, 2025, https://eur-lex.europa.eu/EN/legal-content/summary/the-eu-s-international-procurement-instrument-ipi.html.
29    Andrea Figueras, “EU to Restrict China’s Participation in Medical Devices Procurement,” Wall Street Journal, June 20, 2025, https://www.wsj.com/world/europe/eu-to-restrict-chinas-participation-in-medical-devices-procurement-455f8d28.
30    “EU‑China—A Strategic Outlook.”
31    “European Economic Security Strategy”; “Commission Recommendation (EU) 2023/2113 of 3 October 2023 on Critical Technology Areas for the EU’s Economic Security for Further Risk Assessment with Member States,” European Union, October 11, 2023, https://eur-lex.europa.eu/eli/reco/2023/2113/oj; “Advancing European Economic Security: An Introduction to Five New Initiatives,” European Commission, January 24, 2024, https://commission.europa.eu/system/files/2024-01/Communication%20on%20European%20economic%20security.pdf.
32    “European Economic Security Strategy”; “Commission Recommendation (EU) 2023/2113 of 3 October 2023 on Critical Technology Areas for the EU’s Economic Security for Further Risk Assessment with Member States.”
33    “Commission Announces Next Steps on Cybersecurity of 5G Networks in Complement to Latest Progress Report by Member States,” European Commission, press release, June 14, 2023, https://ec.europa.eu/commission/presscorner/detail/en/ip_23_3309.
34    “Secure 5G Deployment in the EU—Implementing the EU Toolbox,” European Commission, January 29, 2020, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52020DC0050.
35    “Regulation (EU) 2021/821 of the European Parliament and of the Council of 20 May 2021 Setting up a Union Regime for the Control of Exports, Brokering, Technical Assistance, Transit and Transfer of Dual‑Use Items,” European Union, November 8, 2024, https://eur-lex.europa.eu/eli/reg/2021/821/oj/eng.
36    “White Paper on Export Controls,” European Commission, January 24, 2024, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52024DC0025; “White Paper on Outbound Investments,” European Commission, January 24, 2024, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52024DC0024.
37    “Commission Recommendation (EU) 2025/63 of 15 January 2025 on Outbound Investments in Technology Areas Critical for the Economic Security of the Union,” Official Journal of the European Union, January 15, 2025, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L_202500063.
38    “Regulation (EU) 2023/1781 of the European Union and of the Council of 13 September 2023 Establishing a Framework of Measures for Strengthening Europe’s Semiconductor Ecosystem and Amending Regulation (EU) 2021/694 (Chips Act),” European Union, September 18, 2023, https://eur-lex.europa.eu/eli/reg/2023/1781/oj/eng.
39    “Regulation (EU) 2024/1252 of the European Union and of the Council of 11 April 2024 Establishing a Framework for Ensuring a Secure and Sustainable Supply of Critical Raw Materials and Amending Regulations (EU) No 168/2013, (EU) 2018/1724 and (EU) 2019/1020,” European Union, May 3, 2024, https://eur-lex.europa.eu/eli/reg/2024/1252/oj/eng.
40    “Tackling R&I Foreign Interference,” European Union, January 18, 2022, https://op.europa.eu/en/publication-detail/-/publication/3faf52e8-79a2-11ec-9136-01aa75ed71a1/language-en.
41    “Commission Opens Formal Proceedings against TikTok under the Digital Services Act,” European Commission, press release, February 18, 2024, https://ec.europa.eu/commission/presscorner/detail/en/ip_24_926.
42    Foo Yun Chee, “European Parliament Latest EU Body to Ban TikTok from Staff Phones—EU Official Says,” Reuters, February 28, 2023, https://www.reuters.com/technology/european-parliament-ban-tiktok-staff-phones-eu-official-says-2023-02-28.
43    “Regulation (EU) 2024/1689 of the European Parliament and of the Council of 13 June 2024 Laying Down Harmonised Rules on Artificial Intelligence and Amending Regulations (EC) No 300/2008, (EU) No 167/2013, (EU) 168/2013, (EU) 2018/858 and (EU) 2019/2144 and Directives 2014/90/EU, (EU) 2016/797 and (EU) 2020/1828 (Artificial Intelligence Act),” European Union, July 12, 2024, https://eur-lex.europa.eu/eli/reg/2024/1689/oj/eng; “AI Act Enters into Force,” European Commission, August 1, 2024, https://commission.europa.eu/news-and-media/news/ai-act-enters-force-2024-08-01_en.
44    “Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on Measures for a High Common Level of Cybersecurity across the Union, Amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and Repealing Directive (EU) 2016/1148 (NIS2 Directive),” European Union, December 27, 2022, https://eur-lex.europa.eu/eli/dir/2022/2555/oj/eng; Regulation (EU) 2024/2847 of the European Parliament and of the Council of 23 October 2024 on Horizontal Cybersecurity Requirements for Products with Digital Elements and Amending Regulations (EU) No 168/2013 and (EU) 2019/1020 and Directive (EU) 2020/1828 (Cyber Resilience Act),” European Union, November 18, 2024, https://eur-lex.europa.eu/eli/reg/2024/2847/oj/eng.
45    “An EU Strategy on Standardisation—Setting Global Standards in Support of a Resilient, Green and Digital EU Single Market,” European Commission, February 2, 2022, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52022DC0031.
46    ”European Commission, “EU-China Relations: A Maturing Partnership,” EUR-Lex, September 10, 2003, https://eur-lex.europa.eu/EN/legal-content/summary/eu-china-relations-a-maturing-partnership.html.
47    Ursula von der Leyen, “Speech by the President at the EP Plenary Joint Debate on EU-China Relations,” European Commission, July 7, 2025, https://ec.europa.eu/commission/presscorner/detail/en/speech_25_1764.
48    “EU Adopts 11th Package of Sanctions against Russia for Its Continued Illegal War against Ukraine,” European Commission, press release, June 22, 2023, https://ec.europa.eu/commission/presscorner/detail/en/ip_23_3429.
49    Julia Payne, “EU Adopts New Russia Sanctions Targeting China, Shadow Fleet,” Reuters, December 17, 2024, https://www.reuters.com/world/europe/eu-adopts-new-russia-sanctions-targeting-china-shadow-fleet-2024-12-16; “EU Adopts 18th Package of Sanctions against Russia,” European Commission, press release, July 17, 2025, https://ec.europa.eu/commission/presscorner/detail/en/ip_25_1840.
50    “25th EU-China Summit,” European Commission, press release, July 23, 2025, https://ec.europa.eu/commission/presscorner/detail/en/ip_25_1901.
51    “Cybersecurity Regulation,” European Commission, March 18, 2022, https://commission.europa.eu/publications/cybersecurity-regulation_en; “New Rules to Boost Cybersecurity of the EU Institutions Enter into Force,” European Commission, press release, January 7, 2024, https://ec.europa.eu/commission/presscorner/detail/en/ip_23_6782; Kelvin Chan, “TikTok Banned from EU Commission Phones over Cybersecurity,” Associated Press, February 23, 2023, https://apnews.com/article/technology-politics-united-states-government-privacy-business-29a52f0eee4177f6c2a596d12459feec.
52    “New Measures Will Increase Transparency to Better Protect European Democracy,” European Commission, December 12, 2023, https://commission.europa.eu/news-and-media/news/new-measures-will-increase-transparency-better-protect-european-democracy-2023-12-12_en; “Documents on Defence of Democracy,” European Commission, December 12, 2023, https://commission.europa.eu/publications/documents-defence-democracy_en.
53    “Communication from the Commission: Implementation of the 5G Cybersecurity Toolbox,” European Commission, June 15, 2023, https://digital-strategy.ec.europa.eu/en/library/communication-commission-implementation-5g-cybersecurity-toolbox; “Commission Announces Next Steps on Cybersecurity of 5G Networks in Complement to Latest Progress Report by Member States”; European Commission, “EU-NATO Task Force: Final Assessment Report on Strengthening Our Resilience and Protection of Critical Infrastructure,” European Commission, press release, June 28, 2023, https://ec.europa.eu/commission/presscorner/detail/en/ip_23_3564.
54    ”European Commission, “EU-China Relations: A Maturing Partnership,” EUR-Lex, September 10, 2003, https://eur-lex.europa.eu/EN/legal-content/summary/eu-china-relations-a-maturing-partnership.html.
55    Ramses A. Wessel, “The EU Strategy for Cooperation in the Indo-Pacific,” European Commission and High Representative of the Union for Foreign Affairs and Security Policy, September 16, 2021, https://opil.ouplaw.com/display/10.1093/law-oeeul/law-oeeul-e66.
56    von der Leyen, “Speech by the President at the EP Plenary Joint Debate on EU-China Relations.”
57    European Commission, “EU-New Zealand Trade Agreement Enters into Force, Opening New Opportunities for EU Exporters,” May 1, 2024, https://ec.europa.eu/commission/presscorner/api/files/document/print/s/ip_24_2388/IP_24_2388_EN.pdf; “EU-Singapore Free Trade Agreement, Investment Protection Agreement and Digital Trade Agreement,” European Commission, May 7, 2025, https://policy.trade.ec.europa.eu/eu-trade-relationships-country-and-region/countries-and-regions/singapore/eu-singapore-agreements_en.
58    “First EU-India Trade and Technology Council Focused on Deepening Strategic Engagement on Trade and Technology,” European Commission, press release, May 15, 2023, https://ec.europa.eu/commission/presscorner/detail/en/ip_23_2728.
59    “Global Gateway: EU and ASEAN Strengthen Their Partnership on Sustainable Connectivity,” European Commission, February 2, 2024, https://international-partnerships.ec.europa.eu/news-and-events/news/global-gateway-eu-and-asean-strengthen-their-partnership-sustainable-connectivity-2024-02-02_en.
60    “CRIMARIO—Critical Maritime Routes Indo-Pacific,” European Commission, August 4, 2022, https://fpi.ec.europa.eu/projects/crimario-critical-maritime-routes-indo-pacific_en.

The post The European Commission’s role in steering Europe’s strategic outlook appeared first on Atlantic Council.

]]>
The geopolitical trends shaping the EU’s policies on China https://www.atlanticcouncil.org/in-depth-research-reports/report/the-geopolitical-trends-shaping-the-eus-policies-on-china/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=882418 European policies on China are shaped by four major geopolitical trends: intensifying US-China competition, uncertainty about sustained US engagement in Europe and globally, China’s support for Russia’s war on Ukraine, and Beijing’s growing economic and technological challenge to the EU.

The post The geopolitical trends shaping the EU’s policies on China appeared first on Atlantic Council.

]]>
This is the first chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy.Read the full report here.

China’s global ambitions, unfolding in an era of renewed great-power competition, pose significant challenges to the core interests of the United States and its Western allies—and have placed Beijing at the center of the transatlantic economic and security agenda. In the 1990s and early 2000s, the United States, the European Union (EU), and EU member states largely assumed that engagement with China would be mutually beneficial, with economic integration encouraging Beijing to align with the global rules-based order. Over time, that assumption has collapsed. Instead, both the United States and the EU increasingly regard China not just as a competitor but as a strategic rival and systemic challenger—a country determined to promote a model fundamentally at odds with Western principles of liberal democracy and market economy and to reshape the international order in its favor.1

The United States was the first to make this decisive strategic shift. In its 2017 National Security Strategy (NSS), the first Trump administration formally redefined China as a “strategic competitor” and a “once-in-a-generation challenge.”2 The Biden administration reaffirmed this stance in its 2022 NSS, noting that China “harbors the intention, and increasingly, the capacity to reshape the international order in favor of one that tilts the global playing field to its benefit.” Yet the focus on competition with China—and on the strategic importance of Asia—predates both US President Donald Trump and US President Joe Biden. The Obama administration’s “pivot to Asia” had already acknowledged China’s rising economic and strategic significance, with particular attention to the Indo-Pacific region.3

Europe’s recognition of the China challenge came more slowly. For decades, the EU approached Beijing primarily as an economic partner. The first major trade agreement between the EU and China in 1985, the initiation of annual EU-China summits in 1998, and European support for China’s accession to the World Trade Organization (WTO) in 2001 all reflected the belief that trade would encourage cooperation. Even the Tiananmen Square massacre in 1989, which temporarily froze political ties and prompted an arms embargo, did not fundamentally alter the EU’s long-term calculus. It was only in March 2019 that the EU formally adopted a more skeptical stance, describing China as “simultaneously . . . a cooperation partner with whom the EU has closely aligned objectives . . . an economic competitor in the pursuit of technological leadership, and a systemic rival promoting alternative models of governance.”4

The EU’s growing skepticism of China has been driven by a series of shocks and geopolitical trends that have fundamentally reshaped how policymakers in Brussels and across member states view Beijing.5 These trends include:

  • US-China strategic competition;
  • Uncertainty about continued US engagement globally and in Europe;
  • Russia’s war on Ukraine, backed by China; and
  • China’s economic and competitiveness challenges to the EU.

A deeper understanding of these trends—the geopolitical pressures shaping Europe, the continent’s mounting sense of vulnerability, and the strategic responses they generate—can enable US policymakers to tailor outreach, design joint initiatives, and strengthen a unified transatlantic agenda to address the China challenge. Yet US officials often lack sufficient insight into how these dynamics influence EU decision-making. This report aims to bridge that gap.

To that end, it analyzes the four geopolitical trends in detail, assesses their impact on the EU’s and its member-states’ China policies—particularly across trade and investment, technology, and security—and offers recommendations to help US policymakers use this understanding to reinforce transatlantic coordination. After all, the United States can prevail in its strategic competition with China only by working in concert with its allies—especially the EU, Beijing’s second-largest trading partner.

1. US-China strategic competition

China’s expansionist global posture—and the resulting revival of great-power competition in the international system, most clearly manifested in US-China rivalry—has significantly reshaped European thinking about its role in the world. China’s increasingly assertive efforts to shape the international order to accommodate its authoritarian model have put it at odds with the EU and the United States.

This development is, in part, a result of a strategic US effort to integrate China into the international order and encourage liberalization through a long-standing engagement strategy following the end of the Cold War. Successive administrations maintained this approach despite mounting evidence that China was not integrating and was instead emerging as a challenger. By overlooking this reality, the United States facilitated China’s rise, effectively creating a peer competitor for itself and for Europe.

The first US president to recognize the failure of engagement and reframe China as a strategic competitor was Donald Trump during his first term.6 His policy shift reflected a broader bipartisan consensus in Washington to place strategic competition at the center of US grand strategy. Although adopting a different tone and emphasizing coordination with allies, the Biden administration upheld key elements of Trump’s China strategy, including trade restrictions, technology controls, and political and military efforts to counter China’s global influence.7 Although the second Trump administration is expected to continue the balancing strategy initiated during Trump’s first term, it has not yet articulated a clear strategy vis-à-vis China, oscillating between a balancing posture and a cooperative approach aimed at negotiating a “grand deal” with Beijing.

These mixed signals have made it harder for the EU and its member states to align with the United States’ stance on China—or to formulate their own strategy in response. Europe has consistently sought to avoid being drawn into a binary competition between the two superpowers. While recognizing the systemic challenges posed by Beijing’s global ambitions, it seeks to protect both its economic interests and strategic autonomy. However, mounting US-China competition is forcing the EU and European countries to pick a side.

2. Uncertainty over US engagement globally and in Europe

In the 2010s, the United States—the EU’s most important global ally—entered an era of heightened domestic polarization and international retrenchment. The rise of radicalism and populism in both major political parties, along with Trump’s election victories in 2016 and 2024, dramatically reshaped the political landscape. This period saw declining bipartisanship, rising identity politics and personal attacks, and the growing influence of radical and extremist forces.

Internationally, the Obama administration began retrenching the United States from its global leadership role, including reducing its presence and influence in Europe. US President Barack Obama’s strategic “pivot to Asia” signaled that the United States would shift its focus and resources away from Europe and the Middle East toward the Indo-Pacific. The first Trump administration accelerated this retrenchment, weakening US alliances and withdrawing from several multilateral institutions that previous US administrations had helped build after World War II. Europe was particularly affected, as Trump called US security guarantees into question—a concern magnified by the Ukraine war, which further exposed the continent’s dependence on the United States as a security provider.

While the Biden administration sought to restore US global leadership, mend alliances, and strengthen multilateralism, the forces driving retrenchment remain influential among both the US public and political elite, as evidenced by Trump’s second election victory. As a result, European citizens and leaders remain uncertain whether the United States will sustain its global leadership role and its position as guarantor of European security over the long term.

Continuing and accelerating these trends, the second Trump administration has rapidly scaled back US engagement, questioned support for Ukraine, pursued rapprochement with Russia, and imposed tariffs on EU exports. These moves have deepened political, economic, and security rifts between Washington and Brussels, prompting a strategic reassessment in Europe. While the United States eventually signed a trade deal with the EU in July, tensions over EU auto exports and Trump’s openness to engaging with Russian President Vladimir Putin continue to strain relations.

As a result of this transatlantic rift, some European leaders have called for a pragmatic reset and closer engagement with China, while others caution that China’s structural economic and political challenges make any “grand deal” unrealistic. The latter group argues that transatlantic cooperation remains the best path forward. Reflecting this stance, many EU representatives emphasized at the 2025 EU-China Summit that closer ties with Beijing would require China to change its behavior, end unfair trade practices, and cease actions that undermine the EU’s core interests.

3. Russia’s war on Ukraine—backed by China

While uncertainty about US global engagement has shaken Europe’s confidence in having a strong ally and external guarantor of security and the liberal international order, Russia’s war on Ukraine has shattered the European sense of physical security. Moscow’s aggression posed a direct challenge to the Western global order and the values underpinning it—international peace and security, national self-determination, representative government, and fundamental human rights. For Europeans, the war has demonstrated that an aggressor state exists in their immediate neighborhood, threatening democracy, the European way of life, and the continent’s security architecture.

At the same time, Beijing’s support for Russia’s war served as a further wake-up call for European policymakers. After recognizing China as a supporter and enabler of Russian aggression against Ukraine, Europe’s perception of Beijing shifted. European countries began to view China both as a security threat and as a liability in other areas, including critical infrastructure. In this sense, Russia’s war has exposed Europe’s vulnerabilities not only toward Moscow but also toward Beijing, highlighted its limited capabilities in countering its adversaries, and underscored the continued importance of US military assistance for European security.

Initially, the Ukraine war and China’s support for Russia unified the United States and the EU at a level unprecedented since the end of the Cold War. Under the Biden administration, the transatlantic partners supported Ukraine’s fight for independence and territorial integrity and sanctioned both Russia and China. During the first three years of the war, European narratives, attitudes, and policies on China continued to shift significantly—though unevenly across member states and EU institutions—increasingly converging with US approaches and positions.

However, the second Trump administration’s upending of transatlantic relations, combined with its tendency to favor Russia at times in negotiations over the Ukraine war, has created a deep divide between the United States and Europe. European leaders have made significant efforts to bridge this divide and revive transatlantic unity on Ukraine, with some success in the weeks following the August 2025 White House multilateral meeting on Ukraine. Many EU policymakers continue to view Beijing as a systemic rival posing long-term risks to European security and democratic values, while others are more open to strategic engagement, advocating a recalibration of EU-China relations. Nevertheless, from a European perspective, China’s continued support for Russia’s war remains a major obstacle to easing tensions.

4. China’s economic and competitiveness challenges to the EU

A crucial aspect of China’s global expansion has been its economic and technological pressure on the EU and its economic security. The Chinese economy has become more state-driven, with Chinese leaders increasingly disavowing Western liberal values.8 The rapid pace of China’s transformation and its advances in technological capabilities are unprecedented. Unfair business practices, state subsidies, forced or illegal technology transfers, economic coercion, and limited market access have negatively affected the US and EU economies. More recently, China has sought to ease its domestic economic struggles by dumping industrial overcapacity onto the European market and relocating some production to the EU and its periphery, threatening key sectors such as renewable energy and electric vehicles (EVs).9

In response, the European Commission, under President Ursula von der Leyen, has outlined an economic security agenda that goes further than some member states have been willing to embrace.10 Some countries have opposed this strategic shift because their economies are more open and trade-dependent—and therefore more exposed to China, particularly given that China is Europe’s largest source of imports at 21 percent and its third-largest export market at 8 percent. A major sign of the relative success of the Commission’s agenda—and its transatlantic relevance—has been that the terminology of “de-risking” has entered the transatlantic mainstream.

At the same time, the EU has been less aggressive in dealing with China than the United States. While the latter has rolled out more ambitious measures to restrict Chinese access to technology and investment, the EU has expanded its policy toolbox to counter Beijing’s distortive economic practices—through the EU Foreign Subsidies Regulation and its new Anti-Coercion Instrument, for instance—without explicitly identifying Beijing as the target.

Where the Commission has taken action, such as in its anti-subsidy investigation into Chinese EV imports, significant disagreements and pushback have arisen among member states, depending on how severely they are affected. These dynamics frequently leave room for skepticism or misunderstanding among US policymakers regarding the strengths and weaknesses of Europe’s strategies and their implementation.

In his 2024 report on European competitiveness, former President of the European Central Bank Mario Draghi highlighted the urgency of investing between €750 billion and €800 billion annually in innovation, artificial intelligence, and clean energy, while streamlining regulations and advancing a coordinated industrial policy to bolster the EU’s long-term economic resilience and strategic autonomy. Ironically, Europeans continue to rely on Chinese technology in areas where the EU still lags. The most pressing challenge remains the widening gap between policymakers’ security concerns and European industry actors’ vested economic interests in the Chinese market.

About the author

Related content

Explore the programs

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    Valbona Zeneli, “The Trends Driving Transatlantic Convergence on China,” Diplomat, November 30, 2023, https://thediplomat.com/2023/11/the-trends-driving-transatlantic-convergence-on-china/.
2    The White House. 2017. National Security Strategy of the United States of America. Washington, DC: The White House. https://trumpwhitehouse.archives.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf.
3    Hillary Clinton. 2011. “America’s Pacific Century.” Foreign Policy, no. 189 (November): 56–63. https://foreignpolicy.com/2011/10/11/americas-pacific-century/.
4    “EU-China—A Strategic Outlook,” European Union, March 12, 2019, https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=JOIN%3A2019%3A5%3AFIN.
5    Zeneli, “The Trends Driving Transatlantic Convergence on China”; Zoltán Fehér, “Xi Jinping Visited Europe to Divide It. What Happens Next Could Determine If He Succeeds,” Atlantic Council, June 1, 2024, https://www.atlanticcouncil.org/blogs/new-atlanticist/xi-jinping-visited-europe-to-divide-it-what-happens-next-could-determine-if-he-succeeds/.
6    Zoltán Fehér. “The Rise and Fall of U.S. Engagement toward China,” Fletcher Center for Strategic Studies, August 17, 2020, https://sites.tufts.edu/css/?p=1198.
7    Zoltán Fehér, “Realism, Liberalism, and Strategic Competition: The Grand Strategy of the United States during the Biden Administration,” Foreign Policy Review [Külügyi Szemle—Hungary] 22, 4 (2023), 28–44, https://hiia.hu/wp-content/uploads/2024/02/3-Feher-Zoltan.pdf.
8    Michael Beckley and Hal Brands, “China’s Threat to Global Democracy,” Journal of Democracy, December 2022, https://www.journalofdemocracy.org/chinas-threat-to-global-democracy/.
9    Esther Goreichy, Jacob Gunter, and Grzegorz Stec, “China’s Overcapacity and the EU + German China Policy under Merz + EU-China Trade,” Mercator Institute for China Studies, May 16, 2025, https://merics.org/en/merics-briefs/chinas-overcapacity-and-eu-german-china-policy-under-merz-eu-china-trade.
10    Jörn Fleck, et al., “The ‘De-risk’ Is in the Details: A Look at Europe’s Ambitious New Economic Security Strategy,” Atlantic Council, June 22, 2023, https://www.atlanticcouncil.org/blogs/new-atlanticist/experts-react/the-de-risk-is-in-the-details-a-look-at-europes-ambitious-new-economic-security-strategy/.

The post The geopolitical trends shaping the EU’s policies on China appeared first on Atlantic Council.

]]>
France’s policy on China: Strategic autonomy and less naïveté https://www.atlanticcouncil.org/in-depth-research-reports/report/frances-policy-on-china-strategic-autonomy-and-less-naivete/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=882792 Over the last decade, France’s long-standing engagement with China has transformed into a more nuanced and cautious dynamic, reflecting a growing emphasis on balancing. This shift is guided by France’s pursuit of strategic autonomy, its effort to “de-risk” economic and security ties, and the broader geopolitical realities unfolding in the Indo-Pacific.

The post France’s policy on China: Strategic autonomy and less naïveté appeared first on Atlantic Council.

]]>
This is the fourth chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy.Read the full report here.

Over the past decade, France’s traditionally cooperative ties with China have evolved into a more complex and cautious relationship, as Paris increasingly shifts its policy toward balancing. This recalibration has been driven by France’s doctrine of strategic autonomy, its commitment to “de-risking” in response to Beijing’s distortionary industrial policies, and China’s growing influence in the Indo-Pacific. France initially benefited from booming trade with China—especially between 2005 and 2015, when exports of aerospace, luxury, and agri-food products flourished. In the recent past, however, China’s protectionist and state-driven policies have tilted the relationship sharply against France, eroding what was once a confident economic partnership.

In the technology domain, France’s policy embraces “de-risking, not decoupling,” tightening safeguards and investment screening for critical technologies, infrastructure, and data while preserving selective climate-related cooperation. This approach aligns with the EU’s economic-security agenda, prioritizing joint risk assessments for advanced semiconductors, artificial intelligence (AI), and quantum technologies. Meanwhile, France’s security posture toward China carefully balances engagement with cautious countermeasures, maintaining only limited alignment with the United States. Leveraging its permanent Indo-Pacific presence, France combines expanded naval operations and allied exercises with a structured military-to-military dialogue with Beijing, using inter-staff and theater-level contacts to manage risks, signal deterrence, and uphold the rules-based order. This approach underscores that dialogue complements—rather than undermines—its transatlantic and regional commitments.

France’s China policy and its approach to the EU’s policy on China illustrate a dual-track strategy: nationally, Paris balances engagement with safeguarding competitiveness, while at the EU level it supports de-risking and stronger balancing measures. Growing competitive pressures from China have prompted France to advocate for stricter EU policies on trade, investment screening, strategic technologies, and critical infrastructure.

Diplomatic relations with China have a long history. Paris established ties with the People’s Republic in 1964, following Europe’s lead. In 1973, President Georges Pompidou became the first Western European head of state to visit Beijing during the Cold War. Deng Xiaoping, then first vice premier, reciprocated in 1975 as the first Chinese leader to pay an official visit to a Western European country. In the 1980s, economic, technological, and cultural relations expanded rapidly, highlighted by President Valéry Giscard d’Estaing’s 1980 visit and the signing of multiple cooperation agreements, including in nuclear energy and other technological fields. During President Jacques Chirac’s visit in 1997, France became the first Western country to establish a comprehensive partnership with China.1 In 2004, this agreement was upgraded to a comprehensive strategic partnership, with both countries vowing to work together on “strengthening the multilateral system for collective security” and “deepening bilateral cooperation on major international issues… [to establish] a safer and more stable international environment.”2 During President Xi Jinping’s visit to France in 2014, marking the fiftieth anniversary of diplomatic relations, both sides expressed their intention to steer France-China relations toward “a new era of a close and lasting comprehensive strategic partnership.”3

Lately, however, French policy has steadily shifted toward balancing and de-risking—a trend that accelerated with President Emmanuel Macron’s 2017 election. Macron set out to pursue a more realist policy on China and, in 2019, declared that “the period of European naivety is over” with regard to Chinese investments in the EU.4 At the same time, Macron has sought to continue France’s legacy of open dialogue with China and cooperation on global issues, leveraging France’s historic role as an Indo-Pacific power. High-level diplomacy with Beijing has been sustained, avoiding unnecessarily confrontational language. Macron frames France as a “power of balances” (puissance d’équilibres), centering French and EU China policy around strategic autonomy and asserting independence from the United States.5

Efforts to strengthen the EU’s economic and technological resilience are central to Macron’s balancing agenda—and his advocacy of EU-level policies advanced by Ursula von der Leyen’s Commission has pushed ties onto a more confrontational trajectory.6 At the same time, the tension between engagement and the structural push for de-risking has left allies and partners uncertain about the true direction of France’s China policy.7

Trade and investment: From opportunity to strategic caution

France was an early beneficiary of China’s economic rise, enjoying a surge in exports from the 2000s—particularly between 2005 and 2015—when French aerospace, luxury, agri-food, and industrial goods found a receptive Chinese market. Recent years, however, have brought increasingly distortive Chinese economic practices—market barriers, state subsidies, and forced technology transfers—which have eroded earlier gains and shifted the balance against France. As a result, a once-optimistic commercial outlook in Paris has given way to frustration and strategic caution.

Over the six decades of France-China diplomatic relations, economic ties have deepened tremendously. Bilateral trade has grown eight hundredfold, from $100 million in 1964 to $81.2 billion in 2022. China is France’s fourth-largest trading partner, while France is China’s third-largest trading partner within the EU. China’s primary exports to France include energy components, boilers, electronics, furniture, prefabricated buildings, machinery, commodities, and vehicles.8 Moreover, consumer goods exports—including home appliances and toys—have grown by nearly 30 percent from 2023 to 2024.9

Meanwhile, France remains China’s largest source of agricultural imports within the EU. Pork, dairy, and wine dominate—but cosmetics, luxury goods, and medications are also in high demand. Bilateral trade is heavily imbalanced: Between 2022 and 2023, France’s trade deficit with China increased from €1.1 billion ($1.2 billion) to €2.92 billion ($3.14 billion).10 Investment has also expanded. While 1,100 French companies operated in China in 2019, this number jumped to more than 2,000 by 2023, across sectors including industry, retail, agriculture, transport, financial services, and urban development.11

While France’s bilateral trade and investment with China have been increasing, structural challenges have begun to weigh on economic ties. Paris has pressed Beijing to reduce the country’s massive trade surplus—framing rebalancing as the priority—and has expressed frustration that China fails to adhere to the rules of the international economic order.12 President Macron has criticized China’s unfair trade practices and industrial overcapacity, calling them a global economic concern.13 Similarly, Foreign Minister Jean-Noël Barrot has underscored the need for compliance with international trade rules, highlighting the risks posed by Chinese subsidies—particularly in the electric vehicle (EV) sector.14 Paris remains especially concerned that heavily subsidized EVs could threaten its domestic auto industry.15

This issue has also sparked the latest trade dispute between France and China. Responding to Chinese dumping of EVs on the EU market, the European Commission imposed tariffs on Chinese EV producers. China retaliated by imposing tariffs of almost 40 percent on European brandy imports, specifically targeting French cognac.16 Macron called the move “pure retaliation.17 The dispute was eventually settled after prolonged negotiations in July 2025, shortly before the EU-China Summit.18

Technology: Guarding critical sectors amid selective cooperation

France’s China policy in the technology domain combines “de-risking, not decoupling” with tighter safeguards on critical technologies, infrastructure, and data—while preserving selective cooperation in climate-relevant sectors.19 Paris has strengthened inbound investment screening, permanently lowering the voting rights threshold for listed firms to 10 percent and expanding its scope to include low-carbon energy (including nuclear), photonics, and critical raw materials.20 These measures align with the EU economic-security agenda, prioritizing collective risk assessments for advanced semiconductors, AI, and quantum technologies.21

In telecommunications, France applies a case-by-case authorization regime under the 2019 5G law. While not a blanket ban, time-limited licenses for high-risk vendors—primarily Chinese firms like Huawei and ZTE—will effectively phase them out by 2028.22 Industrial policy has also been recalibrated: the so-called ecological bonus (bonus écologique)—a state subsidy for buying or leasing a new or used electric or hydrogen vehicle—now uses an environmental score that effectively excludes most Chinese EVs. France has also supported EU trade defense actions against Chinese EVs.23

Research security bodies—including the General Directorate for Internal Security and the Secretariat-General for National Defence and Security—have issued guidance and alerts to reduce technology leakage and undue influence in academia and research and development.24 At the same time, civil nuclear cooperation endures: Électricité de France (EDF) and China General Nuclear Power Group cooperate at the Taishan Nuclear Power Plant, in which EDF holds a 30 percent stake—and France and China renewed and deepened their nuclear cooperation in 2023 and 2024.25

Security: Dialogue without dependence

France’s security policy toward China reflects a carefully calibrated equilibrium. It combines strategic autonomy with a measured mix of engagement and balancing, while maintaining only limited alignment with the United States. As French officials noted in interviews for this report, Paris is willing to adopt a firm stance toward China—but on its own terms, not as a result of US pressure.

France’s historical identity as an Indo-Pacific power plays a central role in its security relations with China. On the one hand, Paris envisions an Indo-Pacific that is open, secure, and inclusive—grounded in respect for multilateral cooperation, international law, and sovereignty.26 On the other hand, its emphasis on maintaining dialogue with China reflects a reluctance to engage in what it views as unnecessary confrontation.27 The French government keeps communication channels with China open both to manage coexistence in the Indo-Pacific and because of China’s influence in the Global South, where France maintains an extensive network of relationships with its former colonies. France also seeks to maintain dialogue with China because the two countries share responsibility for international peace and security as permanent members of the UN Security Council and nuclear-armed states.

The Indo-Pacific features so prominently in French security policy that France was the first EU member state to adopt an Indo-Pacific strategy in 2018. Revised in 2025, the strategy rests on the premise that the Indo-Pacific is “a region vital to global prosperity,” yet increasingly tense due to “rivalries between great powers, China’s growing assertiveness, and strong trade tensions.” It maintains that France “is uniquely positioned in the region” as both “a European and Indo-Pacific nation.” The strategy’s four key priorities are:

  1. Strengthening the central role of France’s overseas departments, regions and communities;
  2. Consolidating sovereignty partnerships with Indo-Pacific countries;
  3. Supporting multilateralism and the development of regional organizations; and
  4. Contributing actively to the implementation of the EU Strategy for Cooperation in the Indo-Pacific.28

In the military domain, France sustains a structured yet pragmatic dialogue with China—enabled by its permanent naval presence in the Indo-Pacific. Regular inter-staff consultations, defense-ministry meetings, and communications between theater commands facilitate exchanges on counter-proliferation, dual-use goods, the Ukraine war, and regional security flashpoints such as the South China Sea and Taiwan. Simultaneously, Paris seeks to reassure its transatlantic and Indo-Pacific partners that its dialogue with Beijing is intended to enhance mutual understanding of China’s strategic intentions, not to undermine alliance unity. France frames its military engagement with China as complementary to its broader regional commitments, reflected in multilateral formats such as Track 1.5 dialogues and joint naval task forces (for example, with Japan and the Philippines).

In recent years, France has expanded its naval presence in the Indo-Pacific in line with its Indo-Pacific Strategy and in response to China’s increasingly assertive regional posture. French deployments have included multiple frigate transits through contested waters, freedom-of-navigation operations in the South China Sea, and the Charles de Gaulle carrier strike group’s 2024-2025 Pacific deployment. These operations underscore France’s commitment to the rules-based maritime order and its intent to signal deterrence while avoiding escalation. In this context, maintaining direct military-to-military communication with Beijing has become a vital component of Paris’s risk-management and regional-stabilization strategy.29

Russia’s 2022 invasion of Ukraine—and China’s material and diplomatic support for Moscow—have become key drivers in the hardening of Paris’s China policy. For years, French governments believed that Beijing’s “no limits” partnership gave Xi sufficient leverage to act as a potential mediator with Putin.30 President Macron repeatedly urged China to curb its support for Russia, use its influence to advance a settlement, and restrain North Korean involvement—warning that continued assistance or escalation could trigger broader allied responses beyond Europe.31 Successive Macron cabinets have stressed to Beijing that Russia’s war constitutes a direct assault on Europe’s security and that any actor aiding Moscow represents a grave threat to the European Union.32

France’s alignment with the EUs China policy

France’s China policy—and its approach to the EU’s broader China strategy—illustrate the interaction of EU-level and national policymaking. While France’s national policy seeks to balance engagement with the protection of its economic competitiveness, its stance within the EU strongly supports de-risking and strategic balancing toward China. Rising economic and competitiveness challenges have reinforced France’s backing for the EU’s approach and prompted Paris to press for tougher measures in trade, investment, technology, and critical infrastructure.

In trade, Paris has firmly shifted toward strengthening Europe’s resilience and economic sovereignty, supporting a more assertive EU trade policy within a wider economic-security framework.33 Reflecting this stance, Macron has argued that the EU’s exceptionally open market must be paired with credible defenses of European interests.34 In 2023, France spearheaded a coordinated effort that helped prompt the European Commission to open anti-dumping investigations into subsidized Chinese EV makers.35

In investment, France has led efforts to reduce the EU’s strategic dependence on China and strengthen Europe’s economic autonomy and resilience. Paris has advocated reforming EU competition regulations to grant member states greater leeway to mobilize public investment, while promoting a strong industrial policy aimed at enhancing EU competitiveness in key strategic technologies.36 Regarding Chinese investment in Europe, Macron—ahead of Xi Jinping’s state visit in March 2019—famously declared that “the period of European naivety is over,” emphasizing that “letting Chinese companies buy up EU infrastructure such as ports had been a ‘strategic error.’”37

Regarding technology, Paris has championed the establishment of EU-level economic-security tools—including anti-subsidy measures, foreign investment screening, an anti-coercion instrument, public procurement safeguards, and a 5G Toolbox—to protect European technologies, strategic industries, and critical infrastructure.38 Thanks in part to France’s support and the Commission’s swift implementation, the EU has rolled out all of these instruments in just a few years.

In security, France supports EU efforts to stop China from aiding Russia’s war in Ukraine. It also advocates a stronger European role in Indo-Pacific security and promotes expanded cooperation with Indo-Pacific democracies. France believes these objectives can only be achieved through close coordination and unity among EU member states and institutions on China policy. Macron underscored this conviction by inviting the European Commission president and the German chancellor to join him both times he hosted President Xi in the Élysée Palace—in March 2019 and in May 2024.39

Conclusion

China’s increasing economic and competitiveness challenges to France and the EU have transformed the traditionally cooperative Sino-French relationship over the past decade. France’s China policy still emphasizes engagement on global issues, climate, and military-to-military communication, but its overall stance on trade and investment, technology, and security has gradually shifted toward balancing and de-risking. Since taking office in 2017, President Macron—once an optimist about constructive dialogue with Beijing—has recognized that the balance of power in Sino-French relations has tilted to France’s disadvantage. He has therefore begun to advocate for a more assertive economic-security approach, primarily through EU-level initiatives.

As a result, while France seeks to maintain communication and seeks to avoid direct confrontation with China, it has been one of the staunchest initiators and backers of the von der Leyen Commission’s de-risking agenda. The steady shift toward balancing is likely to persist through the remainder of Macron’s term. However, a potential far-right victory in the 2027 presidential election could upend this trajectory and usher in a more China-friendly stance at the Élysée Palace.

About the author

Related content

Explore the programs

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    Jinling Zhang, 60 Years of China-France Relations: Extraordinary Friendship and Exemplary Cooperation, (Beijing: Chinese People’s Institute of Foreign Affairs, 2024), https://www.cpifa.org/en/cms/book/402.
2    “China, France Sign Joint Declaration,” Embassy of the People’s Republic of China in the United States of America, January 27, 2004, https://us.china-embassy.gov.cn/eng/zt/twwt/200401/t20040127_4912479.htm.
3    “Xi Says His State Visit to France Has Special Meaning,” Xinhua News Agency, March 28, 2024, https://www.chinadaily.com.cn/world/2014xivisiteu/2014-03/28/content_17387179.htm.
4    Kinling Lo, “EU Leaders Hold out Olive Branch to China over Belt and Road,” South China Morning Post, March 26, 2019, https://www.scmp.com/news/china/diplomacy/article/3003378/eu-leaders-hold-out-olive-branch-chinese-rival-hint-they-are.
5    Francois Godement, “France and China: Making the Best of an Unequal Relationship,” Institut Montaigne, May 7, 2024, https://www.institutmontaigne.org/en/expressions/france-and-china-making-best-unequal-relationship.
6    Céline Pajon, John Seaman, and Marc Julienne, “France Adapts to an Era of Strategic Competition with China,” Institut Français Des Relations Internationales, May 6, 2024, https://www.ifri.org/en/external-articles/france-adapts-era-strategic-competition-china.
7    Ibid.
8    Giulia Interesse, “France-China Relations: Trade, Investment, and Recent Developments,” China Briefing, May 15, 2024, https://www.china-briefing.com/news/france-china-relations-trade-investment-and-recent-developments.
9    “China, France to Advance Economic Exchanges with Deepening Cooperation in Emerging Fields amid 60 Years of Diplomatic Ties,” Global Times, May 5, 2024, https://www.globaltimes.cn/page/202405/1311668.shtml.
10    Interesse, “France-China Relations.”
11    “China, France to Advance Economic Exchanges”; “France and China,” Ministry for Europe and Foreign Affairs, March 2019, https://www.diplomatie.gouv.fr/en/country-files/china/france-and-china; Lu Chen and Kelly Wang, “From ‘French Farms to Chinese Tables’: France’s Economy Minister Touts Trade Potential,” Global Neighbours, April 8, 2025, https://www.globalneighbours.org/from-french-farms-to-chinese-tables-frances-economy-minister-touts-trade-potential.
12    “France and China.”
13    “Biden, Macron Seek Joint Response on China Trade after Tensions,” Bloomberg, June 8, 2024, https://www.bloomberg.com/news/articles/2024-06-08/biden-macron-seek-joint-response-on-china-trade-after-tensions.
14    Necva Tastan Sevinc, “France Urges China to Respect Trade Rules, Warns against Supporting Russia,” Anadolu Ajansi, July 17, 2025, https://www.aa.com.tr/en/asia-pacific/france-urges-china-to-respect-trade-rules-warns-against-supporting-russia/3633744.
15    Marc Julienne, “Macron’s China Policy: Dropping Illusions and Bringing Back Realpolitik,” Prospect Foundation, May 14, 2024, https://www.pf.org.tw/en/pfen/33-10699.html.
16    Finbarr Bermingham, “China Says EU Brandy Being Dumped on Local Market, but Holds Fire on Duties,” South China Morning Post, August 29, 2024, https://www.scmp.com/news/china/diplomacy/article/3276453/china-says-eu-brandy-being-dumped-local-market-wont-impose-duties-now.
17    “China Says It Is Working with France on Trade Differences, No Sign Yet of a Cognac Deal,” Reuters, June 7, 2025, https://www.asiaone.com/world/china-says-it-working-france-trade-differences-no-sign-yet-cognac-deal.
18    Xiaofei Xu, “Why France Is Toasting China’s New Tariff on European Brandy,” South China Morning Post, July 7, 2025, https://www.scmp.com/economy/china-economy/article/3317176/why-france-toasting-chinas-new-tariff-european-brandy.
19    Michel Rose and Laurie Chen, “Ahead of Xi Meeting, Macron Warns against Shunning China,” Reuters, April 5, 2023, https://www.reuters.com/world/europe/between-reset-de-risk-eu-leaders-pay-rare-visit-china-2023-04-04.
20    Pascal Bine and Wesley Lainé, “France Strengthens Foreign Investment Controls, Expands Jurisdiction to ‘Commercial Establishments’ Registered in France,” Skadden, Arps, Slate, Meagher & Flom LLP, January 16, 2024, https://www.skadden.com/insights/publications/2024/01/france-strengthens-foreign-investment-control; “Foreign Investment Screening in France—Annual Report 2023,” Ministère de l’Économie, des Finances et de la Souveraineté Industrielle et Numérique, 2023. https://www.tresor.economie.gouv.fr/Articles/c7ec36f3-6df0-4cf8-82aa-9c772917afeb/files/83865cf0-0ecd-4684-badf-3e39fa6bb833.
21    “Commission Recommends Carrying out Risk Assessments on Four Critical Technology Areas: Advanced Semiconductors, Artificial Intelligence, Quantum, Biotechnologies,” European Commission, press release, October 3, 2023, https://defence-industry-space.ec.europa.eu/commission-recommends-carrying-out-risk-assessments-four-critical-technology-areas-advanced-2023-10-03_en.
22    LOI N° 2019-810 Du 1er Août 2019 Visant à Préserver Les Intérêts de La Défense et de La Sécurité Nationale de La France Dans Le Cadre de l’exploitation Des Réseaux Radioélectriques Mobiles (1) (2019) https://www.legifrance.gouv.fr/jorf/id/JORFTEXT000038864094; Mathieu Rosemain and Gwénaëlle Barzic, “Exclusive: French Limits on Huawei 5G Equipment Amount to de Facto Ban by 2028,” Reuters, July 22, 2020, https://www.reuters.com/article/technology/exclusive-french-limits-on-huawei-5g-equipment-amount-to-de-facto-ban-by-2028-idUSKCN24N26R.
23    “Ecological Bonus: Which New Vehicles Are Eligible?” Service Public, February 9, 2024, https://www.service-public.fr/particuliers/actualites/A17002?lang=en; “France’s Le Maire Welcomes EU Action against Chinese-Made Electric Cars,” Reuters, September 13, 2023, https://www.reuters.com/article/business/frances-le-maire-welcomes-eu-action-against-chinese-made-electric-cars-idUSS8N3A306F.
24    “Conseils aux Entreprises : Flash Ingérence,” Direction Générale de la Sécurité Intérieure, last visited September 14, 2025, https://www.dgsi.interieur.gouv.fr/dgsi-a-vos-cotes/contre-espionnage/conseils-aux-entreprises-flash-ingerence; “Protéger le Débat Public Contre les Ingérences Numériques Étrangères,” Secrétariat Général de la Défense et de la Sécurité Nationale, November 23, 2022, http://www.sgdsn.gouv.fr/nos-missions/proteger/proteger-le-debat-public-contre-les-ingerences-numeriques-etrangeres.
25    “China, France Expand Nuclear Cooperation,” World Nuclear News, April 11, 2023, https://world-nuclear-news.org/articles/china,-france-expand-nuclear-cooperation; “French and Chinese Firms Ink Deals on Sidelines of Xi’s Paris Visit,” Reuters, May 6, 2024, https://www.reuters.com/markets/french-chinese-firms-ink-deals-sidelines-xis-paris-visit-2024-05-06.
26    “France’s Indo-Pacific Strategy 2025,” Ministry for Europe and Foreign Affairs, July 2025, https://www.diplomatie.gouv.fr/IMG/pdf/france_s_indo-pacific_strategy_2025_cle04bb17.pdf.
27    Pajon, et al., “France Adapts to an Era of Strategic Competition with China.”
28    “France’s Indo-Pacific Strategy 2025”; “The Indo-Pacific: A Priority for France,” Ministère de l’Europe et des Affaires Étrangères, July 2025, https://www.diplomatie.gouv.fr/en/country-files/regional-strategies/indo-pacific/the-indo-pacific-a-priority-for-france/; “EU Indo-Pacific Strategy,” European External Action Service, November 6, 2024, https://www.eeas.europa.eu/eu-indo-pacific-strategy-topic_en.
29    “Annual Report 2024,” French Ministry of the Armed Forces, June 4, 2024, https://www.defense.gouv.fr/sites/default/files/dgris/DGRIS%20annual%20report%202024.pdf; Dzirhan Mahadzir, “French Carrier Charles de Gaulle Wraps First Pacific Deployment,” USNI News, March 7, 2025, https://news.usni.org/2025/03/07/french-carrier-charles-de-gaulle-wraps-first-pacific-deployment.
30    Pajon, et al., “France Adapts to an Era of Strategic Competition with China.”
31    Marc Julienne, “France’s Emmanuel Macron to Press Xi Jinping on China’s Support of Russia,” Institut Français Des Relations Internationales, May 4, 2023, https://www.ifri.org/en/media-external-article/frances-emmanuel-macron-press-xi-jinping-chinas-support-russia; Shane Croucher, “Macron Wants Bigger Ukraine Role for China,” Newsweek, March 27, 2025, https://www.newsweek.com/macron-wants-chinas-xi-do-more-russia-ukraine-war-2051421; Laura Kayali, “Macron to China: Keep North Korea out of Ukraine War or Risk NATO Coming to Asia,” Politico, May 30, 2025, https://www.politico.eu/article/macron-china-keep-north-korea-out-ukraine-nato-to-asia; Rory O’Neill, “China Slams Macron over ‘Unacceptable’ Comments on Taiwan and Ukraine,” Politico, May 31, 2025, https://www.politico.eu/article/macron-ukraine-taiwan-china-war-israel-gaza-shangri-la.
32    Sevinc, “France Urges China to Respect Trade Rules, Warns against Supporting Russia.”
33    Pajon, et al., “France Adapts to an Era of Strategic Competition with China.”
34    Sarah White, et al., “EU and France Press Xi for More Balanced Chinese Trade Ties,” Financial Times, May 6, 2024, https://www.ft.com/content/0728c778-4d5a-4dfc-8694-9c493e82df15.
35    Barbara Moens, et al., “France Puts Screws on EU Chief to Hit Back against Chinese Electric Vehicles,” Politico, September 11, 2023, https://www.politico.eu/article/france-breton-eu-chief-hit-back-against-chinese-electric-vehicles.
36    Pajon, et al., “France Adapts to an Era of Strategic Competition with China.”
37    Kinling Lo, “EU Leaders Hold out Olive Branch to Chinese ‘Rival’ over Belt and Road,” South China Morning Post, March 26, 2019, https://www.scmp.com/news/china/diplomacy/article/3003378/eu-leaders-hold-out-olive-branch-chinese-rival-hint-they-are.
38    Pajon et al., “France Adapts to an Era of Strategic Competition with China.”
39    Lo, “EU Leaders Hold out Olive Branch to Chinese ‘Rival’ over Belt and Road”; “Macron and von Der Leyen Press China’s Xi on Ukraine and Fair Trade at Paris Summit,” Le Monde, May 6, 2024, https://www.lemonde.fr/en/international/article/2024/05/06/macron-and-von-der-leyen-press-china-s-xi-on-ukraine-and-fair-trade-at-paris-summit_6670576_4.html; White, et al., “EU and France Press Xi for More Balanced Chinese Trade Ties.”

The post France’s policy on China: Strategic autonomy and less naïveté appeared first on Atlantic Council.

]]>
Navigating the complexity of European policymaking on China https://www.atlanticcouncil.org/in-depth-research-reports/report/navigating-the-complexity-of-european-policymaking-on-china/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=883353 EU policymaking on China is complex not only in structure but also in practice. It unfolds across multiple layers of governance, where EU institutions and member states pursue overlapping—and at times conflicting—priorities, making strategic alignment toward Beijing a persistent challenge.

The post Navigating the complexity of European policymaking on China appeared first on Atlantic Council.

]]>
This is the second chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy.Read the full report here.

In a well-known anecdote often attributed to Henry Kissinger, the national security advisor allegedly asked, “Who do I call if I want to call Europe?”1 Whether or not Kissinger actually voiced it, the question still resonates today—and reflects the uncertainty faced by outside observers trying to understand EU policies on China, unsure who holds ultimate authority.

EU policymaking on China involves a multilayered process in which institutions and member states pursue overlapping and sometimes conflicting interests. At the EU level, the European Commission, the European Parliament, the European Council, and the European External Action Service (EEAS) play distinct roles in shaping policy. At the same time, member states develop their own national approaches, influencing EU-level decision-making. The result is a complex, often opaque interplay of actors, issues, and interests that collectively shape the EU’s approach to China.

How does the EU’s policymaking process impact its China policy?

Much of the confusion about the EU’s China policy stems from its multilayered and complex decision-making structure. Broadly, China policy operates on two levels: the EU-level and the member state level. Different functional areas are covered by different rules and actors. Trade, for instance, is an exclusive EU competence—led by the Commission—while technological development and energy are shared competences between the EU and member states. Foreign policy and security policy are unique cases because the Common Foreign and Security Policy (CFSP) is determined collectively at the EU-level, with member states formulating policy together in the Council by unanimous vote. Non-EU level foreign and security policy, in contrast, is autonomously shaped by individual member states.

At the EU-level, policy on China is formally adopted by the member states in the Council, but historically much of the initiative has come from the European Commission and, to some extent, the European Parliament. The Commission and Parliament are supranational bodies, while the European Council is intergovernmental, giving member states a direct role in shaping policy. In the European Council—the body of EU member state leaders—they agree on general guidelines, while joint actions and common positions are adopted in the Council of the European Union, which is composed of national ministers from each EU country. EU-level China policy thus emerges from the interaction between member states and EU institutions.

The role of EU institutions

EU-level China policy is shaped by the Commission, the European Council, the Parliament, and the EEAS—each exercising distinct functions and degrees of influence. The Commission serves as the EU’s executive, proposing legislation to the Council and Parliament and implementing policies; the Council acts as a co-legislator and sets the CFSP; and the Parliament reviews legislation while exercising democratic oversight.

With regard to China policy, the Commission plays a dominant role by preparing policy proposals, initiating legislation, and implementing policies. Within the CFSP, the Commission formally holds limited competences but has gradually acquired de facto influence, reducing member state veto power.2 It works closely with the EEAS, whose head also serves as Commission vice president. The Commission maintains oversight in key external-policy areas, including aid, development, energy, and trade. In these areas, it influences China policy through its “communications”—high-level policy papers that set EU priorities. Since 2019, under the first Ursula von der Leyen Commission, the EU has shifted from framing Beijing as a partner, competitor, and a systemic rival to emphasizing China as a “systemic rival,” codifying the EU’s “de-risking” in the European Economic Security Strategy.3 The Commission has also leveraged its trade and regulatory powers to advance China-related policy, including instruments such as the Anti-Coercion Instrument (ACI), the Foreign Subsidies Regulation (FSR), and the International Procurement Instrument (IPI).4

The Council adopts EU-level official policies on China within the CFSP framework. Comprising the heads of state and governments of each member state, it sets general guidelines, while the Council of Ministers—attended by relevant ministers—agrees on joint actions or common positions. The Council can establish diplomatic relations with China, as in 1975, and conclude agreements such as the 1978 Trade Agreement and the 1985 Trade and Economic Cooperation Agreement.5 Council conclusions are typically declaratory, emphasizing EU values and principles, yet they carry weight due to collective member state authority. In practice, Council and Commission leaders coordinate external initiatives on China closely. They also meet Chinese leaders jointly at the annual EU-China Summit.

The European Parliament functions as a co-legislator and plays both advisory and agenda-setting roles. Members and committees actively debate China policy, publish reports, and issue resolutions. The 2009 Lisbon Treaty further strengthened the Parliament’s role, requiring its approval for major agreements with China—a power that the Parliament exercised when it suspended ratification of the Comprehensive Agreement on Investment (CAI) in 2021.6 It also publishes major policy documents, such as the 2021 EU-China strategy, reports on EU-China relations, and adopts resolutions addressing human rights and other issues.7 The Parliament has maintained quasi-diplomatic relations with China over the past decade. At the same time, it has repeatedly employed tools such as the EU Global Human Rights Sanctions Regime, prompting China to sanction several of its members in 2021.8

Finally, the EEAS serves as the EU’s diplomatic service, coordinating central institutions and external bodies in implementing the CFSP. The High Representative for Foreign Affairs and Security Policy (HR/VP), who appoints EEAS staff and oversees overall foreign policy, coordinates closely with the Commission and Council as Commission vice president and chair of the Council of Foreign Ministers. While the HR/VP represents EU China policy and ensures institutional coordination, the EEAS enacts it. However, both the HR/VP and the EEAS have limited influence over the policy’s formulation.

The role of the member states

The role of EU member states in shaping China policy is twofold. First, they participate in the Council, where they set the direction of EU-level policy. It should be noted, however, that the influence of member states varies significantly, and the Commission often plays an outsized role in steering policymaking. Second, each member state also formulates its own national policy on China.

As the Council formulates not only the CFSP but is also acts as a co-legislator on other policies and strategies related to China (e.g. economic security instruments), member states can shape policy decisions through the participation of their heads of state and government, as well as through the various configurations of the Council of the European Union, including the Foreign Affairs Council, the Economic and Financial Council, and the Competitiveness Council. Once member states formulate CFSP policies in the Council, they are obliged to implement them, and their national policies must align with EU positions.

At the same time, EU member states retain broad autonomy in developing their own bilateral policies toward China, despite the existence of the CFSP and the EU’s exclusive competence over trade. This autonomy allows states to declare strategic partnerships, sign agreements, or conclude memoranda of understanding with China on a wide range of issues, from education and culture to investment to security. A striking example is Hungary’s 2024 security cooperation agreement with China, which allows Chinese police officers to patrol on Hungarian territory.9

Member states thus influence EU China policy both through their bilateral engagements with Beijing and through their decision-making on EU-level policy in the Council. Because member states’ preferences and priorities differ widely, reflecting divergent national interests, formulating a coherent and unified EU-level policy on China is highly complex. In practice, even after agreeing on common policies in the Council, some member states pursue actions that contradict EU-level decisions.

Differences among EU member states

Much of the ambiguity in EU policy on China arises from its multilayered and complex decision-making structure. EU institutions seek unity, but national governments often have divergent priorities, making coherence difficult. National approaches depend on the depth of bilateral relationships with China, the scale of economic and technological dependencies, tensions between business communities, leadership attitudes, and public opinion toward China. Together, these factors produce varied national policies that range from openness and engagement to strategic caution and restriction. The EU, meanwhile, tries to balance these positions by recognizing interdependence with China while managing strategic risks.

Intensity of European relationships with China

Broadly speaking, EU member states fall into three categories in terms of their relationships with China. The first group includes economic powerhouses such as Germany, France, Italy, and others, which have built long-term, multidimensional partnerships with China encompassing trade, diplomacy, and cultural exchange. Many of these countries—for instance, Germany and France, have export-oriented economies and are especially sensitive to issues of market access in China. Their industrial competitiveness depends heavily on sectors such as automation, machinery, and chemicals, which are deeply integrated into Chinese supply chains and consumer markets.

Naturally, this group dominates European trade with China—with Germany alone accounting for roughly 35 percent—and has greater influence than others in shaping the EU’s overall China policy. Six member states—Germany, the Netherlands, Italy, France, Spain, and Poland—together represent around 75 percent of total EU-China trade.10 Chinese investment in the EU is equally concentrated: since 2000, the United Kingdom ($92 billion), Germany ($38 billion), France ($26 billion), the Netherlands ($20 billion), and Italy ($16 billion) together have attracted 66 percent of cumulative Chinese foreign direct investment (FDI) in the EU.11

This pattern reflects Beijing’s long-term objective of embedding itself in Europe’s advanced research and development networks. To advance its “Made in China 2025” strategy, Beijing has sought to acquire strategically important companies in Western Europe.12 The concentration of Chinese FDI highlights how a select group of member states serves as the primary conduit for Europe’s engagement with China—and vice versa—shaping not only the EU’s opportunities but also its vulnerabilities.

Concerned about Chinese acquisitions—mainly state-owned enterprises—in February 2017, the economy ministers of Germany, France, and Italy jointly urged then-EU Trade Commissioner Cecilia Malmström to establish an EU-wide mechanism for screening foreign investments.13 They warned that European expertise was at risk of being sold off without adequate safeguards to protect strategic technologies and infrastructure. Their appeal followed the takeover of the German robotics firm KUKA—one of Europe’s most advanced technological companies—by China’s Midea Group. France joined the appeal because it reflected its tradition of protecting strategic sectors, while Italy worried about Chinese incursions into its energy and transport industries following a surge of Chinese takeovers after the financial crisis. This push marked a turning point, as major EU economies pressed Brussels to balance open markets with security concerns, laying the groundwork for the EU’s 2019 investment-screening regulation and
today’s broader debate on economic security and sovereignty. However, even among these three countries, policies have been inconsistent, as their governments have oscillated between openness and caution. Italy abstained from voting on the screening mechanism in 2019 and, around the same time, signed onto China’s Belt and Road Initiative (BRI). Germany likewise failed to coordinate effectively to block Chinese investment in the port of Hamburg.

The second group comprises countries whose ties with China have deepened markedly in recent years, particularly in Central and Eastern Europe. Hungary—and the candidate country Serbia—are the most prominent cases. Their relationships with Beijing have developed primarily under the “16+1” framework (later “17+1”, now “14+1”), launched by China in 2012 to strengthen its engagement with new EU member states and candidate countries in the Western Balkans. Several of these states have since upgraded their bilateral relationship with Beijing to strategic partnerships and joined the BRI. In the past two years, Hungary has emerged as the predominant destination for Chinese FDI in Europe, particularly in electric-vehicle and battery manufacturing. In 2024, Hungary alone absorbed nearly 31 percent of all Chinese FDI in the EU and the United Kingdom.14

Beijing’s cooperation with certain countries in regional frameworks such as 16+1 has raised concerns in the EU that, by acquiring strategic assets, China has gained political influence, strengthened its bargaining position vis-à-vis Brussels, and expanded its capacity to “divide and rule” the continent—weakening the EU’s ability to speak with one voice. Evidence suggests that in countries where Chinese presence is more pronounced, foreign policy choices have tended to align with Beijing, often opposing common EU positions on issues ranging from human rights to the South China Sea. For example, in April 2018, Hungary stood out as the only EU member state to refuse endorsement of a report critical of Beijing’s BRI. Similarly, Greece—which joined the 16+1 framework in 2019—together with Hungary and Croatia, diverged from the European consensus in 2016 by blocking the EU from endorsing the Permanent Court of Arbitration’s ruling in favor of the Philippines in its case against China’s maritime claims in the South China Sea.15 Moreover, Athens later vetoed an EU statement on China’s human rights record, dismissing it as “unconstructive criticism of China”.16

Countries in these first two groups are heavily reliant on raw materials and technology supply chains—from semiconductors to rare earth elements and green technologies. These dependencies create structural asymmetries, such as those related to Chinese solar panels and batteries, which directly affect Europe’s energy transition policies. In addition, some states remain vulnerable due to dependencies in critical infrastructure, notably their continued reliance on Chinese firms like Huawei for telecommunications networks.

The third group of countries includes EU member states with limited engagement—those with weaker economic and political links to China, such as the Nordic and Baltic states. With minimal trade and economic ties to Beijing, these countries tend to pursue values-based policies that emphasize human rights and security concerns, often aligning closely with US positions. Twelve EU member states in this group—including Lithuania, Estonia, Latvia, Croatia, Cyprus, and Slovenia—account for less than five percent of the EU’s total trade with China.

Business interests, public attitudes, and domestic politics

Domestic political dynamics, including the interplay between business interests, leadership styles, and public opinion, further shape EU member states’ approaches to China. The business community—particularly in EU countries with large trade and economic dependencies on China—often lobbies for stable and pragmatic relations with Beijing to safeguard market access and supply chains. This frequently conflicts with public policy actors, who increasingly emphasize security concerns (especially after Russia’s invasion of Ukraine and the “no-limits” partnership between China and Russia), human rights issues (for instance, in Hong Kong and in relation to the treatment of Uyghurs in Xinjiang,) and resilience against strategic dependencies (especially after the COVID-19 pandemic). In some cases, governments have tightened screening mechanisms for Chinese investment even as companies sought to expand partnerships and joint ventures in China, creating friction between business elites and policymakers.

Similarly, national leadership styles and political cultures also strongly influence approaches. French leaders, for instance, often frame China policy in terms of strategic autonomy and global competition. German leaders, by contrast, traditionally emphasized “Wandel durch Handel”— change through trade—but have shifted toward de-risking in recent years. In countries where skepticism toward authoritarian regimes is high (for example, in the Baltic states and the Czech Republic), governments often adopt tougher stances, whereas public opinion in other countries remains more ambivalent, especially when economic benefits are at stake. Moreover, populist or nationalist administrations, such as Hungary’s Orbán government, sometimes instrumentalize relations with China as a counterweight to Brussels.

Just as European governments differ in their political approaches to Beijing, public attitudes toward China are far from uniform. These variations often mirror differences in economic exposure and security concerns, complicating efforts to forge a coherent EU China strategy. Recent polls suggest that many Europeans view China as a “necessary partner” (39 percent), rather than an ally (4 percent) or an adversary (26 percent). However, Southern Europeans generally hold more favorable views, reflecting perceived economic benefits, while Northern Europeans remain more skeptical, shaped by cautionary lessons on interdependence. Eastern Europeans, by contrast, express the strongest concern over Beijing’s deepening ties with Moscow.17

Conclusion

When it comes to the complexity of European political and policymaking processes on China, two conclusions stand out. First, EU policymaking on China is complex not only in appearance but also in practice. Since both EU institutions and member states are involved, contradictions naturally emerge. While national governments pursue their own interests, EU-level policies are designed to reflect the bloc’s broader geopolitical stance. Second, although member states pursue their own bilateral China policies, their influence still shapes EU-level approaches, which evolve through constant interaction between EU institutions and member state representatives.

The European Commission, at the heart of the EU’s institutional framework, has played a pivotal role in shaping EU China policy for decades, working closely with the European Council, the European Parliament, and the EEAS. The Parliament, strengthened by the Lisbon Treaty, has become increasingly influential—a development that is reflected by its rejection of the CAI and its continued push for a tougher line on human rights. Contrary to assumptions of constant disunity, the EU institutions have generally agreed on the overall direction of China policy. The more persistent divergence lies between EU-level consensus and the China policies of individual member states.

Divergent national interests, economic dependencies, and political orientations among EU member states add another layer of complexity to the EU’s collective approach on China. Major economies such as Germany, France, and Italy maintain deep economic engagement with China but also promote regulatory measures to protect strategic sectors. In contrast, many Central and Eastern European countries—most notably Hungary—favor closer political and economic ties with Beijing, raising concerns that China may exploit these internal divisions within the EU. Meanwhile, smaller states with limited links to Beijing, particularly in the Baltics and in Northern Europe, tend to support approaches centered on security and shared values. These differences are further intensified by domestic tensions between business communities, which seek stable market access, and policymakers, who often prioritize resilience, human rights, and security.

Taken together, these dynamics highlight that the EU’s approach to China is not monolithic but instead reflects a patchwork of national interests that Brussels must continually reconcile. This reality makes achieving coherence and unity a constant challenge in EU policymaking on China.

About the author

Related content

Explore the programs

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    Vanessa Gera, “Kissinger Says Calling Europe Quote Not Likely His,” Associated Press, June 27, 2012, https://www.yahoo.com/news/kissinger-says-calling-europe-quote-not-likely-145223724.html.
2    Akasemi Newsome and Marianne Riddervold, “The Role of EU Institutions in the Design of EU Foreign and Security Policies,” in The Routledge Handbook of European Security Law and Policy (London: Routledge, 2019), 55.
3    “EU-China—A Strategic Outlook,” European Commission, March 12, 2019, https://commission.europa.eu/system/files/2019-03/communication-eu-china-a-strategic-outlook.pdf; “Joint Communication to the European Parliament, the European Council, and the Council on European Economic Security Strategy,” European Union, June 20, 2023, https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=JOIN:2023:20:FIN.
4    “New Tool to Enable EU to Withstand Economic Coercion Enters into Force,” European Commission, press release, December 26, 2023, https://ec.europa.eu/commission/presscorner/detail/en/ip_23_6804; “Foreign Subsidies Regulation,” European Commission, July 12, 2023, https://competition-policy.ec.europa.eu/foreign-subsidies-regulation_en; “International Public Procurement Instrument,” European Commission, last visited September 5, 2025, https://trade.ec.europa.eu/access-to-markets/en/content/international-public-procurement-instrument.
5    “Trade Agreement between the European Economic Community and the People’ s Republic of China,” European Commission, May 2, 1978, https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:21978A0403%2801%29; “Agreement on Trade and Economic Cooperation between the European Economic Community and the People’s Republic of China,” European Union, September 19, 1985, https://eur-lex.europa.eu/eli/agree_internation/1985/2616/oj/eng.
6    “EU-China Comprehensive Agreement on Investment (EU-China CAI),” European Parliament, June 20, 2025, https://www.europarl.europa.eu/legislative-train/theme-a-global-europe-leveraging-our-power-and-partnerships/file-eu-china-investment-agreement.
7    Ibid.; “European Parliament Recommendation of 13 December 2023 to the Council and the Vice-President of the Commission/High Representative of the Union for Foreign Affairs and Security Policy Concerning EU-China Relations,” European Parliament, 2023, https://www.europarl.europa.eu/doceo/document/TA-9-2023-0469_EN.html.
8    Unai Gómez-Hernández, “European Parliament Elections Will Set the Tone for EU-China Relations,” China Observers in Central and Eastern Europe, April 12, 2024, https://chinaobservers.eu/european-parliament-elections-will-set-the-tone-for-eu-china-relations.
9    Liz Lee and Ryan Woo, “In Unusual Move, China Offers to Back Hungary in Security Matters,” World, Reuters, February 20, 2024, https://www.reuters.com/world/unusual-move-china-offers-back-hungary-security-matters-2024-02-19.
10    Authors’ calculations based on Trading Economics data. Last visited August 24, 2025.
11    Statistics include the United Kingdom when it was still an EU member, but not since 2016. Agatha Kratz, et al., “Chinese Investment Rebounds Despite Growing Frictions: Chinese FDI in Europe: 2024 Update,” Mercator Institute for China Studies and Rhodium Group, May 21, 2025, https://merics.org/en/report/chinese-investment-rebounds-despite-growing-frictions-chinese-fdi-europe-2024-update.
12    Valbona Zeneli, “China and Europe” in Scott D. McDonald and Michael C. Burgoyne, eds., “China’s Global Influence: Perspectives and Recommendations,” Daniel K. Inouye Asia-Pacific Center for Security Studies, 2019, https://dkiapcss.edu/wp-content/uploads/2019/09/8-China_and_Europe-Zeneli.pdf.
13    Gisela Grieger, “Foreign Direct Investment Screening: A Debate in Light of China-EU FDI Flows,” European Parliamentary Research Service, May 2017, https://www.europarl.europa.eu/RegData/etudes/BRIE/2017/603941/EPRS_BRI(2017)603941_EN.pdf.
14    Kratz, et al., “Chinese Investment Rebounds Despite Growing Frictions: Chinese FDI in Europe.”
15    Robin Emmott, “EU’s Statement on South China Sea Reflects Divisions,” Reuters, July 15, 2016, https://www.reuters.com/article/us-southchinasea-ruling-eu-idUSKCN0ZV1TS.
16    Robin Emmott and Angeliki Koutantou, “Greece Blocks EU Statement on China Human Rights at UN,” Reuters, June 18, 2017, https://www.reuters.com/article/world/greece-blocks-eu-statement-on-china-human-rights-at-un-idUSKBN1990FP.
17    Jana Puglierin, Arturo Varvelli, and Pawel Zerka, “Transatlantic Twilight: European Public Opinion and the Long Shadow of Trump,” European Council on Foreign Relations, February 12, 2025, https://ecfr.eu/publication/transatlantic-twilight-european-public-opinion-and-the-long-shadow-of-trump/#the-china-conundrum.

The post Navigating the complexity of European policymaking on China appeared first on Atlantic Council.

]]>
Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy https://www.atlanticcouncil.org/in-depth-research-reports/report/is-europe-waking-up-to-the-china-challenge-how-geopolitics-are-reshaping-eu-and-transatlantic-strategy/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=880143 China’s rising global ambitions challenge both US and European interests. By examining the EU’s gradual shift toward “de-risking” and gaps in transatlantic policy, this report offers insights for developing a more coherent and coordinated strategy to address Beijing’s economic and security challenges.

The post Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy appeared first on Atlantic Council.

]]>
China’s ever-expanding global ambitions, unfolding amid renewed great power competition, pose a significant challenge to the strategic and economic interests of the United States and its European allies. Addressing these challenges will require strong and consistent transatlantic alignment and coordination—from countering Beijing’s unfair economic practices to confronting its assertive security posture.

Such alignment, however, has often been uneven. While the United States identified China as its primary strategic competitor and shifted from engagement to balancing as early as 2017, the European Union (EU) approach has evolved more slowly and inconsistently. This report explores the structural and political roots of that inconsistency—and offers guidance on how US policymakers can use these insights to foster unified transatlantic action.

In doing so, it traces the policy trajectories of individual member states, assesses the role of EU institutions in shaping China policy, and examines four key geopolitical trends that have nudged the EU toward a gradual move from engagement to balancing and “de-risking” vis-à-vis Beijing. Although significant differences persist between the United States and the EU in their broader trade posture, the findings indicate that Europe is increasingly waking up to the China challenge—and that the EU’s shifting stance could lay the groundwork for a more coherent, durable transatlantic strategy toward China.

Read the chapters

About the authors

Acknowledgements

This report is the culmination of a year-long research project made possible through the generous support of the Smith Richardson Foundation.

The authors would like to express their gratitude to numerous individuals at the Atlantic Council for their hard work and dedication to the project, including:

  • Melanie Hart, senior director, Global China Hub
  • Samantha Wong, assistant director, Global China Hub
  • Jörn Fleck, senior director, Europe Center
  • James Batchik, associate director, Europe Center
  • Emma Nix, assistant director, Europe Center

The authors would also like to thank Jeff Fleischer, Daniel Malloy, Andrea Ratiu, and Kai Schnier for their editorial and digital assistance.

The project drew on the insights of numerous policymakers, experts, and scholars who participated in interviews and roundtables hosted by partner institutions, including the European Policy Centre in Brussels, the Institut Montaigne in Paris, the Equilibrium Institute in Budapest, the Institute for International Political Studies in Milan, and the Mercator Institute for China Studies in Berlin. Their contributions significantly informed the analysis presented here.

Related Content

New Atlanticist

Jul 21, 2025

What the EU and China want from the summit that neither seems to want

By Atlantic Council experts

European Commission leaders are headed to Beijing for a one-day summit to discuss a range of issues. But expectations for a breakthrough are low and falling.

China European Union

Explore the program

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

The post Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy appeared first on Atlantic Council.

]]>
Poland’s policy on China: From partnership to skepticism https://www.atlanticcouncil.org/in-depth-research-reports/report/polands-policy-on-china-from-partnership-to-skepticism/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=883361 Despite its traditionally transatlantic orientation, Poland pursued an engagement policy toward China until the late 2010s. However, unmet economic promises and Beijing’s alignment with Moscow following Russia’s invasion of Ukraine shifted Warsaw’s view of China from economic partner to systemic challenger.

The post Poland’s policy on China: From partnership to skepticism appeared first on Atlantic Council.

]]>
This is the eighth chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy.Read the full report here.

Poland has traditionally anchored its foreign policy in the transatlantic alliance, yet since the early 2000s, it also sought to expand economic engagement with China. By the late 2010s, however, Warsaw recognized that this approach had yielded few tangible returns. Polish exports gained little market access, and Chinese investment remained limited. From 2019 onward, Polish policy gradually hardened, aligning with the European Union’s (EU) own shift toward a hawkish stance on China. Russia’s full-scale invasion of Ukraine and Beijing’s support for Moscow further accelerated Poland’s reassessment, reinforcing its alignment with the United States while exposing the absence of a coherent China strategy. President Andrzej Duda continued to advocate for selective economic cooperation with Beijing, albeit with limited results. Meanwhile, Warsaw’s application of investment-screening mechanisms and its response to US efforts to exclude Huawei and other Chinese firms from 5G networks remained cautious. At the EU level, Poland opposed the Comprehensive Agreement on Investment (CAI) and endorsed the Union’s emerging economic-security and “de-risking” agenda.

During the Cold War, as a Soviet bloc country, Poland’s ties with China fluctuated according to Sino-Soviet relations. Poland recognized the People’s Republic of China (PRC) shortly after its founding in October 1949, and diplomatic relations were established. Chinese Premier Zhou Enlai visited Poland twice, and several Polish leaders paid visits to China in the 1950s, signaling friendly relations. Following the Sino-Soviet split in the 1960s, the relationship between Poland and China significantly cooled. In the 1980s, however, Polish-Chinese ties were revived: Polish President and Communist Party leader Wojciech Jaruzelski visited Beijing in 1986, and China’s Premier and General Secretary of the Chinese Communist Party (CCP) Zhao Ziyang reciprocated with a visit to Poland the following year. As with other former Soviet bloc countries that were now shaping their own external relations after decades of Soviet control, Poland turned its foreign policy toward Euro-Atlantic partners as well as EU and NATO membership. Consequently, its relationship with China remained limited and largely inactive during the first post-Cold War decade.

Poland’s relations with China intensified significantly in the early 2000s. At the time, the country saw great economic opportunity in closer ties with Beijing and followed an engagement strategy pursued by most North American and European countries after the Cold War. During Hu Jintao’s state visit to Poland in 2004, the two countries signed an agreement to establish “a friendly and cooperative partnership,” a formal designation emphasizing economic cooperation. In 2011, China upgraded its ties with Poland to a “strategic partnership,” reflecting Poland’s broader political and economic significance.1 In 2012, Poland became a founding member of the Cooperation between China and Central and Eastern European Countries (initially the “14+1”, later the “16+1” format).

Throughout most of the 2010s, Polish policy on China remained cooperative. As a result of its earlier engagement posture, Poland continued to view Beijing primarily as an economic partner, avoiding confrontation and prioritizing opportunities for trade and investment. For the same reason, Poland largely stayed out of EU-level debates on China, focusing instead on bilateral engagement.

However, Poland’s policy toward China began shifting in 2019, driven by three factors: intensifying US-China strategic competition, Russia’s war on Ukraine (backed by China), and China’s growing economic challenge to the EU. These developments pushed Poland to adopt a firmer stance and align with the EU’s increasingly assertive China policy. After 2019, leaders of the two countries did not conduct mutual visits for several years, exchanging only phone calls and occasional meetings on the margins of international gatherings. By the end of the COVID-19 pandemic, the relationship had deteriorated further, as China’s pandemic policies, diverging interests, and trade imbalances effectively froze progress.2

Russia’s invasion of Ukraine in February 2022 made matters worse, pushing the bilateral relationship into crisis. As Poland focused on responding to Russia’s aggression, China’s support for Moscow deepened Warsaw’s mistrust. Even after the 2023 elections, in which the centrist Civic Coalition (KO) defeated the conservative-populist Law and Justice Party (PiS), Poland’s wariness of Beijing remained unchanged.

Still, Poland did not sever its economic ties with China. Instead, during the period of political cohabitation between 2023 and 2025, it adopted a dual-track approach: Donald Tusk’s KO-led government emphasized economic and national-security resilience, while President Duda of PiS pursued continued diplomatic and trade engagement. While this division of labor highlighted the lack of a coherent, unified China strategy, it also signaled that Polish leaders were increasingly recognizing that the country’s engagement approach had not yielded the results they had hoped for. Polish markets had not expanded, and the risks to both domestic companies and the broader EU economy had increased. Consequently, Poland began actively contributing to EU policy on China, supporting the European Commission’s tougher approach and its “de-risking” strategy.3

As of 2025, while the Tusk government’s commitment to balancing and de-risking is clear, the position of Poland’s new President Karol Nawrocki (PiS) remains uncertain. Nawrocki’s foreign policy combines transatlanticism, Euroskepticism, and a sovereignty-first approach. His alignment with US President Donald Trump and the MAGA movement may further complicate his China policy, given that the second Trump administration has not yet settled on a consistent strategy, oscillating between engagement and balancing. Nevertheless, his September 2025 meeting with Chinese Foreign Minister Wang Yi suggests he may preserve elements of Duda’s engagement approach.4

Trade and investment: Lost illusions

Successive Polish governments, regardless of their ideological leanings, have pursued a cooperative strategy toward China in hopes of gaining economic benefits. Yet Poland remains one of the EU countries least dependent on China for trade and investment. Exports to China account for just 0.57 percent of gross domestic product and 1.03 percent of total exports.5 Still, Warsaw is Beijing’s top trading partner in Central and Eastern Europe, while Beijing ranks as Warsaw’s second-largest trading partner in the region, after Germany. The relationship, however, is highly imbalanced. In 2024, China exported €34.3 billion in goods to Poland, while Poland exported only €3.3 billion to China—creating a nearly €31 billion trade deficit. This was the EU’s largest deficit with China after the Netherlands and Italy, and the tenth largest globally. Poland’s exports to China are concentrated in copper, electronic equipment, optical instruments, machinery, vehicles, wood, charcoal, and nuclear reactors and boilers.6

Agriculture has been one of the sectors most eager for closer ties with China, hoping to secure access to the Chinese market. However, Polish agriculture has struggled to benefit from the China trade relationship. To make matters worse, Beijing’s new food security law, adopted in mid-2024, further complicated conditions for Polish producers.7

Chinese investment in Poland has remained modest, totaling only €2.5 billion between 2000 and 2024.8 Nonetheless, Warsaw has increasingly come to recognize that Chinese investments are a potential vulnerability. Poland was among the first EU countries to join the Belt and Road Initiative (BRI), and its strategic role in the initiative is underscored by the fact that nine out of ten China-Europe Railway Express trains either transit through Poland or terminate there.9 Over the past two decades, Poland has sought to develop its own economic security toolkit. It adopted the Act on Competition and Consumer Protection in 2007, the Act on the Control of Certain Investments in 2015, and the Polish Competition Authority’s foreign investment screening mechanism in 2020. Implementation, however, has lagged. In 2017, the Polish Competition Authority approved the planned acquisition of Konsalnet, a leading Polish security firm, by China Security & Fire—only for the Beijing headquarters to halt the deal due to the company’s financial troubles. In 2021, the Polish regulator also investigated Changjiu Logistics’ investment in transportation company Adampol S.A, but found no violations, allowing the transaction to proceed. Although both investments involved potential risks to Poland’s national and economic security, the responses by the authorities and the public were limited, suggesting significant gaps in the country’s ability to manage such risks.10

Technology: De-risking in telecommunications

Poland’s stance on China in technological matters has also shifted considerably over the years. In telecommunications, Chinese companies Huawei and ZTE once played a prominent role in Poland’s economy. Between 2006 and 2019, Huawei helped build Poland’s 2G and 3G networks, leaving the telecommunications heavily reliant on Chinese technology and systems.11 However, such cooperation has unraveled in recent years.

In 2019, Poland arrested a high-level Chinese Huawei employee, charging him with espionage on behalf of China. The individual had worked with Huawei for eight years and previously served at the Chinese Consulate, and he was charged alongside a Polish man who had previously worked for Polish security services. The scandal placed Huawei and 5G on the agenda as potential vulnerabilities in Polish critical infrastructure. As the first Trump administration pressured allies to exclude Huawei from their 5G networks, this issue became central to negotiations between the United States and Poland. During Vice President Mike Pence’s visit to Poland in September 2019, the two countries signed an agreement on 5G cooperation, which established criteria for vetting telecom equipment suppliers based on security risks. In August 2020, they concluded the Enhanced Defense Cooperation Agreement, strengthening US-Polish defense cooperation and increasing US military presence in Poland—a development that would not have been possible without alignment on 5G.12

Guided by US initiatives and the EU’s 5G Toolbox, Poland decided to ban Huawei and ZTE from the country in 2020—a move that Huawei protested by sending a complaint to EU Competition Commissioner Margrethe Vestager.13 Despite the ban, Poland allowed the companies to maintain limited operations while diversifying its telecommunications market. In recent years, Warsaw has repeatedly considered legislation to phase out Huawei’s and ZTE’s equipment from its telecommunications sector, most recently in October 2024—and the Polish parliament ultimately adopted an amendment to the National Cybersecurity Certification Act, implementing the EU’s NIS2 Directive on the security of network and information systems.14 The amendment introduced a new certification system for telecommunications companies operating in critical sectors, potentially designating some firms as high-risk suppliers and requiring them to replace previously provided hardware or software.15

Security: The Ukraine war and hardening threat perceptions

In the security domain, Russia’s invasion of Ukraine, China’s support for Moscow, and intensifying US-China strategic competition have heavily influenced Poland’s approach to China. Poland’s steadfast support for Ukraine and its advocacy for transatlantic unity against Moscow have shaped both its Russia and China policies. Leaders from both major political camps have consistently urged China to help end the war and halt economic and military support for Vladimir Putin’s regime.

In 2023, Prime Minister Mateusz Morawiecki (PiS) highlighted Poland’s policy shift in a speech at the Atlantic Council. He warned that European countries incur “a huge geopolitical cost” when selling goods to China, and that China and Russia obtain Western technology to eventually use it against the West. He also urged allies and partners to support Ukraine to protect the status quo in Taiwan, asserting that “if Ukraine gets conquered, the next day, China can attack Taiwan.”16 Beijing immediately protested the prime minister’s statements.17

The current Civic Platform-led government has continued this approach. During Chinese Foreign Minister Wan Yi’s visit to Poland in September 2025, Foreign Minister Radosław Sikorski “called on China to step up diplomatic efforts to end the fighting in Ukraine” and “urged China to cease its exports of dual-use products to Moscow, including drones and navigation equipment.” Sikorski added, “without Beijing’s help, Russia’s economy would have collapsed by now.”18

Poland has also faced security concerns over Chinese involvement in its port infrastructure. A subsidiary of Hong Kong-based CK Hutchison, Hutchison Port Holdings, had leased a terminal in Gdynia since 2007. By 2024, the lease raised alarms due to its proximity to a dock where the United States and NATO unload military aid for Ukraine. At parliament’s urging, the Polish government eventually designated Gdynia port as critical infrastructure and required reporting on its operations. In an unexpected turn, the national security issue surrounding the port has since moved toward resolution. Encouraged by Trump, the US investment fund BlackRock purchased a majority share in the ports operating in the Panama Canal from Hutchison, with the deal also including equity in other ports, such as Gdynia, potentially bringing them under US ownership. However, the deal is still in flux, both because China has refused to approve it and because the Panamanian government has asked the Supreme Court to annul Hutchison’s previous contract for procedural flaws.19

Overall, Poland’s position has become more consciously aligned with the United States, centered on robust defense cooperation, while pursuing a measured disengagement from China in response to Beijing’s continued support for Russia’s war effort.20

Poland’s alignment with the EU’s China policy

In the past six years, while China’s competitiveness has posed increasing challenges for the EU, Poland’s positions on China have hardened across key domains. During this period, Poland has increasingly recognized the interconnectedness of its bilateral and EU-level relations with China. Consequently, Polish governments of various ideological compositions have sought to participate more actively in EU policy debates, and Poland’s positions on EU China policy have evolved accordingly.

Poland has weighed in on the EU’s CAI with China. When the European Commission concluded negotiations with China on the agreement in December 2020, its failure to submit a draft to the Committee of Permanent Representatives—the body that prepares the Council of the EU’s work—prompted criticism from several member states, including Poland. To clarify Poland’s position, Foreign Minister Zbigniew Rau stated that the EU should pursue a mutually beneficial agreement with China and allow time to consult with the United States to find common ground on the CAI. Warsaw’s concerns included the deal’s implications for both Poland and the EU, as well as potential consequences for the United States. US National Security Advisor Jake Sullivan echoed this view, noting that “the Biden-Harris administration would welcome early consultations with our European partners on our common concerns about China’s economic practices.” Facing pressure from EU member states, the European Parliament, and the United States, the CAI eventually collapsed.21

In recent years, Poland has recognized that China’s economic and competitiveness challenges cannot be effectively addressed solely at the bilateral level. EU-level policy must be strengthened to protect the Polish economy from China’s unfair practices and coercion. Polish policymakers acknowledge that, while many EU member states continue to emphasize bilateral engagement with China, the scale of asymmetry makes it impractical for any single state to manage Beijing’s challenges alone—underscoring the increasing need for collective, EU-level responses.22 As a result, the Polish government supported the Commission’s adoption of the European Economic Security Strategy in 2023 and has consistently backed its de-risking measures. Poland also voted in favor of the Commission’s proposal for the EU to impose tariffs on Chinese electric vehicles under the Foreign Subsidies Instrument in March 2025, arguing that Chinese state subsidies distort fair competition and create vulnerabilities in strategic industries.

Conclusion

Despite its traditionally transatlantic orientation and firm opposition to Russia, Poland maintained an engagement policy toward China from the early post-Communist transition until the late 2010s. For much of this period, Warsaw viewed China primarily through an economic lens: policymakers and business groups anticipated that greater Chinese market access would boost Polish agricultural and industrial exports, while Chinese capital inflows were expected to support domestic investment. These expectations gradually eroded in the 2010s, as China failed to provide substantive trade concessions or investment opportunities. At the same time, Russia’s increasingly aggressive behavior heightened Poland’s sense of strategic vulnerability.

The combination of unmet economic promises and Beijing’s alignment with Moscow following Russia’s invasion of Ukraine reshaped elite perceptions of China, framing it as a systemic challenge rather than an economic opportunity. In response, Poland has undertaken a pronounced policy adjustment—supporting EU-level instruments under the Economic Security Strategy and developing domestic mechanisms to enhance resilience against China-related economic and strategic risks. Although partisan polarization continues to complicate consensus on China policy, Warsaw’s overall trajectory now reflects a deliberate and measured shift toward balancing and de-risking vis-à-vis Beijing.

About the author

Related content

Explore the programs

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    Helena Legarda, “From Marriage of Convenience to Strategic Partnership: China-Russia Relations and the Fight for Global Influence,” Mercator Institute for China Studies, August 24, 2021, https://merics.org/en/comment/marriage-convenience-strategic-partnership-china-russia-relations-and-fight-global; Lukas Fiala; “How Are We to Understand China’s International Partnerships?” China-Global South Project, April 21, 2023, https://chinaglobalsouth.com/analysis/how-are-we-to-understand-chinas-international-partnerships/; Jacob Mardell, “Building Partnerships with China ‘for a New Era,’” Royal United Services Institute, December 17, 2024, https://www.rusi.org/explore-our-research/publications/commentary/building-partnerships-china-new-era.
2    Marcin Przychodniak, “The Rough ‘Strategic Relationship’ Between Poland and China,” China Observers in Central and Eastern Europe, January 25, 2021, https://chinaobservers.eu/the-rough-strategic-relationship-between-poland-and-china.
3    “Poland’s Strategic Convergence with the United States and Managed Detachment from China,” Debug Lies News, July 19, 2025, https://debuglies.com/2025/07/19/polands-strategic-convergence-with-the-united-states-and-managed-detachment-from-china/; Alicja Bachulska, “Multi-Pole-Arity: How Poland Can Help Europe Think Big on China,” European Council on Foreign Relations, April 15, 2025, https://ecfr.eu/publication/multi-pole-arity-how-poland-can-help-europe-think-big-on-china; “Profiling European Countries’ Resilience towards China,” Mercator Institute for China Studies, October 31, 2024, https://merics.org/en/report/profiling-european-countries-resilience-towards-china.
4    Marcin Jerzewski, “Pragmatism Without Principles? Poland-China Relations under Karol Nawrocki’s Presidency,” China Observers in Central and Eastern Europe, June 10, 2025, https://chinaobservers.eu/pragmatism-without-principles-poland-china-relations-under-karol-nawrockis-presidency/; “Polish President Vows to Further Ties with China,” Xinhua News Agency, September 16, 2025, https://english.www.gov.cn/news/202509/16/content_WS68c8b355c6d00fa19f7a27b6.html.
5    Bachulska, “Multi-Pole-Arity.”
6    “China-EU—International Trade in Goods Statistics,” Eurostat, February 2025, https://ec.europa.eu/eurostat/statistics-explained/index.php?title=China-EU_-_international_trade_in_goods_stati; Konrad Rajca, “Poland External Relations Briefing: The State and Prospect of Polish-Chinese Relations,” China-CEE Institute, March 22, 2024, https://china-cee.eu/2024/03/22/poland-external-relations-briefing-the-state-and-prospect-of-polish-chinese-relations/; “China-Poland Bilateral Relations: Trade and Investment,” China Briefing, June 28, 2024, https://www.china-briefing.com/news/china-poland-bilateral-relations-trade-and-investment.
7    Bachulska, “Multi-Pole-Arity.”
8    Agatha Kratz, et al., “Dwindling Investments Become More Concentrated—Chinese FDI in Europe: 2023 Update,” Mercator Institute for China Studies and Rhodium Group, June 6, 2024, https://merics.org/en/report/dwindling-investments-become-more-concentrated-chinese-fdi-europe-2023-update.
9    Bachulska, “Multi-Pole-Arity.”
10    “Streamlining Foreign Investment and CFIUS Processes: What You Need to Know,” Clifford Chance, December 2023, https://www.cliffordchance.com/briefings/2022/04/streamlining-foreign-investment-and-cfius-processes–what-you-ne0.html; “Changjiu Logistics (603569.SH) to Buy 30-Pct Stake in Poland’s ADAMPOL S.A.,” Xinhua Silk Road, March 2, 2021, https://en.imsilkroad.com/p/320010.html; Bachulska, “Multi-Pole-Arity”; “China Security & Fire to Buy Konsalnet for up to 110 Mln Euros via Its Polish Unit,” Reuters, March 17, 2017, https://www.reuters.com/article/technology/china-security-fire-to-buy-konsalnet-for-up-to-110-mln-euros-via-its-polish-un-idUSL3N1GU3YO.
11    Bachulska, “Multi-Pole-Arity.”
12    Pawel Paszak, “Poland-China Relations in 2021: Current State and Prospects,” Warsaw Institute, January 29, 2021, https://warsawinstitute.org/poland-china-relations-2021-current-state-prospects; Bachulska, “Multi-Pole-Arity”; Christina Farr, “Huawei Fires an Employee in Poland, Following Charges of Espionage: Wall Street Journal,” CNBC, January 12, 2019, https://www.cnbc.com/2019/01/12/huawei-fires-an-employee-in-poland-following-charges-of-espionage.html; “The Clean Network,” US Department of State, last visited September 12, 2025, https://2017-2021.state.gov/the-clean-network; “Home,” Clean Network, Krach Institute for Tech Diplomacy, last visited September 19, 2025, https://techdiplomacy.org/tech-statecraft; Andrzej Dąbrowski, “The Clean Network Initiative as an Element of the U.S.-China Competition,” Polish Institute of International Affairs, October 18, 2019, https://pism.pl/publications/The_Clean_Network_Initiative__as_an_Element_of_the_USChina_Competition; “U.S.-Poland Joint Declaration on 5G,” White House.” September 5, 2019, https://trumpwhitehouse.archives.gov/briefings-statements/u-s-poland-joint-declaration-5g/; Jill Colvin, “US and Poland Sign Agreement to Cooperate on 5G Technology,” Associated Press, September 2, 2019, https://apnews.com/article/9a90e16d903947709998dd7a2dde8733; “New U.S.-Poland Enhanced Defense Cooperation Agreement Signed,” Ministry of National Defence, Republic of Poland, August 15, 2020, https://www.gov.pl/web/national-defence/new-us-poland-enhanced-defense-cooperation-agreement-signed.
13    Laurens Cerulus, “Huawei Challenges Legality of 5G Bans in Poland, Romania,” Politico, November 2, 2020, https://www.politico.eu/article/huawei-hints-at-legal-action-against-5g-bans-in-poland-romania.
14    Zoltán Kész, “Reducing Chinese Influence in the EU’s Telco: Poland Moves Ahead.” EU Tech Loop, October 14, 2024, https://eutechloop.com/reducing-chinese-influence-in-the-eus-telco-poland-moves-ahead/.
15    “New Polish Act on the National Cybersecurity Certification System and Its Key Assumptions,” Clifford Chance, August 5, 2025, https://www.cliffordchance.com/content/cliffordchance/briefings/2025/08/new-polish-act-on-the-national-cybersecurity-certification-syste.html; “Implementation of the Cybersecurity Directive (NIS2) in Poland,” Dentons, August 28, 2025, https://www.dentons.com/en/insights/newsletters/2025/august/8/powered-by-dentons/powered-by-dentons-august-2025/implementation-of-the-cybersecurity-directive-nis2-in-poland; “NIS2 Directive: Securing Network and Information Systems,” European Commission, December 2022, https://digital-strategy.ec.europa.eu/en/policies/nis2-directive.
16    Katherine Golden, “Poland’s Prime Minister: Western Europe Needs to Commit to Ukrainian Victory and Beware of China,” Atlantic Council, April 14, 2023, https://www.atlanticcouncil.org/blogs/new-atlanticist/polands-prime-minister-western-europe-needs-to-commit-to-ukrainian-victory-and-beware-of-china.
17    “China Accuses Poland of Meddling in Its Affairs after PM’s Taiwan Comments,” Reuters, April 14, 2023, https://www.reuters.com/world/china-accuses-poland-meddling-its-affairs-after-pms-taiwan-comments-2023-04-14/.
18    Natalia Ojewska, “Poland’s Sikorski Urges China to Help Secure Peace in Ukraine,” Bloomberg, April 23, 2025, https://www.bloomberg.com/news/articles/2025-04-23/poland-s-sikorski-urges-china-to-help-secure-peace-in-ukraine.
19    Jeremy Van der Haegen and Wojciech Kość, “Chinese Presence in a Polish Port Triggers Security Fears,” Politico, April 3, 2024, https://www.politico.eu/article/hong-kong-based-chinese-company-presence-polish-port-creates-security-worries-nato/; Elida Moreno, “CK Hutchison-Operated Panama Ports Could Be Taken over by State Partnerships, President Says,” Reuters, July 31, 2025, https://www.reuters.com/business/retail-consumer/ck-hutchison-operated-panama-ports-could-be-taken-over-by-state-partnerships-2025-07-31/; Arjun Neil Alim, Cheng Leng, and Chan Ho-Him, “Panama Ports Deal Will Not Close This Year, Warns CK Hutchison,” Financial Times, August 14, 2025, https://www.ft.com/content/8d5badf4-7b54-4094-8c26-ace5e9aca8f2.
20    “Poland’s Strategic Convergence with the United States and Managed Detachment from China.”
21    “Poland-China Relations in 2021”; Przychodniak, “The Rough ‘Strategic Relationship’ Between Poland and China”; Stuart Lau, “On Brink of China-EU Deal, Fresh Pressure Hits from US and Poland,” South China Morning Post, December 23, 2020, https://www.scmp.com/news/china/diplomacy/article/3115087/brink-china-eu-investment-deal-eleventh-hour-pressure-comes.
22    Bachulska, “Multi-Pole-Arity.”

The post Poland’s policy on China: From partnership to skepticism appeared first on Atlantic Council.

]]>
Convergence and divergence in US and EU policies on China https://www.atlanticcouncil.org/in-depth-research-reports/report/convergence-and-divergence-in-us-and-eu-policies-on-china/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=884104 Where have US and EU polices on China drifted apart—and where do they converge? Identifying areas of conflict and alignment can help decision-makers on both sides of the Atlantic develop strategies to strengthen cooperation and more effectively counter China’s political and economic influence.

The post Convergence and divergence in US and EU policies on China appeared first on Atlantic Council.

]]>
This is the thirteenth chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy.Read the full report here.

Table of contents

While the United States and Europe were largely aligned in their approach toward China during the late Cold War and early post-Cold War years, the European Union (EU) has fallen behind the US shift from engagement to balancing. Although its policy toward Beijing has evolved considerably since 2019—and especially since 2023—moving steadily toward a firmer stance on China, the EU’s adjustment has been slower and more incremental. At the same time, persistent frictions between Brussels and successive US administrations over issues such as trade policy and Ukraine have complicated coordination.

Meanwhile, China’s increasingly assertive behavior—including unfair trade practices, support for Russia’s war in Ukraine, coercion in the Indo-Pacific, and efforts to reshape the international order along authoritarian lines—highlights the growing need for transatlantic action. If Europe and the United States want to effectively counter Beijing’s political influence and economic expansion, they will need to cultivate common policy principles—particularly in key domains such as trade and investment, technology, and security. Mapping existing areas of policy divergence and convergence can help decision-makers on both sides of the Atlantic strengthen cooperation.

Trade and investment

Technology

Security

About the author

Related Content

Explore the programs

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

The post Convergence and divergence in US and EU policies on China appeared first on Atlantic Council.

]]>
Lithuania’s policy on China: An unlikely EU trailblazer https://www.atlanticcouncil.org/in-depth-research-reports/report/lithuanias-policy-on-china-an-unlikely-eu-trailblazer/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=881558 Lithuania’s defiance of Chinese pressure has made it a policy innovator in the EU, showing how a small state can strengthen collective resilience. Its firm stance on Taiwan and push for European unity have anchored the EU’s shift toward de-risking and closer transatlantic coordination.

The post Lithuania’s policy on China: An unlikely EU trailblazer appeared first on Atlantic Council.

]]>
This is the tenth chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy.Read the full report here.

Lithuania, though a small EU member state, has played an outsized role in shaping the European Union’s (EU) approach to China. Over the past three decades, its relations with Beijing have shifted dramatically—from early economic engagement to growing skepticism toward Chinese involvement in Europe, as exemplified by the “16+1” format and the Belt and Road Initiative (BRI). This growing alienation culminated in a diplomatic confrontation in 2021, sparked by Vilnius’s decision to let Taiwan open a representative office in the country. China’s retaliatory economic coercion reverberated across Europe, galvanizing the EU to confront Beijing more directly and reassess its China policy.

Today, Lithuania ranks among the most China-skeptical EU member states, viewing Beijing as a systemic rival and aligning with the US administration and Brussels in resisting its political influence and economic pressure. By standing firm in its partnership with Taiwan amid a broad Chinese intimidation campaign, Vilnius has not only safeguarded its sovereignty but also catalyzed a broader EU policy shift on China—turning its stance into a test of European resilience. In doing so, Lithuania drew on its experience countering another great power, Russia, from which it gradually disentangled itself after the collapse of the Soviet Union and again following Moscow’s annexation of Crimea in 2014. This enabled Vilnius to manage China’s coercion and deepen ties with like-minded partners in the Indo-Pacific, such as Japan and Australia.

Trade and investment: Vilnius sounds the alarm

Established in 1991, relations between Vilnius and Beijing were pragmatic, centered on trade and cultural exchange. In the early 2000s, Lithuania’s trade with China was negligible and imbalanced, with exports of $2 million versus $120 million in imports. As China’s presence in Europe grew and Lithuania integrated into EU supply chains, bilateral trade increased by 533 percent, from $122 million in 2001 to $760 million in 2023 (see Figure 1). In the aftermath of the 2008 global financial crisis, Lithuania viewed China as potential source of growth and investment, leading it to join the “16+1” initiative in 2012, a cooperation platform established by China that brought together Chinese Premier Wen Jiabao and leaders from sixteen Central and Eastern European (CEE) countries.1 Functioning also as a regional extension of Beijing’s Belt and Road Initiative (BRI), the “16+1” format allowed China to engage with CEE states outside the formal structures of the EU—a strategy that raised concerns in Brussels but was welcomed by participating governments as a potential avenue for economic opportunity.

Yet trade relations revealed persistent asymmetry. Between 2012 and 2024, China’s trade with CEE states grew from $64 billion to $167 billion, but deficits widened from $46 billion to $135 billion.2 The bulk of trade was concentrated in Poland, the Czech Republic, and Hungary, accounting collectively for nearly 70 percent of total exchanges—$113 billion in 2024. Lithuania’s share remained marginal, at $2.26 billion in 2024 (1.35 percent of total trade), with a $1.82 billion trade deficit. Similarly, Chinese foreign direct investment (FDI) in Lithuania remained minimal, totaling less than $100 million since the early 2000s.3 The promised benefits of the “16+1” format—and later the “17+1” format, after Greece joined in 2019—never materialized. Instead, Vilnius increasingly viewed the platform as a vehicle for Chinese influence and a means to fragment EU unity.

In May 2021, Lithuania became the first EU member to withdraw from the “17+1” platform on the grounds of limited economic benefits and mounting political concerns. Vilnius called the initiative “divisive” and advocated for a “27+1” approach, in which all EU members engage with China collectively. The decision coincided with the European Parliament’s vote to freeze ratification on the EU-China Comprehensive Agreement on Investment. Later that year, in November 2021, the opening of a Taiwanese representative office in Vilnius4—the first in Europe to use “Taiwanese” rather than “Taipei” in its name—triggered a major diplomatic rupture. Beijing interpreted the decision as a direct offence, recalled its ambassador, and pressured Lithuania to do the same, although Vilnius and the EU emphasized that the step did not violate the “One China” policy.5 In December 2021, all Lithuanian embassy staff left Beijing after their diplomatic status was revoked—a move that many media outlets described as an “evacuation,” raising concerns over possible violations of both the Vienna Convention and Lithuanian law.6

In addition, Beijing retaliated with informal trade restrictions, blocking Lithuanian goods, halting freight trains, and targeting EU supply chains that included Lithuanian components.7 Although Lithuania’s direct exposure was limited—less than 1 percent of its exports and 4 percent of its imports—Beijing’s coercion had broader implications. It demonstrated how China can weaponize even modest economic ties for political leverage and exposed vulnerabilities across the EU, fueling debates about economic security. In response, Brussels launched a World Trade Organization (WTO) case and advanced the Anti-Coercion Instrument (ACI) to deter politically motivated trade measures, signaling a more assertive EU stance in defending sovereignty and reinforcing credibility.8 The ACI entered into force in December 2023 but has not yet been used.9

The United States stepped in, expressing strong support for Lithuania in the face of political pressure and economic coercion from China,10 extending a $600 million export credit through the US Export-Import Bank to boost trade in high-tech, services, and renewable energy.11 Transatlantic solidarity was reinforced in a joint-statement by thirteen foreign affairs committee chairs from eleven European legislatures, backed by the US Senate, condemning China’s pressure. The Biden administration also dispatched a special eight-person State Department team, informally known as “the firm,” to help Lithuania diversify markets and mitigate supply chain disruptions.12 These efforts enabled Lithuania to reorient its trade, with exports to the Indo-Pacific rising 60 percent in early 2022—effectively quadrupling the value of its former exports to China.

The crisis also marked Lithuania’s exit from China’s BRI, with rail services discontinued and proposals regarding Chinese investment into the Klaipėda port rejected by Lithuanian leaders on security grounds.13 Ultimately, Lithuania’s experience highlighted the risks of dependency and underscored a broader European shift: from viewing China as an economic partner to framing it as a systemic rival, testing the EU’s unity and resilience.

Technology: Phasing out Huawei

In 2018, Lithuania aligned with security concerns raised by the first Trump administration and restricted Huawei’s involvement in its 5G network development, especially in militarily sensitive installations, becoming one of the first EU member states to heed US warnings.14 This stance was formalized in September 2020 through a memorandum of understanding with the United States on secure 5G network development,15 after which Vilnius began phasing out Huawei equipment as a matter of national security and allied sovereignty. This positioned Lithuania as a frontrunner within the EU in taking concrete policy measures and implementing restrictions on Chinese technology. In late 2020, Telia Lietuva, the country’s largest telecom operator, announced it would replace Huawei 4G equipment with Ericsson equipment for its 5G rollout.16 Huawei was also excluded from military-sensitive infrastructure. By July 2025, the company’s market share in Lithuania had fallen to just 2.47 percent of the mobile vendor market—exceptionally low compared with its share in other European countries.17

Security: Beijing and Moscow are testing Baltic resolve

Lithuania’s security relationship with China has been marked by mistrust, shaped by Vilnius’s alignment with the West and particularly US security concerns over Beijing’s assertive behavior. In 2019, Lithuania became one of the first states to identify China as a national security threat in its National Threat Assessment, citing espionage and political interference alongside risks tied to technological dependence. The assessment highlighted that these risks extended beyond traditional issues such as Taiwan and human rights and included Chinese interference in Lithuania’s political landscape. That same year, Vilnius also embraced the EU’s framing of China as a “systemic rival.”

These concerns led to a series of restrictive measures bridging national and economic security: excluding Huawei and other Chinese firms from 5G networks, tightening scrutiny of Chinese investment in critical infrastructure, and banning Chinese remote access to renewable energy systems.18 Lithuania had already adopted its own FDI screening mechanism in 2018, two years before an EU framework was introduced.19 In 2024, the legislation was expanded to include cybersecurity. Today, Lithuania’s regulatory framework remains among the strictest in Europe, prioritizing national security alongside commercial considerations and reflecting Vilnius’s acute sensitivity to external influence and geopolitical vulnerabilities.

On this basis, Lithuania withdrew from the “17+1” initiative in 2021 and co-signed, with thirteen other countries, a joint EU statement criticizing China’s conduct during the COVID-19 pandemic, questioning the transparency of the World Health Organization’s investigation into the origins of the virus. Vilnius also supported Taiwan’s observer status at the World Health Assembly20—and the Lithuanian parliament adopted a resolution condemning China for the genocide against Uyghur Muslims in Xinjiang. Beijing retaliated with trade restrictions, including suspending Lithuanian wheat imports.21 That same year, the government authorized the opening of a Taiwanese representative office in Vilnius, prompting sweeping Chinese coercion and further embedding Lithuania’s security-driven, values-based foreign policy within a transatlantic framework.

Russia’s 2022 full-scale invasion of Ukraine deepened these concerns, as Vilnius viewed the Sino-Russian “no limits” partnership as tacit support for Moscow’s aggression and a direct threat to NATO’s eastern flank. Lithuania increasingly framed China as an enabler of Russian aggression, underscoring the need for coordinated transatlantic policies.22 Beijing, in turn, depicted Lithuania as a US puppet and “the most anti-Russia country in Europe,”23 rhetoric used to justify countermeasures.24 Tensions escalated further in April 2023 when China’s ambassador to France questioned the sovereignty of the Baltic states, claiming that countries which emerged after the Soviet Union’s collapse “do not have effective status under international law,” provoking strong EU backlash.25

Within the broader US-China strategic rivalry, Lithuania has firmly aligned with the United States, reinforcing its credibility within NATO and the EU while leveraging the dispute to deepen cooperation with the US administration on economic security. Importantly, Lithuania’s tougher stance on China predates the center-right government of former Prime Minister Ingrida Šimonytė (2020-2024). In fact, the initial shift toward a more defiant posture began in 2013 when President Dalia Grybauskaitė met with the Dalai Lama, prompting punitive actions from Beijing, and continued under Saulius Skvernelis’s center-left government (2016-2020). Today, Prime Minister Gintautas Paluckas signals cautious diplomacy with China while maintaining firm commitments to security and democratic standards.26

Lithuania’s alignment with the EU’s China policy

Lithuania aligns closely with both the EU and the United States in framing China as a “systemic rival” and a “coercive power.” Standing firm on Taiwan and refusing to yield to economic pressure, it has emerged as a leading voice for a tougher and more coordinated China approach—and as a frontrunner in shaping the EU’s collective response, pushing for de-risking measures and the adoption of anti-coercion legislation. Its confrontation with China not only strengthened ties with the United States, where its principled stance drew political and economic support, but also reverberated across the EU. Beijing’s coercion against Lithuania exposed vulnerabilities even among member states with minimal ties to China, accelerating Brussels’ shift toward de-risking, supply chain diversification, and greater collective resilience.

The Lithuanian case became a test of EU unity at a pivotal moment for European security. Brussels condemned Beijing’s sanctions, backed Vilnius through WTO proceedings, and fast-tracked the adoption of the ACI—an instrument that had already been in development during the first Trump administration—sending a clear signal that no member state, however small, would face external pressure alone and reinforcing the EU’s credibility as a collective geopolitical actor.

Although relations with Beijing remain strained, Vilnius continues to champion Taiwan’s international participation and to push EU initiatives on economic security. For Lithuania, its China policy is now defined less by trade considerations and more by the imperatives of European unity and transatlantic coordination. What began as a bilateral dispute has evolved into a catalyst for stronger EU cohesion, turning Lithuania from an outlier into a trailblazer in Europe’s evolving approach to China.

Conclusion

Lithuania’s case provides a litmus test of whether a small liberal democracy can withstand Chinese economic coercion, with its dispute with Beijing reverberating throughout the EU-China relationship. By elevating the Taiwan issue and pushing Beijing higher on the EU agenda, Vilnius has accelerated Brussels’ shift from a trade-centered engagement to a more defensive posture, including the adoption of new anti-coercion instruments. Its experience reflects broader European concerns over dependence on China—from Huawei involvement to BRI projects to Chinese investment—and has prompted a wider reassessment of China as a systemic rival. In the process, Lithuania has positioned itself as both an early adopter of US security priorities and a policy influencer within the EU, amplifying transatlantic coordination at moments when larger member states hesitated.

As one of the EU’s most uncompromising voices on China, Vilnius has framed the challenge from Beijing alongside the threat from Moscow, presenting both as pillars of an authoritarian bloc. Lithuania’s alignment with the United States and the broader transatlantic community draws on its historical experience with authoritarian coercion and its acute sense of vulnerability. Politically, Vilnius casts itself as a values-driven actor. While the United States identifies China as its top security adversary, and Brussels seeks a more calibrated balance, Lithuania has helped bridge the gap by advancing US priorities within the EU, serving simultaneously as a driver of transatlantic coordination and as a moral compass in Europe’s evolving China debate.

About the authors

Related Content

Explore the programs

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    Valbona Zeneli, “What Has China Accomplished in Central and Eastern Europe?” Diplomat, November 25, 2017, https://thediplomat.com/2017/11/what-has-china-accomplished-in-central-and-eastern-europe/.
2    Calculation of the author based on Trading Economics data.
3    Agatha Kratz, et al., “Chinese Investment Rebounds Despite Growing Frictions—Chinese FDI in Europe: 2024 Update,” Mercator Institute for China Studies and Rhodium Group, May 21, 2025, https://merics.org/en/report/chinese-investment-rebounds-despite-growing-frictions-chinese-fdi-europe-2024-update.
4    “Taiwan Opens Office in Lithuania, Brushing Aside China Opposition,” Reuters, November 18, 2021, https://www.reuters.com/world/china/taiwan-opens-office-lithuania-brushing-aside-china-opposition-2021-11-18/.
5    John Feng, “‘Crazy, Tiny Country’: China Media Lashes out at Lithuania over Taiwan,” Newsweek, August 10, 2021, https://www.newsweek.com/crazy-tiny-country-china-media-lashes-out-lithuania-over-taiwan-embassy-1617921.
6    “Lithuania Evacuates its Embassy in China,” Economist, December 18, 2021, https://www.economist.com/china/lithuania-evacuates-its-embassy-in-china/21806843.
7    “WT/DS610—China: Measures Concerning Trade in Goods and Services,” European Commission, last visited October 9, 2025, https://policy.trade.ec.europa.eu/enforcement-and-protection/dispute-settlement/wto-dispute-settlement/wto-disputes-cases-involving-eu/wtds610-china-measures-concerning-trade-goods-and-services_en.
8    The anti-coercion instrument is a set of countermeasures agreed by the European Commission, national governments, and European Parliament in order to retaliate against third countries imposing economic pressure on EU member states.
9    “Protecting Against Coercion,” European Commission, last visited October 9, 2025, https://policy.trade.ec.europa.eu/enforcement-and-protection/protecting-against-coercion_en.
10    “Senior U.S. Official to Visit Lithuania in Show of Support over Chinese ‘Coercion,’” Reuters, January 28, 2022, https://www.reuters.com/world/senior-us-official-visit-lithuania-show-support-over-chinese-coercion-2022-01-29/.
11    “EXIM Delegation Meets with Lithuania’s Ministry of Economy and Innovation,” Export-Import Bank of the United States, press release, January 31, 2022, https://www.exim.gov/news/exim-delegation-meets-lithuanias-ministry-economy-and-innovation.
12    Didi Tang, “China Has Threatened Trade With Some Countries After Feuds. They’re Calling ‘The Firm’ for Help.” Associated Press, May 27, 2024. https://apnews.com/article/china-trade-economic-firm-state-department-42655e067386a20b22f1317ce298f334.
13    Justas Karčiauskas, “Lithuania External Relations Briefing: Growing Geopolitical Rift Between China and the EU,” China-CEE Institute, November 2023, https://china-cee.eu/wp-content/uploads/2023/12/2023er11_Lithuania.pdf.
14    Ivana Karásková, et al., “Huawei in Central and Eastern Europe: Trends and Forecast,” Association for International Affairs, January 2021, https://chinaobservers.eu/wp-content/uploads/2021/01/briefing-paper_huawei_A4_03_web-1.pdf.
15    “United States-Republic of Lithuania Memorandum of Understanding on 5G Security,” US Department of State, press release, September 17, 2020, https://2017-2021.state.gov/united-states-republic-of-lithuania-memorandum-of-understanding-on-5g-security/.
16    “Telia to Remove All Huawei Equipment in Lithuania,” Reuters, November 30, 2020, https://www.reuters.com/article/business/telia-to-remove-all-huawei-equipment-in-lithuania-idUSKBN28A1KZ/.
17    “Mobile Vendor Market Share in Lithuania—July 2025,” StatCounter GlobalStats, last visited October 9, 2025, https://gs.statcounter.com/vendor-market-share/mobile/lithuania.
18    Patrick Jowett, “Lithuania Bans Chinese Remote Access to Energy Storage, Solar, Wind Devices,” ESS News, November 20, 2024, https://www.ess-news.com/2024/11/20/lithuania-bans-chinese-remote-access-to-energy-storage-solar-wind-devices/.
19    “Lithuania: FDI Screening: Situation and Tendencies,” BNT Attorneys in CEE, September 18, 2024, https://bnt.eu/news-and-events/lithuania-fdi-screening-situation-and-tendencies/.
20    Eunika Rejtová, “Chinese Media Watch: How ‘Crazy, Tiny’ Lithuania Enraged Beijing,” Central European Institute of Asian Studies, August 29, 2021, https://ceias.eu/chinese-media-watch-how-crazy-tiny-lithuania-enraged-beijing/.
21    Konstantinas Andrijauskas, “The Sino-Lithuanian Crisis: Going Beyond the Taiwanese Representative Office Issue,” Institut Français des Relations Internationales, March 8, 2022, https://www.ifri.org/en/memos/sino-lithuanian-crisis-going-beyond-taiwanese-representative-office-issue.
22    Denis Kishinevsky, “Why Little Lithuania Is Taking On Mighty China,” Carnegie Endowment for International Peace, November 29, 2021, https://carnegieendowment.org/posts/2021/11/why-little-lithuania-is-taking-on-mighty-china?lang=en.
23    Ieva Zvinakyte, “Cannon Fodder and ‘US Puppets: What Is Chinese Propaganda Saying about Lithuania?” LRT English, December 14, 2022, https://www.lrt.lt/en/news-in-english/19/1589153/cannon-fodder-and-us-puppets-what-is-chinese-propaganda-saying-about-lithuani.
24    “China, Russia Can Cooperate to Punish Lithuania,” Global Times, August 11, 2021, https://www.globaltimes.cn/page/202108/1231251.shtml.
25    “Chinese Envoy to France’s Remarks on Ex Soviet States Provoke Outrage in Europe,” Le Monde, April 24, 2023, https://www.lemonde.fr/en/international/article/2023/04/24/chinese-ambassador-s-remarks-on-crimea-provoke-outrage-in-europe_6024027_4.html.
26    “If China Has Plans in EU, It’ll Be Interested in Having Relations with Lithuania Too—PM,” Baltic Times, April 15, 2025, https://www.baltictimes.com/if_china_has_plans_in_eu__it_ll_be_interested_in_having_relations_with_lithuania_too_-_pm/.

The post Lithuania’s policy on China: An unlikely EU trailblazer appeared first on Atlantic Council.

]]>
How Europe deals with China in trade, technology, and security https://www.atlanticcouncil.org/in-depth-research-reports/report/how-europe-deals-with-china-in-trade-technology-and-security/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=884162 The EU’s approach to China is increasingly converging around “de-risking,” though progress remains uneven. While powerful member states set the overall direction, smaller ones drive change—and outliers slow collective action. Whether the EU can turn this patchwork into a unified strategy will define its China policy in the years ahead.

The post How Europe deals with China in trade, technology, and security appeared first on Atlantic Council.

]]>
This is the twelfth chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy.Read the full report here.

After several decades of trying to build a cooperative trade and political relationship with China, the EU came to recognize that this engagement strategy delivered limited economic gains while creating political tensions that ran counter to its own values and objectives. By 2019, optimism had given way to a new perception of China as partner, competitor, and systemic rival. This threefold framing—contradictory in theory but politically useful in practice—created enough ambiguity and common ground to allow maneuvering among member states with divergent priorities. At the same time, it provided a platform for a broader debate about Europe’s China policy.

Countries such as Greece, Italy, Portugal, and Hungary, which received significant Chinese investment in the aftermath of the Eurozone crisis, were able to proceed cautiously, avoiding confrontational language that could have had negative economic consequences. By contrast, northern and Baltic states favored a tougher approach, emphasizing the systemic-rival framing. France and Germany were internally divided but ultimately supported the EU policy, with France leaning toward a tougher line on trade and sovereignty and Germany under Chancellor Angela Merkel continuing to prioritize engagement. The European Council’s delayed endorsement of the triptych of cooperation, economic competition, and systemic rivalry in June 2023—four years after the European Commission had introduced this framing—highlighted Europe’s initial reluctance to acknowledge problems in EU-China economic relations. Ultimately, however, member states paved the way for gradual convergence on a common China policy.1 By 2023, the EU recognized that the risks of engaging with China had begun to outweigh the benefits.

Because the EU is not a unitary actor, its China policy reflects the diverse relationships, preferences, vulnerabilities, and strategic cultures of its member states. Case studies of Germany, France, Italy, Greece, Hungary, Poland, Lithuania, and the Czech Republic underscore the complexity of EU-China relations and demonstrate how national trajectories shape or constrain Brussels’ evolving China strategy. France and Germany serve as the EU’s strategic anchors, with Paris emphasizing sovereignty and resilience and Berlin shifting from economic primacy toward a more strategic-industrial approach. Italy and Greece exemplify cautious strategic recalibration: once open to Chinese investment and the Belt and Road Initiative (BRI), both now cautiously align with Brussels while preserving economic ties with Beijing. Meanwhile, Poland has moved from economic pragmatism to security awareness as limited trade benefits and Beijing’s alignment with Moscow eroded earlier optimism; the Czech Republic maintains a values-based approach, combining minimal trade exposure with one of the EU’s strictest investment-screening regimes; and Lithuania has emerged as a catalyst, translating bilateral confrontation into EU-wide resilience and transatlantic coordination. Hungary, by contrast, continues to act as a spoiler, deepening ties with Beijing and using its veto power to undermine EU unity.

Trade and investment: Between open markets and strategic control

Although trade and investment form the backbone of Europe’s relationship with China, they are also a principal source of friction. At the EU level, the tendency to favor “de-risking, not decoupling” may be too soft an approach to secure desirable trade flows while reducing strategic dependencies. Although this approach has spurred the rollout of the EU’s investment-screening mechanism, initiated anti-subsidy investigations into Chinese electric vehicles (EVs) and solar panels, and resulted in the freezing of the Comprehensive Agreement on Investment, it remains unclear whether these measures will suffice to counter Chinese influence.

Germany has historically been the most influential actor in shaping the EU’s China policy, especially in trade, and its globalization-driven economy—long tied to China in automobiles, machinery, and chemicals—faced the highest potential gains and risks. Under Chancellor Friedrich Merz, Berlin has abandoned partnership language and aligned more closely with Brussels’ emphasis on rivalry and critical-infrastructure protection. However, divisions within the German business sector continue to complicate policy coherence, and Merz has yet to demonstrate through action his intent to advance the EU’s agenda. Meanwhile, France has consistently pushed for stronger EU trade defenses and long advocated an assertive industrial policy to counter China’s overcapacity. Under President Emmanuel Macron, Paris pressed the European Commission to launch anti-dumping investigations into Chinese EVs in 2023.

Italy’s China stance has shifted from opportunistic engagement to closer EU alignment. Its decision to join the BRI in 2019 was emblematic of its short-term, partisan-driven policymaking aimed at quick economic gains. By December 2023, however, Rome withdrew from the BRI and strengthened its “golden power” rules, signaling broad skepticism toward China and Prime Minister Giorgia Meloni’s commitment to transatlantic cooperation—while still seeking to preserve economic opportunities. Similarly, Greece’s trajectory is one of gradual adjustment. In the aftermath of its debt crisis, Athens relied heavily on Chinese capital, most prominently through China COSCO Shipping Corporation Limited’s ownership of the port of Piraeus. Since 2020, diversification of foreign direct investment (FDI) and pressure from the EU and the United States have tempered Athens’ dependence on Beijing. Greece’s adoption of the EU’s FDI-screening mechanism, combined with its abstention from EU tariffs on Chinese EVs in October 2024, illustrates its hedging strategy.

Lithuania presents a strikingly different case. With little bilateral trade at stake, Vilnius has taken one of the EU’s toughest stances on China, portraying it as a coercive power and systemic rival. Its confrontation with Beijing over Taiwan in 2021 triggered Chinese retaliation but also accelerated Brussels’ adoption of the Anti-Coercion Instrument. Lithuania thus transformed a bilateral dispute into a catalyst for EU-wide resilience, reframing trade and investment policy as a question of collective security rather than purely economics.

For years, Poland prioritized economic ties with China over national security, even though—as elsewhere in Europe—trade and investment flows never fully materialized, leaving Warsaw with a significant trade deficit. However, China’s support for Russia’s war in Ukraine has eroded Warsaw’s desire for partnership. By 2020, Poland was ahead of the EU curve in creating an FDI-screening mechanism, though implementation has lagged. Meanwhile, the Czech Republic has maintained a values‑driven, security‑first approach to China. Rather than chasing short-term economic gains, Prague has developed one of the region’s most robust economic‑security frameworks, anchored by the 2021 Foreign Investment Screening Act.

Hungary stands alone in its defiance of EU norms, having consistently courted Chinese trade and investment while resisting EU restrictions. Prime Minister Viktor Orbán has denounced EU tariffs as an “economic cold war”—and Budapest’s willingness to openly align with Beijing has provided China with an important foothold within the EU.

Technology: Building resilience in the digital era

Technology has emerged as the sharpest arena of competition with China, encompassing 5G infrastructure, semiconductors, artificial intelligence, and dual-use goods. The EU response includes the 5G toolbox, tighter export controls, and coordination with the United States on technology governance, though the pace and scope of implementation vary widely across member states.

As in other sectors, Germany displays ambivalence toward China in technology. While its Foreign Trade and Payments Act—together with its implementing regulation, the Foreign Trade and Payments Ordinance—provides one of Europe’s strictest foreign-investment screening regimes, with a broad scope of sectors covered and low thresholds for review, implementation has at times lagged behind its rhetoric. Berlin was slow to curb Huawei and ZTE’s role in 5G networks, prioritizing industrial competitiveness and cost concerns. Only in July 2024 did the German government announce a full phase-out, aligning with EU and NATO partners. France, by contrast, has been the EU’s leading driver in technology policy, framing digital resilience as both an economic concern and a geopolitical imperative. Paris has consistently pressed for stronger protection of European innovation, critical infrastructure, and strategic industries, embedding technological sovereignty at the heart of Europe’s pursuit of strategic autonomy.

Similarly, Italy’s “golden power” rules have increasingly restricted Chinese participation in telecommunications and infrastructure. While Italian policy is often reactive, it has aligned more closely with Brussels on tech resilience. Greece, in turn, has moved toward the EU mainstream more gradually, even if its enforcement capacity remains weaker than in northern Europe. Athens noticeably shifted course in 2020, when its largest telecommunications operator chose Swedish multinational Ericsson over Huawei, signaling a symbolic alignment with Western preferences.

Hungary, in a pattern mirroring its approach on trade and investment, remains a holdout, deepening digital cooperation with Beijing by welcoming Huawei investment in direct contradiction to EU guidance. This divergence underscores Budapest’s role as a spoiler, slowing EU cohesion on technology. By contrast, Lithuania has taken a markedly different path, pushing for strong restrictions on Huawei and championing EU-level tech screening. Despite its small size, its alignment with US standards reflects its values-driven foreign policy and reinforces its role as a policy innovator.

Poland allowed Chinese companies a significant presence in its telecommunications sector until 2020. However, a series of events—including a Huawei employee’s arrest for espionage, US pressure, and the EU’s adoption of its 5G Toolbox—eventually pushed Warsaw to diversify the sector and reduce Huawei’s and ZTE’s activities to the bare minimum. Meanwhile, Czechia has pursued a proactive, risk-based approach to technology policy. Ahead of the introduction of the EU’s 5G Toolbox, the Czech National Cyber and Information Security Agency flagged Huawei and ZTE as high-risk actors, paving the way for sector diversification. Prague aligns with US efforts on 5G security and export controls and has deepened ties with Taiwan, Japan, and South Korea on semiconductors and advanced manufacturing, while curbing exposure to China-linked supply chains.

Security: Turning awareness into action

Security is the area in which China has most clearly been recast as a systemic rival, particularly since the announcement of its “no limits” partnership with Russia. Although China is officially defined as a systemic rival, few tangible measures have been adopted to operationalize this stance. The EU has tightened export controls, reinforced NATO coordination, and cautiously expanded its Indo-Pacific engagement. Member states’ responses again diverge, shaped by geography, threat perceptions, and alliance politics.

Germany’s security stance has evolved markedly. Under Merkel, Berlin downplayed concerns about Taiwan, the South China Sea, and Chinese alignment with Moscow. Under Olaf Scholz, it cautiously endorsed de-risking and adopted tougher rhetoric. Today, under Chancellor Friedrich Merz, Berlin has moved even further, dropping “partnership” language and framing China as part of an “axis of autocracies.” Still, economic dependence tempers full securitization. France, by contrast, has long promoted Europe’s role as a global security actor. It backs EU sanctions against Beijing for its support of Russia, deploys forces in the Indo-Pacific, and seeks partnerships with democracies in the region. Its approach fuses European sovereignty with transatlantic coordination, framing security in comprehensive geopolitical terms.

Italy’s posture is more cautious. NATO engagement has reinforced Rome’s limits on Chinese access to critical infrastructure, and the war in Ukraine has hardened its stance against Russia. Yet Italy avoids labeling China as a direct security threat, signaling solidarity in Indo-Pacific deployments without projecting power. Greece, in turn, interprets security primarily through a regional lens. Anchored in NATO and reliant on US guarantees amid tensions with Turkey, Athens avoids sharp rhetoric on China but complies with EU export controls and acknowledges risks in dual-use technologies. Here, resilience is understood more in economic than military terms.

Meanwhile, Hungary actively undermines EU security cohesion by blocking joint statements on Hong Kong, Xinjiang, and Taiwan, and by opposing broader de-risking. Its alignment with Beijing—especially during its 2024 presidency of the Council of the European Union—highlighted the risks of internal veto power in weakening collective security signaling. By contrast, Lithuania has been a catalyst for collective resilience. Its confrontation with China over the opening of a Taiwanese representative office in Vilnius, and Beijing’s ensuing de facto trade embargo, made Chinese coercion a European security issue. For Vilnius, China policy is inseparable from its existential confrontation with Russia, casting Beijing and Moscow as dual pillars of an authoritarian bloc.

The paramount and inescapable issue overriding all other issues is Russia’s war on Ukraine—and Beijing’s support for Moscow. While a shared concern of enormous gravity to all, it has had an acute effect on Central and Eastern European states, shifting their perspectives from an economics‑first toward a security-driven China policy. In Poland, this has meant tightening alignment with the United States, curtailing high‑exposure ties, and urging Beijing to end dual‑use exports that could aid Russia. Czechia, in turn, has taken a proactive stance, viewing China as a systemic challenge to European and transatlantic security. Taiwan remains central to Prague’s engagement in Asia, with cooperation in semiconductors and industry, while intelligence and public institutions consistently flag China as a source of foreign influence and espionage.

About the authors

Related Content

Explore the programs

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    “European Council Meeting (29 and 30 June 2023)—Conclusions,” European Council, June 30, 2023, https://data.consilium.europa.eu/doc/document/ST-7-2023-INIT/en/pdf.

The post How Europe deals with China in trade, technology, and security appeared first on Atlantic Council.

]]>
Greece’s policy on China: Debt-era deals and recalibration https://www.atlanticcouncil.org/in-depth-research-reports/report/greeces-policy-on-china-debt-era-deals-and-recalibration/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=881566 From the port of Piraeus to Brussels, Greece’s China policy has evolved from enthusiastic engagement and post-crisis dependency to strategic caution. Today, Athens's is balancing economic pragmatism with transatlantic security commitments.

The post Greece’s policy on China: Debt-era deals and recalibration appeared first on Atlantic Council.

]]>
This is the eleventh chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy.Read the full report here.

Over the last two decades, Greece’s policy toward China has shifted from enthusiastic optimism to a more cautious approach—a shift that reflects broader transatlantic and European Union (EU) dynamics. The bilateral relationship deepened significantly during Greece’s sovereign debt crisis, when economic pressures reshaped Athens’ foreign and fiscal policy priorities. The privatization programs, mandated under Greece’s bailout agreements and driven by the International Monetary Fund (IMF), paved the way for major Chinese investments—most prominently the 2016 takeover of the port of Piraeus by state-owned China Ocean Shipping Company Limited (COSCO). This flagship project of China’s Belt and Road Initiative (BRI) secured Beijing a key gateway into Europe.

Athens formally joined the BRI in 2018 and the China-led “17+1” framework in 2019, signaling a pragmatic alignment with Beijing that at times tempered Greece’s support for EU criticism of China on issues such as human rights. Following the signing of major maritime port concessions and the sale of additional corporate assets to Chinese firms, however, concerns grew in Athens and Brussels over the national security ramifications of these acquisitions. These worries—combined with shifting geopolitical dynamics—prompted Greece to recalibrate its policy and move into closer alignment with its EU and NATO partners.

Trade and investment: From Thucydides to the port of Piraeus

Greece first established diplomatic ties with the People’s Republic of China in 1972, shortly after China’s entry into the United Nations. In the 1980s, Athens deepened its relations with Beijing both to secure political backing amid tensions with Turkey and to expand economic cooperation, particularly in shipbuilding. Sino-Greek trade was modest in the early 2000s, totaling about $900 million in 2001, but expanded significantly in the following decades, particularly after the global financial crisis, reaching nearly $8 billion by 2024. This growth, however, has been marked by a widening imbalance: Greek exports fell from more than $1 billion in 2018 to just $450 million in 2024, while imports from China almost doubled—from $4.2 billion to $7.5 billion—driving the trade deficit past $7 billion.1

Greek exports to China account for roughly 0.9 percent of Greece’s total $53 billion in exports in 2024, consisting mainly of minerals, agricultural products, and pharmaceuticals.2 Chinese imports are far more diverse, dominated by machinery, electronics, and other manufactured goods. China is now Greece’s second-largest import partner, representing 8.5 percent of the country’s $90 billion in total imports.

On investment, Greece has become a key entry point for Chinese capital into Europe. Between 2000 and 2024, cumulative Chinese foreign direct investment (FDI) in Greece totaled about $5 billion, according to the Mercator Institute for China Studies,3 concentrated in infrastructure, energy, shipping, and telecommunications. Other estimates are considerably higher: the China Global Investment Tracker reports $9.7 billion in investment and construction contracts between 2005 and 2025, underscoring the scale of Beijing’s economic footprint in the country.4

The port of Piraeus,5 COSCO’s flagship BRI project with investments exceeding $600 million, has become a centerpiece of Chinese engagement in Europe, a main gateway for Chinese goods, and a symbol of Sino-Greek cooperation.6 This investment reflects both Greece’s economic vulnerabilities and China’s maritime ambitions under the BRI.

Piraeus has been strategically important since antiquity. Modernized in 1930 with the founding of the Piraeus Port Authority as a state-owned company and expanded in the 1970s, it has remained central to Greece’s maritime role. China’s involvement began in 2008, when COSCO secured a thirty-five-year contract to operate two piers, despite labor strikes and public opposition. Following Greece’s debt crisis, as the country implemented privatizations mandated under its bailout agreements, COSCO acquired 51 percent of the Piraeus Port Authority for $310 million, making the port the “dragon head” of China’s presence in Greece. COSCO expanded its stake to 67 percent in 2021 with an additional $95 million investment.7 With shipping times of about twenty-two days from Shanghai—roughly ten days shorter than routes to Rotterdam or Hamburg—Piraeus has become a strategic BRI hub. Its role is reinforced by Greece’s global shipping dominance: the Greek merchant fleet, the largest in the world, controls 21 percent of global and 60 percent of EU capacity, with nearly five thousand vessels valued at $70 billion. Greek shippers transport an estimated 60 percent of China’s exports.

COSCO’s investment has brought substantial gains. Container traffic rose from 1.5 million twenty-foot equivalent units in 2009 to 6.2 million in 2025, making Piraeus the largest container hub in the Mediterranean.8 Revenues grew from a $37 million loss in 2009 to more than $250 million in 2024, alongside job creation and local development.9 Yet COSCO’s ambitions have also met resistance. In 2022, Greece’s Supreme Administrative Court blocked a planned $4.5 billion passenger port project for failing environmental review, highlighting tensions between large-scale foreign investment, domestic regulation, and security concerns.10 This shift reflects Athens’ adoption of a more cautious approach toward Beijing in recent years and its alignment with US and EU efforts to screen Chinese strategic investment. In May 2025, the Greek government enacted its first structured FDI screening law (Law 5202/2025),11 modeled on Germany’s screening system and fully aligned with the corresponding EU regulation 2019/452.12

The BRI and the “17+1” format

Greece’s engagement with China deepened significantly in 2016, following Prime Minister Alexis Tsipras’ visit to Beijing. In the wake of his meeting with President Xi Jinping, Greece grew increasingly close to the BRI and the “16+1” cooperation format, a platform through which China engaged sixteen central and eastern European countries. Athens had already gained observer status in the “16+1” at the Riga Summit, alongside the EU, the European Bank for Reconstruction and Development, Austria, and Switzerland. In May 2017, Tsipras attended the inaugural Belt and Road Forum, signaling Athens’ ambitions to serve as a bridge between Europe and Asia.13 Two years later, in April 2019, Greece joined the initiative—by then rebranded as the “17+1”—at the Dubrovnik Summit.14

With regard to the BRI, Greece had already signed a memorandum of understanding in August 2018 during Foreign Minister Nikos Kotzias’s visit to Beijing, becoming the first developed European country to formally join. Athens stressed that cooperation would proceed “in full respect of EU rules and procedures,” framing the agreement as an instrument for growth rather than divergence.15 Italy and Luxembourg later followed with similar accords. High-level exchanges intensified in 2019. Tsipras visited Beijing again; President Prokopis Pavlopoulos attended the Conference on Dialogue of Asian Civilizations; and, in November, President Xi paid a state visit to Athens, marking the symbolic consolidation of Sino-Greek relations within the BRI framework.

Technology: Critical networks, critical choices

Over the past two decades, Chinese telecom giant Huawei has established a strong foothold in Greece’s telecommunications sector, supplying more than half of the country’s highly sensitive 4G radio access networks (RANs).16 This mirrors a broader European pattern, with Chinese vendors supplying over 50 percent of 4G RAN equipment in fifteen out of thirty-one countries.17 Huawei’s rise in Greece was closely tied to the 2008 global financial crisis, when its cost-competitive solutions enabled operators such as Wind Hellas to expand their network capacity. It later participated in early 5G pilot projects in Athens, Trikala, and Kalamata, though the Kalamata project—in partnership with Vodafone and Luxoft—was suspended after local opposition.18 Although Huawei’s consumer market share later plummeted—from 25 percent in 2017 to just 2.5 percent by 2025—due to sanctions, supply-chain disruptions, and shifting consumer preferences, it remains strategically embedded in Greece’s network infrastructure.19

Still, China’s broader tech footprint in Greece is relatively limited. This is partly because Greek regulators—in line with EU policy—have grown more cautious about Beijing’s involvement in critical technology infrastructure. While the Hellenic Police purchased twelve Chinese-made drones for border surveillance in 2020, subsequent tech cooperation has slowed.20 In February 2025, the Hellenic Data Protection Authority launched an investigation into the Chinese chatbot DeepSeek over potential privacy violations, reflecting broader European concerns about digital sovereignty.21

Although Athens initially hesitated to join the first Trump administration’s Clean Network Initiative—a US-led effort to exclude Chinese technology from 5G and other critical digital infrastructure—Greece formally became a member in June 2020, demonstrating a careful balance between economic pragmatism and geopolitical considerations.22 Cosmote, Greece’s largest mobile operator, opted for Ericsson over Huawei for its 5G rollout, and Chinese state-owned enterprises (SOEs) have since been excluded from public tenders—even as Huawei equipment continues to operate in parts of existing 4G networks.

Amid this shifting landscape, Huawei has sought to diversify its footprint in Greece. In partnership with the Greek energy company Faria Renewables, it is developing up to 1 GWh of battery storage, beginning with a 49.9 MW/134 MWh project awarded in the country’s second battery auction. The $30 million investment—financed by Attica Bank and backed by the EU’s “Greece 2.0” recovery plan—illustrates Huawei’s effort to align with EU-funded energy priorities while maintaining a presence in Greece’s green transition.23 In early 2025, the company also announced a logistics hub at the port of Piraeus, underscoring ambitions to expand supply-chain and digital infrastructure links across the Mediterranean.24

Security: Navigating China’s mediterranean ambitions

Sino-Greek relations have taken on strategic weight due to Chinese investment in critical infrastructure, most notably in the port of Piraeus. While COSCO’s stake supported Greece’s post-crisis recovery, it also triggered concerns in Washington and Brussels over strategic dependence and NATO security. Chinese control of a major European port is widely viewed as a risk to supply-chain resilience and allied naval operations. Tensions escalated in January 2025 when the US Department of Defense listed COSCO among firms allegedly linked to China’s military. The listing carried no direct sanctions but fueled fears of “self-sanctioning” by companies and added uncertainty amid global shipping disruptions.25

From a transatlantic perspective, Piraeus has become emblematic of the risks of strategic dependency, shaping EU de-risking policies, NATO security debates, and broader great-power competition. US officials have warned that Chinese control of critical infrastructure in a NATO member state could weaken alliance resilience.26 Allies likewise fear Beijing might leverage Piraeus in ways that complicate allied naval operations and long-term strategic planning. These concerns are amplified by NATO’s reliance on Greek ports such as Souda Bay in Crete, a key base for US and allied naval forces.

To counterbalance Chinese influence, Washington and Brussels have backed the Alexandroupolis LNG terminal27—a $380 million project launched in May 2022, largely financed by the EU—as both a strategic and political investment. Linked to regional pipelines, the terminal is designed to strengthen Europe’s energy resilience and anchor NATO’s presence in Southeastern Europe.28 Its dual role in energy and defense makes it a linchpin of US-Greek cooperation and a counterweight to Chinese leverage at Piraeus.

Athens, for its part, has sought to balance openness to Chinese capital with its commitments to the EU and NATO. It aligns with EU positions on cybersecurity, maritime law, and human rights, while steering clear of security cooperation with China that might unsettle NATO—limiting engagement to symbolic gestures such as port visits and participation in multilateral exercises. Under Prime Minister Kyriakos Mitsotakis, Greece has deepened ties with the United States and the EU, limiting Huawei’s role while maintaining pragmatic economic cooperation and high-level exchanges with Beijing.

Beyond the strategic and economic realm, China has also expanded its soft-power presence in Greece through education and research cooperation. Academic ties have grown since the opening of Greece’s first Confucius Institute in 2009. The 2008 global financial crisis accelerated cooperation, and today five universities host Confucius Institutes alongside joint degree programs, teaching centers, and EU-funded research projects.29 Twenty-seven Greek institutions maintain over 135 partnerships with Chinese counterparts.“30 Yet, the absence of a coherent research policy and limited transparency have fueled concerns over collaboration with authoritarian states in sensitive fields.

Greece’s alignment with the EU’s China policy

Over the past two decades, Greece has evolved from a frequent outlier in EU China policy to a cautious participant in Brussels’ de-risking agenda. Historically, Athens occasionally departed from the EU line on foreign policy—blocking, for instance, a 2016 statement on the Permanent Court of Arbitration’s ruling against Beijing’s maritime claims in the South China Sea.31 Likewise, Greece vetoed a 2017 EU statement at the United Nations Human Rights Council condemning human rights abuses in China,32 marking the first time such a joint resolution failed to pass. These moves reflected Athens’ close ties with Beijing, strengthened further when Greece joined the Asian Infrastructure Investment Bank and the “17+1” format and hosted President Xi Jinping for a state visit in 2019.33

Since 2020, however, Athens has adjusted course. A shifting geopolitical environment—including Turkey’s assertiveness in the Eastern Mediterranean, intensifying Sino-US rivalry, and deteriorating EU-China relations—has reinforced Greece’s dependence on US and NATO security guarantees.34 While Piraeus remains the flagship BRI project, Chinese investment has waned35 as Greece’s economy has recovered and diversified its sources of foreign capital, with annual FDI inflows rising from $330 million in 2010 to $7.3 billion in 2024.36 Even in Piraeus, COSCO’s efforts to expand operations have met both bureaucratic37 and local resistance.38

Reflecting this recalibration, Greece declined to host the “17+1” summit in 2022 and has avoided positions that break EU consensus. Chinese SOEs have been increasingly sidelined in public tenders, and in 2020 Greece’s largest telecom operator chose Ericsson over Huawei for developing its 5G network. Under EU and US pressure, Greece also adopted a robust FDI screening mechanism and aligned with the EU’s derisking agenda. Its earlier reluctance stemmed from debt-crisis dependency on foreign capital, a political focus on recovery over security, and limited institutional capacity.39 In October 2024, Greece’s abstention on EU tariffs against Chinese electric vehicles underscored its new pragmatic balancing act—supporting EU de-risking while preserving economic ties with Beijing.40

Conclusion

Greece has adopted a measured and pragmatic stance toward China. It accepts the EU’s designation of China as a “systemic rival” but avoids direct confrontation, seeking to balance transatlantic commitments with the economic benefits of engaging Beijing. This balancing act is most visible at the port of Piraeus, where COSCO’s investment has become both a symbol of China’s presence in Greece and a pillar of Beijing’s economic diplomacy.

Within the US-China strategic rivalry, Greece remains firmly anchored in NATO and aligned with the United States on security, yet it does not treat China as an adversary. Athens emphasizes the importance of a strong US presence in the Mediterranean but avoids alienating Beijing to protect key national interests such as shipping, tourism, and foreign investment. It maintains a careful posture—committed to transatlantic security but cautious in managing economic ties with China.

On Russia’s war in Ukraine and Beijing’s alignment with Moscow, Athens has voiced criticism but refrained from the sharper rhetoric of Northern European states. It complies with EU export controls and recognizes the risks of dual-use technologies, though enforcement remains looser than in Baltic states. On economic competitiveness, Greece recognizes the risks of Chinese overcapacity and participates in EU debates on de-risking and FDI screening, but does so pragmatically. It continues to welcome Chinese investment in infrastructure, energy, and logistics while adapting cautiously to EU digital sovereignty initiatives. For Athens, resilience is understood more in economic than military terms—and it interprets the EU’s de-risking approach not as a rigid doctrine but as a flexible framework.

Greece thus walks a middle path: anchored in NATO and EU solidarity, yet unwilling to forgo the economic advantages of engaging China. Its approach remains pragmatic, shaped by regional security priorities and an enduring commitment to economic stability.

About the author

Related Content

Explore the programs

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    “Greece Exports to China,” Trading Economics, last visited October 9, 2025, https://tradingeconomics.com/greece/exports/china; “Greece Imports from China,” Trading Economics, last visited October 9, 2025, https://tradingeconomics.com/greece/imports/china.
2    “Greece Exports by Country,” Trading Economics, last visited October 9, 2025, https://ar.tradingeconomics.com/greece/exports-by-country.
3    Agatha Kratz, et al., “Chinese Investment Rebounds Despite Growing Frictions—Chinese FDI in Europe: 2024 Update,” Mercator Institute for China Studies and Rhodium Group, May 21, 2025, https://merics.org/en/report/chinese-investment-rebounds-despite-growing-frictions-chinese-fdi-europe-2024-update.
4    “China Global Investment Tracker,” American Enterprise Institute, last visited October 9, 2025, https://www.aei.org/china-global-investment-tracker/.
5    Today, the container terminal and shipbuilding zone are based in Perama, the car terminal in Keratsini-Drapetsona, and the passenger port remains in central Piraeus.
6    “China, Greece Agree to Push Ahead with COSCO’s Piraeus Port Investment,” Reuters, November 11, 2019, https://www.reuters.com/article/business/china-greece-agree-to-push-ahead-with-coscos-piraeus-port-investment-idUSKBN1XL1LC/.
7    The rest of the shares are held by the Hellenic Asset Development Fund (7 percent) and non-institutional investors (26 percent). “Investors Information,” Piraeus Port Authority, last visited October 9, 2025, https://www.olp.gr/en/investor-relations/investors-information.
8    “Piraeus Port Authority: Annual Financial Highlights 2024,” Athens Exchange Group, May 2025.
9    Tasos Kokkinidis, “Greece’s Piraeus Port Achieves Record Revenues and Profits in 2024,” Greek Reporter, April 2, 2025, https://greekreporter.com/2025/04/02/greece-piraeus-port-record-revenues-profits-2024/.
10    Eleni Stamatoukou, “Greece: Administrative Court Blocks Expansion of China Backed Piraeus Port due to Lack of Environmental Assessment,” Business and Human Rights Resource Centre, March 15, 2022, https://www.business-humanrights.org/en/latest-news/greece-administrative-court-blocks-expansion-of-china-backed-piraeus-port-due-to-lack-of-environmental-assessment/.
11    The FDI screening regime covers greenfield projects and acquisitions in sectors such as energy, healthcare, transport, telecommunications, and digital infrastructure, with stricter thresholds for defense, AI, cybersecurity, ports, underwater facilities, and border-area tourism.
12    Nicolas Tselikas Bouzeau, et al., “From Open Door to Watchful Gatekeeper: Greece Adopts a Foreign-Investment Screening Mechanism,” A&O Sherman, June 2, 2025, https://www.aoshearman.com/en/insights/from-open-door-to-watchful-gatekeeper-greece-adopts-a-foreign-investment-screening-mechanism.
13    Philippe Le Corre, “A Divided Europe’s China Challenge,” Carnegie Endowment for International Peace, November 26, 2019, https://carnegieendowment.org/posts/2019/11/a-divided-europes-china-challenge?lang=en.
14    “Greece Joins 16+1 Initiative for Regional Trade with China,” Ekathimerini, April 12, 2019, 2025, https://www.ekathimerini.com/news/239523/greece-joins-16-1-initiative-for-regional-trade-with-china/.
15    “Greece Joins China’s Belt and Road Initiative,” Ekathimerini, August 27, 2018, https://www.ekathimerini.com/economy/231908/greece-joins-china-s-belt-and-road-initiative/.
16    Eliza Gkritsi, “How Huawei Hooked Greek Telcos,” TechNode, December 9, 2020, https://technode.com/2020/12/09/how-huawei-hooked-greek-telcos/?.
17    “Understanding the Market for 4G RAN in Europe: Share of Chinese and Non-Chinese Vendors in 102 Mobile Networks,” Strand Consult, last visited October 9, 2025, https://www.strandconsult.dk/understanding-the-market-for-4g-ran-in-europe-share-of-chinese-and-non-chinese-vendors-in-102-mobile-networks.
18    “Kalamata Greece Suspends 5G Program,” Environmental Health Trust, December 3, 2019, https://ehtrust.org/kalamata-greece-suspends-5g-program/.
19    “Company Officials: Huawei Tops Smartphone Sales in Greece,” Tornos News, February 8, 2018, https://www.tornosnews.gr/en/tourism-businesses/new-investments/29959-company-officials-huawei-tops-smartphone-sales-in-greece.html.
20    Dimitrios Stroikos, “Head of the Dragon or Trojan Horse? Reassessing China—Greece Relations,” Journal of Contemporary China 32, 142 (2022), https://eprints.lse.ac.uk/114929/3/Head_of_the_Dragon_or_Trojan_Horse_Reassessing_.pdf.
21    Mary Drosopoulos, “Greece: DeepSeek and Technological Sovereignty,” Osservatorio Balcani e Caucaso Transeuropa, May 7, 2025, https://www.balcanicaucaso.org/eng/Areas/Greece/Greece-DeepSeek-and-Technological-Sovereignty-237607.
22    “Building a Clean Network: Key Milestones,” US Department of State, last visited October 9, 2025, https://2017-2021.state.gov/building-a-clean-network-key-milestones/.
23    Greece 2.0 is the Greek government’s national program implemented within the framework of the EU’s Recovery and Resilience Facility (RRF), the main pillar of the NextGeneration EU initiative. It allocates more than €30 billion in grants and loans to support projects advancing digital transformation, the green transition, infrastructure upgrades, and innovation. “Faria Renewables, Huawei Setting Up Battery Partnership in Greece,” Balkan Green Energy News, January 24, 2025, https://balkangreenenergynews.com/faria-renewables-huawei-setting-up-battery-partnership-in-greece.
24    David Glass, “Huawei Eyes Logistics Hub in Piraeus,” Seatrade Maritime News, January 2, 2025, https://www.seatrade-maritime.com/ports-logistics/huawei-eyes-logistics-hub-in-piraeus.
25    Jonathan Saul, Yannis Souliotis, and Renee Maltezou, “Greece Examines Impact of US Blacklisting of Piraeus Port Owner COSCO—Sources,” Reuters, January 10, 2025, https://www.reuters.com/world/greece-examines-impact-us-blacklisting-piraeus-port-owner-cosco-sources-2025-01-10/.
26    “U.S. Expresses Concerns over Chinese Investments in Piraeus,” Ekathimerini, October 9, 2019, https://www.ekathimerini.com/economy/245818/us-expresses-concerns-over-chinese-investments-in-piraeus.
27    The Alexandroupolis LNG terminal is a floating storage and regasification unit (FSRU) located offshore southwest of Alexandroupolis, Greece.
28    Terysa King, “Port of Alexandroupolis Makes Sustainment History with Heavy Brigade Movement,” US Army, March 17, 2024, https://www.army.mil/article/274572/port_of_alexandroupolis_makes_sustainment_history_with_heavy_brigade_movement.
29    “Greece: The Overlooked Risks of Academic Cooperation with China,” Center for European, International and Security Studies, June 24, 2025, https://ceias.eu/greece-the-overlooked-risks-of-academic-cooperation-with-china.
30    China–Europe Academic Engagement Tracker: Greece,” Center for European, International and Security Studies, last visited October 9, 2025, https://academytracker.ceias.eu/map/eu/Greece.
31    Robin Emmott, “EU’s Statement on South China Sea Reflects Divisions,” Reuters, July 15, 2016, https://www.reuters.com/article/us-southchinasea-ruling-eu-idUSKCN0ZV1TS/.
32    Nektaria Stamouli, “Greece Vetoes EU Condemnation of China’s Human-Rights Record,” Wall Street Journal, June 19, 2017, https://www.wsj.com/articles/greece-vetoes-eu-condemnation-of-china-human-rights-record-1497858040.
33    Helena Smith, “Xi Jinping Comes to Greeks Bearing Gifts,” Guardian, November 12, 2019, https://www.theguardian.com/world/2019/nov/12/xi-jinping-comes-to-greeks-bearings-gifts.
34    Stroikos, “Head of the Dragon or Trojan Horse? Reassessing China—Greece Relations,” 602–619.
35    “Foreign Direct Investment (FDI) Inflows in Greece by Country of Origin,” Statista, last visited October 9, 2025, https://www.statista.com/statistics/1613585/fdi-inflows-in-greece-by-origin.
36    “Foreign Direct Investment: Inward and Outward Flows and Stock (Annual Data),” United Nations Conference on Trade and Development, last updated September 1, 2025, https://unctadstat.unctad.org/datacentre/dataviewer/US.FdiFlowsStock.
37    Tasos Kokkinidis, “Greek Archaeological Council Derails COSCO’s Investment Plan for Piraeus,” Greek Reporter, April 3, 2019, https://greekreporter.com/2019/04/03/greek-archaeological-council-derails-coscos-investment-plan-for-piraeus/.
38    Momoko Kidera, “‘Sold to China’: Greece’s Piraeus Port Town Cools on Belt and Road,” Nikkei Asia, December 9, 2021, https://asia.nikkei.com/Spotlight/Belt-and-Road/Sold-to-China-Greece-s-Piraeus-port-town-cools-on-Belt-and-Road.
39    Dimitrios Stroikos, “China–Greece Relations at 50: A Not So Happy Anniversary?” China Observers in Europe, September 20, 2022, https://chinaobservers.eu/china-greece-relations-at-50-a-not-so-happy-anniversary.
40    “How EU Governments Voted on Chinese EV Tariffs,” Reuters, October 4, 2024, https://www.reuters.com/business/autos-transportation/how-eu-governments-plan-vote-chinese-ev-tariffs-2024-10-04/?utm.

The post Greece’s policy on China: Debt-era deals and recalibration appeared first on Atlantic Council.

]]>
Recommendations for coordinating US-EU policy https://www.atlanticcouncil.org/in-depth-research-reports/report/recommendations-for-coordinating-us-eu-policy/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=884581 To effectively counter China, the United States should prioritize closer coordination with the EU in key areas: economic security, supply chains, anti-coercion, and strategic investment. Joint efforts on trade and investment, technology, and security will be crucial to ensure aligned US-EU action.

The post Recommendations for coordinating US-EU policy appeared first on Atlantic Council.

]]>
This is the final chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy.Read the full report here.

In recent years, European institutions have elevated China to a key priority on the European Union (EU) agenda, developing a comprehensive set of policies and strategic documents aimed at aligning member states more closely and strengthening transatlantic coordination. As the previous chapters of this report have shown, the EU’s China policy emerges from both formal and informal negotiations involving a wide range of actors. Where the EU holds exclusive competencies—such as in customs, competition, and trade—the European Commission and the European Parliament take the lead, producing the most consistent policy strands. The Commission’s Directorate-General for Trade (DG Trade) and the Parliament’s International Trade Committee (INTA) are particularly influential. By contrast, the EU’s role in foreign and security policy is far more limited, with decisions primarily left to member states via the European Council. The Council’s unanimity rule in this area has hindered a common position on China in the past, prompting several member states to advocate a shift toward qualified-majority voting to strengthen cohesion.

As this report has highlighted, the evolving transatlantic agenda on China is driven by four distinct forces: US-China rivalry, growing doubts about US engagement in Europe, the deepening Russia-China partnership, and China’s growing competitiveness in key sectors. Together, these pressures make closer US-EU coordination both urgent and necessary—not only in words but also in action. The United States should prioritize building durable mechanisms of cooperation with the EU in the areas that matter most: economic security, supply chains, anti-coercion, and strategic investment. Aligning US economic power with EU regulatory clout would enable the United States and the EU, as transatlantic partners, to shape global competition and respond to China with greater unity and credibility. The recommendations below are aimed at achieving this goal. They should be accompanied by the reestablishment of the Transatlantic Trade and Technology Council, a consultation forum initially founded under the first Trump administration, to coordinate China-related issues between the US administration and the European Commission.

Recommendations for US policy and strategy

Trade and investment

1. Deepen joint supply-chain de-risking of critical minerals

The United States should partner with the EU to launch a coordination platform on critical minerals and supply chains—backed by co-financing, harmonized standards, and strategic stockpiles—to put the shared doctrine of de-risking into practice. This would involve:

  • Establishing a standing US–EU critical minerals coordination platform to jointly manage supply chains, reduce dependence on single suppliers, strengthen resilience, and align industrial policies. This platform could coordinate project pipelines, risk screening, and offtake calendars for lithium, cobalt, rare earths, and magnets, and would be led jointly by the European Commission’s DG Trade, the Enterprise Directorate-General (DG GROW), and US State Department officials, who oversee the US Minerals Security Partnership. It would reinforce transatlantic strategic alignment by creating a shared database, harmonizing risk assessments, synchronizing purchase schedules to prevent subsidy races, and conducting stress tests to establish buffer stock levels in critical sectors such as electric vehicles (EVs), renewable energy, and defense.
  • Setting up a co-financing mechanism between the US International Development Finance Corporation and the European Investment Bank to support projects that de-risk third-country mining, processing, and recycling, and to attract private capital, modeled on the US-Australia-Japan infrastructure partnership.
  • Harmonizing standards and supporting rare earth separation plants in Estonia and Sweden to expand EU processing capacity and secure US-EU offtake for defense and EV industries. Meanwhile, nickel- and cobalt-recycling hubs in Finland and Germany should be developed to reduce reliance on raw extraction and advance EU circular-economy goals—anchoring industrial cooperation in Germany and France.

2. Advance transatlantic convergence on investment screening

Inbound and outbound investment screening remain areas where US-EU cooperation has been attempted with limited success. While the EU has made progress, it has lagged behind US policy. One challenge is that, although the European Commission actively promotes strengthening investment screening, the authority ultimately rests with member states—and consensus among them is often lacking. Most recently, transatlantic parties discussed cooperation at the US-EU Trade and Technology Council meeting in April 2024.1 Despite these challenges, signs of potential transatlantic alignment are emerging. These include growing EU recognition of the risks Chinese investments pose to critical sectors2 and the almost simultaneous rollout of new US and EU outbound investment screening regulations in January 2025.3 Based on these developments, we recommend that the United States re-engage Brussels to establish common threat perceptions and to cautiously explore member states’ willingness to coordinate on fortifying Europe’s defenses against Chinese security risks.

The United States should work with the EU and member states to coordinate both inbound foreign direct investment (FDI) and outbound investment controls, safeguard critical technologies and sensitive data, reduce asymmetries between US and EU policies, and develop a coherent, dual-track US-EU screening regime to keep strategic technologies and infrastructure under trusted control. Key steps include:

  • Establishing a transatlantic investment screening forum to bring together the Committee on Foreign Investment in the United States (CFIUS), the European Commission’s DG Trade and Directorate-General for Financial Stability, Financial Services, and Capital Markets Union (DG FISMA), and national authorities to coordinate inward FDI. This forum could help expand intelligence sharing and integrate Financial Intelligence Units to track capital flows and investment structures linked to China.
  • Institutionalizing joint risk monitoring by producing annual US-EU risk assessments of Chinese investment patterns in strategic sectors—drawing on US intelligence, the European Commission, and national regulators—and sharing findings with industry to guide compliance and risk-management practices.
  • Advancing outbound FDI controls within the EU. The United States should work with the European Commission to develop future outbound investment restrictions aligned with shared definitions of sensitive technologies. This includes partnering with France and Italy as early adopters, engaging Germany to shape consensus, collaborating with the Netherlands on high-tech export-control expertise, and supporting Nordic, Central, and Eastern European states with best practices and capacity-building.
  • Enhancing legislative engagement through a US Congress-European Parliament working group, supported by national parliamentary dialogues, staff exchanges, and technical briefings, to ensure transparent and durable political consensus on investment screening.
  • Developing a transatlantic FDI monitoring instrument by proposing a US-EU mechanism that involves the Bureau of Economic Analysis (BEA), CFIUS, Eurostat, and the European Central Bank, to track Chinese FDI systematically. This instrument would harmonize data methodologies, increase transparency, and provide timely intelligence on sectoral capital flows, thereby strengthening screening decisions and reducing regulatory arbitrage.

3. Discuss overcapacity and coordination of trade defenses

Both the United States and the EU face strikingly similar challenges from China’s industrial overcapacity and dumping, yet their approaches to trade are so divergent that no coordination under the current US administration has been possible. The EU approaches trade on the basis of the principles of free trade enshrined in the World Trade Organization, while US trade policy is based on an “America First” approach aimed at addressing decades of persistent “lack of reciprocity in our bilateral trade relationships.”4 Despite this gap, the challenges faced by both sides are nearly identical—and China exploits the loopholes created by incoherent US-EU policymaking to its advantage.

The United States and the EU should therefore re-engage to align their approaches to countering Chinese industrial overcapacity in critical sectors such as EVs, solar, and steel, where US broad tariffs and EU targeted duties currently diverge. This effort should include:

  • Establishing a transatlantic trade defense forum as a standing platform for US and EU officials to discuss trade defense tools, share evidence of Chinese state subsidies, and seek to synchronize remedies.
  • Aligning G7 messaging on Chinese overcapacity by leveraging the organization to issue unified warnings on destabilizing effects of Chinese overcapacity in EVs, solar, and steel. This could amplify deterrence, reassure industry of fair competition, and limit Beijing’s ability to exploit US-EU divisions.
  • Coordinating enforcement of forced-labor import bans under the Uyghur Forced Labor Prevention Act with the EU’s forthcoming Forced-Labour Regulation to strengthen restrictions on goods linked to forced labor and enhance credibility.

Technology

1. Deepen US-EU coordination on semiconductors and the chip supply chain

Mirroring the 2025 US-EU trade framework, the United States should make semiconductors a top-tier track for transatlantic coordination—covering both advanced and “legacy” chips, fab tools and services, and subsidy rules—so that policy efforts reinforce each other and limit Chinese exploitation. Key measures should include:

  • Aligning licensing standards for advanced chipmaking tools and related services—including installation, maintenance, software updates, and spare parts—with the Netherlands5 and the European Commission’s DG TRADE and Directorate-General for Communications Networks, Content, and Technology (DG CONNECT). This would ensure mutually reinforcing controls consistent with the US-EU trade framework, in which the EU vowed to “work with the United States to adopt… [US] security requirements in a concerted effort to avoid technology leakage” to China.6
  • Piloting light outbound investment coordination with the Commission’s economic-security team using reciprocal notifications and shared risk categories for chips, supporting early alignment while the EU considers establishing a formal regime.

China is making rapid progress in advanced technologies, with implications for both military and commercial sectors. It is therefore in the interest of the United States and the EU to coordinate policies on artificial intelligence (AI), quantum, and defense-relevant technologies. However, several obstacles remain. First, the EU—pursuing “strategic autonomy”—is concerned about dependence on US tech companies as well as Chinese firms. Second, the United States currently leads in AI and quantum computing, while the EU has lagged behind. Third, the EU has established a comprehensive data protection regime and a binding AI framework, whereas the United States has not. Nevertheless, both sides have complementary capabilities, and containing China unilaterally is not feasible. Expanding transatlantic discussions and coordination in this area is urgent.7

The United States should treat AI, quantum, and defense-relevant technologies as a top-tier US-EU coordination track—covering safety rules and testing, aligned listings and sanctions, tighter controls on risky transfers including services and data, light outbound-investment coordination, and joint action against Russia-related diversion. To align rules and reduce pathways for Chinese evasion, the United States should:

  • Build an AI-governance bridge with the European Commission’s DG CONNECT to provide companies with a single set of expectations on high-risk uses, testing, transparency, and incident reporting, even if legal texts differ.
  • Synchronize listings and sanctions affecting AI, quantum technology, and defense-linked firms with the Commission and the European External Action Service (EEAS) to ensure common criteria and simultaneous timing for maximum impact.
  • Collaborate with the Commission’s DG TRADE to bring export controls into alignment with the Trump administration’s AI Action Plan objective to “align protection measures globally,”8 and encourage the creation of an EU-wide export control framework.
  • Pilot light outbound-investment coordination with the Commission’s economic-security team using reciprocal notifications and a simple shared-risk taxonomy for AI and quantum while the EU is considering a formal regime.

Security

1. Counter Chinese support for Russia’s war

While the EU has made notable progress in articulating its interests and tools regarding China in the economic domain, this strategic reflection has scarcely expanded to encompass global security and grand strategy. The March 2025 EU White Paper on Defense outlines in detail how China constitutes a “systemic challenge” for Europe, but navigating China’s grand strategy amid intensifying Sino-American competition and strengthening Sino-Russian partnership is complex, and the EU’s role as a security actor will hinge on the trajectory of these relationships. The United States should treat China’s support for Russia’s war in Ukraine as an urgent US-EU enforcement priority—covering synchronized listings, joint customs and financial targeting, shared industry advisories, coordinated border checks, outreach to key transit states, and rapid deconfliction. This approach would choke off procurement routes, close security gaps faster, and provide banks, shippers, and manufacturers with clear, consistent rules on both sides of the Atlantic. Key steps include:

  • Prioritizing China-enabled procurement coordination with the European Commission’s DG TRADE and the EEAS, aligning listings and timing so actions land together, known intermediaries are shut down, and a clear message is sent to banks, shippers, and manufacturers.
  • Building a small US-EU enforcement cell with the Commission and lead member states such as Germany, the Netherlands, Poland, and Lithuania to share real-time customs and financial red flags, match serial numbers and shipment data, and run coordinated end-use checks on high-risk consignments moving through hubs in Central Asia, the Caucasus, and the Middle East.
  • Issuing joint industry advisories with the Commission for freight forwarders, distributors, and university and lab partners, detailing China-related risks, simple screening steps, and reporting channels.
  • Coordinating financial measures with the Commission and key finance ministries to block China-based intermediaries from accessing dollar and euro channels—pairing listings with practical guidance to banks on names, addresses, and tradecraft.
  • Working with the Commission’s DG TRADE and customs authorities in priority member states—Poland, Finland, Latvia, Lithuania, and Estonia—to tighten border checks on items that originate from China and are rerouted to Russia through targeted inspection campaigns rather than blanket holds.
  • Expanding joint outreach to key transit governments—in Kazakhstan, Kyrgyzstan, Armenia, Georgia, Türkiye, and the United Arab Emirates—offering training, scanners, and compliance toolkits while asking them to curb China-linked diversion networks.
  • Briefing the European Parliament’s Committee on Foreign Affairs (AFET) and its Committee on International Trade (INTA) leadership to secure political and budget support for enforcement tools and reinforce the transatlantic position on China-linked evasion.

2. Counter China-linked espionage and cyber operations

The United States and the EU should treat counter-espionage and cyber defense as a shared priority, focused on Chinese state and proxy activity. This would ensure that investigations, public attributions, and protective measures move in step and close gaps that adversaries can exploit. The United States should:

  • Coordinate counter-interference cases with the EEAS, the European Union Intelligence and Situation Center, and the European Commission, aligning investigative priorities on Chinese influence operations and overseas “police stations” and issuing joint guidance that universities, research councils, and local authorities can follow easily.
  • Align public attribution and response with the EEAS and the European Union Agency for Cybersecurity, agreeing on when to name Chinese actors, how to brief victims, and which immediate resilience steps operators should take across critical sectors.
  • Synchronize listings and penalties for Chinese surveillance and defense firms with the Commission and the EEAS, timing actions jointly and pairing them with clear guidance to banks and platform operators.
  • Run joint cyber-resilience sprints with the Commission and the EU Agency for Cybersecurity that focus on a few high-risk targets—government email, hospitals, ports, energy grid control systems—issuing straightforward hardening checklists and conducting follow-up scans to verify progress.
  • Issue coordinated advisories with the Commission to technology vendors, cloud providers, and managed-service firms on China-linked cyber intrusions or espionage activity, including easy-to-understand red flags and a single reporting path usable on both sides of the Atlantic.
  • The United States Congress and the European Parliament should establish a Transatlantic Legislative Forum on Countering Authoritarian Interference, with an initial focus on Chinese state and proxy activities. This forum would bring together members of the U.S. Congressional-Executive Commission on China and the European Parliament’s Committee Foreign Interference to strengthen coordination and ensure coherent transatlantic approaches to counter-espionage, cyber defense, technology security, and strategic communication through joint hearings, secure briefings, and structured staff-level exchanges.

3. Coordinate with Europe on an Indo-Pacific approach to China

The United States and the EU should pursue a coordinated Indo-Pacific strategy toward China that links freedom-of-navigation messaging, presence at sea, Taiwan Strait diplomacy, partnerships with regional allies (Japan, South Korea, Australia, the Philippines, and India), defense-industrial cooperation with willing EU members, and sanctions and export-risk messaging. To implement this strategy, key actions should include:

  • Aligning messages and actions on freedom of navigation and coercion at sea with the EEAS and key member states (France, Germany, Italy, and the Netherlands), pairing US operations and exercises with European port calls and patrols on a shared schedule and unified public messaging.
  • Keeping Taiwan Strait diplomacy in lockstep with the EEAS by agreeing on standard phrasing regarding the status quo, coordinating high-level visits and parliamentary outreach, and establishing a quiet crisis-communications channel for rapid de-escalation messaging.
  • Using NATO, the G7, and synchronized outreach to partners in the region (Japan, South Korea, Australia, the Philippines, and India) to roll out joint statements, tabletop exercises, and practical maritime capacity building, working with the EEAS Indo-Pacific team to avoid duplicate initiatives and share costs efficiently.
  • Expanding practical defense-industrial ties with close US allies in the region while bringing in willing EU members where they add value (France, Italy, the Netherlands, and Germany), focusing on maintenance hubs, munitions availability, and interoperable communications rather than large new platforms requiring EU-wide consensus.
  • Briefing the European Parliament’s AFET and its Subcommittee on Security and Defence (SEDE) leadership ahead of major Indo-Pacific announcements to secure political backing and maintain consistent public messaging on China, maritime rules, and crisis stability.

The United States should work closely with the EU on China-related issues in defense technology and critical infrastructure. This includes coordinating on arms transfers, cooperation related to the Australia-United Kingdom-United States (AUKUS) security partnership with willing EU countries, protecting ports, energy and data hubs, addressing high-risk telecommunication vendors, and managing risks from military-civil-fusion. Doing so will strengthen resilience, close policy gaps, and give US and EU operators clear, predictable rules. To achieve this, the United States should take the following steps:

  • Strengthen protection of critical infrastructure from China-linked risks by working with the Commission’s Directorate-General for Energy (DG ENER), DG CONNECT, and the EU Agency for Cybersecurity to develop simple, practical checklists of actionable security steps for ports, power grids, and data centers, giving operators one clear, consistent message.
  • Coordinate with London and Canberra on AUKUS-related touchpoints and brief the Commission’s Directorate-General for Defence Industry and Space (DG DEFIS) and EU member states—such as France, Italy, the Netherlands, and Germany—early on potential spillovers from AUKUS workstreams that will touch EU standards, supply chains, and workforce, allowing Europe to contribute wherever it adds value without formal membership.
  • Explore the possibility of inviting EU NATO members to participate in future US Freedom of Navigation Operations, passing exercises, and the multilateral Rim of the Pacific Exercise alongside US allies in the Indo-Pacific region, while preserving their legal and operational integrity. The United States could establish a “Freedom of Navigation Partners Initiative” to facilitate parallel or sequential patrols by allies such as the United Kingdom, France, Australia, Japan, and Canada, ensuring a visible and sustained multinational presence in contested waters.
  • Deepen cooperation on China-related military-civil fusion (MCF) risks with the Commission’s Directorate-General for Research and Innovation and DG DEFIS, giving universities, labs, and research funders a short, shared risk screen and a dedicated entity list of companies and institutions posing MCF or dual-use risk, ensuring that sensitive projects with clear defense implications are identified and stopped early.
  • Establish a transatlantic mechanism (in cooperation with NATO) to identify and reduce Chinese investments in European strategic infrastructure that could undercut NATO’s ability to act both politically and militarily, especially in times of crisis. The starting point should be joint mapping of China-linked exposure in ports and logistics by working with the Commission’s Directorate-General for Mobility and Transport and coastal EU member states (the Netherlands, Italy, Spain, and Greece) to apply common risk tests for equipment, software, data access, and terminal stakes, and by coordinating review decisions and mitigation terms.

Conclusion

The research conducted for this report between November 2024 and October 2025 highlights several key findings regarding the EU’s evolving policies on China and their implications for US strategy and transatlantic unity.

The report finds that EU member states whose foreign policies are closely aligned with those of the United States tend to shape and support the European Commission’s approach to China, thereby influencing EU-level policy outcomes. This alignment strengthens transatlantic coordination but also exposes internal divisions within the EU, as not all member states share the same strategic outlook or level of risk tolerance toward Beijing.

Four geopolitical trends have collectively pushed the EU toward greater caution in its engagement with China: intensifying US-China strategic competition, uncertainty about continued US engagement globally and in Europe, Russia’s war on Ukraine backed by China, and China’s growing economic and competitiveness challenges to the EU. Together, these developments have prompted a shift toward balancing and de-risking strategies and a deeper recognition of the vulnerabilities and risks tied to economic dependence on Beijing.

Since Russia’s full-scale invasion of Ukraine in February 2022 and the announcement of the China-Russia “no limits” partnership, most EU member states have adopted a more skeptical view not only of Moscow but also of Beijing, particularly given China’s support for Russia’s war effort. This shift has reinforced the European Commission’s position as a central actor in shaping EU-level policy on China and has prompted a gradual yet unmistakable movement toward a more unified strategic stance. Among the trends analyzed, this dynamic has had the most profound impact on the EU’s China policy.

Escalating US-China tensions represent the second most significant driver of change. As the rivalry between the two superpowers has intensified, the United States has increasingly encouraged its European partners to adopt complementary balancing measures. This has advanced transatlantic coordination, though differences remain regarding the extent—and the pace—of Europe’s alignment with US policy.

At the same time, the EU has become more attuned to China’s economic and competitiveness challenges. While the European Commission has taken the lead in crafting the EU’s economic security strategy, its success ultimately depends on implementation by member states. Progress has therefore been uneven, shaped by divergent national interests and persistent tensions between business communities seeking continued engagement with China and policymakers advocating stronger safeguards for economic resilience and security.

Overall, the EU is gradually moving toward a more strategic, cautious, and coherent approach to China. This evolution provides a renewed foundation for transatlantic cooperation—but only if the United States and Europe sustain close coordination to ensure that their respective China policies remain mutually reinforcing, forward-looking, and resilient in the face of a rapidly changing geopolitical environment.

About the authors

Related Content

Explore the programs

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    “U.S-EU Joint Statement of the Trade and Technology Council,” White House, April 5, 2024, https://bidenwhitehouse.archives.gov/briefing-room/statements-releases/2024/04/05/u-s-eu-joint-statement-of-the-trade-and-technology-council-3/.
2    “European Parliament Endorses New Screening Rules for Foreign Investment in EU,” European Parliament, press release, May 8, 2025, https://www.europarl.europa.eu/news/en/press-room/20250502IPR28218/european-parliament-endorses-new-screening-rules-for-foreign-investment-in-eu.
3    Bob Savic, “U.S. and EU Strengthen FDI Screening Rules,” Geopolitical Intelligence Services, March 26, 2025, https://www.gisreportsonline.com/r/fdi-screening/.
4    “Fact Sheet: The United States and European Union Reach Massive Trade Deal,” White House, July 28, 2025, https://www.whitehouse.gov/fact-sheets/2025/07/fact-sheet-the-united-states-and-european-union-reach-massive-trade-deal/.
5    The Netherlands is a crucial player in the global semiconductor industry, primarily due to ASML (Advanced Semiconductor Materials Lithography), the sole global supplier of EUV lithography machines needed for the most advanced chips.
6    “Joint Statement on a United States-European Union Framework on an Agreement on Reciprocal, Fair, and Balanced Trade,” White House, August 21, 2025, https://www.whitehouse.gov/briefings-statements/2025/08/joint-statement-on-a-united-states-european-union-framework-on-an-agreement-on-reciprocal-fair-and-balanced-trade/.
7    “Tech 2030: A Roadmap for Europe-US Tech Cooperation,” Center for European Policy Analysis, September 30, 2025, https://cepa.org/comprehensive-reports/tech-2030-a-roadmap-for-europe-us-tech-cooperation/.
8    “AI Action Plan,” White House, July 2025, https://www.ai.gov/action-plan.

The post Recommendations for coordinating US-EU policy appeared first on Atlantic Council.

]]>
Italy’s policy on China: The Belt and Road gamble and its aftermath https://www.atlanticcouncil.org/in-depth-research-reports/report/italys-policy-on-china-the-belt-and-road-gamble-and-its-aftermath/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=881664 From the Silk Road to the Belt and Road Initiative, Italy’s relationship with China has shifted from early enthusiasm to cautious recalibration. Once Europe’s gateway for Beijing’s ambitions, Rome now frames its China policy around transatlantic solidarity, balancing economic opportunity with strategic prudence.

The post Italy’s policy on China: The Belt and Road gamble and its aftermath appeared first on Atlantic Council.

]]>
This is the sixth chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy.Read the full report here.

Italy’s relationship with China is among the oldest in Europe, dating back to the Middle Ages, when Marco Polo and other Venetian merchants traveled east along trade routes that would later be known as the Silk Road. Modern engagement resumed when Rome recognized the People’s Republic of China (PRC) in 1970—ahead of many other Western nations—reflecting Italy’s ambition to diversify its foreign policy, serve as a bridge between East and West, and expand economic opportunities.1 Economic ties grew steadily after China’s accession to the World Trade Organization (WTO), culminating in a comprehensive strategic partnership by 2004.

Until recently, the Sino-Italian relationship fluctuated considerably. Successive Italian governments, facing economic stagnation, viewed engagement with China as a potential lifeline for growth, which culminated in Italy’s decision to join the Belt and Road Initiative (BRI) in 2019. Yet a coherent and sustainable trade policy never fully materialized, constrained by Italian political volatility, global crises, and the hardening of China’s internal politics. The early promise of cooperation was repeatedly undermined by events such as the 2008 global financial crisis, the COVID-19 pandemic, and Beijing’s support for Russia in the wake of its invasion of Ukraine.

Under Prime Minister Mario Draghi, Italy reassessed its China policy, aligning more closely with European and transatlantic partners. Since the election of Giorgia Meloni in 2022, Italy has moved from BRI-era optimism to pragmatic realignment with the West. Rome now combines transatlanticist loyalty with economic caution, strengthening controls and formally exiting the BRI. Anchored in EU and NATO frameworks, the country pursues a measured and resilient approach that balances EU de-risking with national pragmatism, while acknowledging Beijing’s human rights violations and its support for Russia. Central to this approach has been a vocal commitment to the importance of transatlantic alliances and values.

Trade and investment: Made in Italy vs. Made in China

Sino-Italian economic ties expanded significantly from the late 1970s, accelerating after China joined the WTO. Italian exports emphasized high-quality manufacturing, while imports were dominated by low-cost goods, reflecting China’s rise as a global manufacturing hub and Italy’s comparative strength in design and high-value products. In 2004, Italian Prime Minister Silvio Berlusconi and Chinese Premier Wen Jiabao elevated the bilateral relationship to a comprehensive strategic partnership, broadening cooperation in trade, investment, energy, culture, and politics.2

By 2007, China had become one of Italy’s top trading partners, with trade rising more than sevenfold, from $9.6 billion in 2001 to $70.3 billion by 2024.3 In the mid-2010s, Rome, seeking capital and export opportunities for small and medium-sized enterprises (SMEs), deepened ties with China, drawing inspiration from the United Kingdom’s “golden era”.4 Prime Minister Matteo Renzi’s 2014 visit to Beijing produced the 2014-2016 Action Plan for Economic Cooperation and memorandums of understanding (MoUs) in key sectors, followed by high-level exchanges, including President Sergio Mattarella’s 2017 state visit and Prime Minister Paolo Gentiloni’s participation in the Belt and Road Forum for International Cooperation. Optimism for closer ties grew in Italy, but the global context shifted dramatically by late 2017, with the first Trump administration’s confrontational stance toward China, Xi Jinping’s assertive 19th Communist Party Congress, and the onset of a US-China trade war in 2018.

Italy’s 2019 entry into the BRI was intended to boost “Made in Italy” exports. Trade, however, grew unevenly: Chinese exports to Italy jumped 50 percent, from $35 billion to $66 billion, while Italian exports to China rose only modestly, from $14.5 billion to $17 billion. Imports later fell amid the war in Ukraine, shifting geopolitical dynamics, and Italy’s withdrawal from the BRI. Despite these developments, the trade deficit reached $37 billion in 2024. These figures also include Italian exports to China routed through Germany as part of European supply chains.

Today, Italy’s exports to China—roughly $17 billion—pale in comparison to more than $54 billion in Chinese exports to Italy, making China the country’s third-largest import partner. While Italy is flooded with Chinese products (the PRC accounts for 8.8 percent of imports, second only to Germany), exports to China account for only 2.5 percent of Italy’s total exports, far below Germany (12 percent), the United States (11 percent), or France (10 percent).5 Italian products make up just 1.1 percent of China’s total imports.6

Chinese investments in Italy surged in the aftermath of the 2008 global financial crisis, with Chinese entities quick to capitalize on vulnerable Italian firms. From a negligible $5 million in 2008, foreign direct investment (FDI) inflows rose to $100 million in 2010 and continued climbing, reaching $4.3 billion by 2024. Cumulatively, according to the Mercator Institute for China Studies,7 Chinese investment totaled $18 billion (€15 billion), making Italy the EU’s fourth-largest recipient after Germany, France, and the Netherlands. The American Enterprise Institute’s China Global Investment Tracker estimates the broader figure—including contracts and loans—at more than $24 billion in 2025, concentrated in transport ($8.7 billion), energy ($6.5 billion), and technology ($5.3 billion).8 Major deals include ChemChina’s $8 billion acquisition of a 17 percent stake of Pirelli in 2015, and over $4 billion in stock purchases in top Italian companies—including Intesa Sanpaolo, Unicredit, Eni, Enel, Telecom Italia, Generali, and Terna—via the People’s Bank of China. Beijing has shown particular interest in Italy’s financial and insurance sectors, with State Grid of China investing in Cassa Depositi e Prestiti Reti to acquire 35 percent stake ownership and help launch its “Panda” bond program.

BRI membership promised large infrastructure projects, notably at the port of Genoa and through the “Five Ports” initiative, which envisaged Chinese ownership stakes in the ports of Venice, Trieste, and Ravenna, as well as Capodistria (Slovenia) and Fiume (Croatia) under the North Adriatic Port Association (NAPA). Results were mixed: Trieste and Genoa initially expressed interest and signed cooperation agreements with China Communications Construction Company (CCCC) but eventually withdrew in 2023 amid political and administrative hurdles. Now serving as an EU-focused platform for sustainable and digital logistics, NAPA has supported EU and national investments in Trieste, Venice, and Ravenna—signaling the Adriatic strategy’s return to European oversight.9 Still, targeted investments continued, flowing into the GAC Design Center and a Geely Auto design studio in Milan, as well as China Ocean Shipping Company Limited’s 2024 acquisition of Trasgo, a major Italian logistics firm with an integrated international supply chain company. In 2020, Rome froze several agreements with Chinese state-owned companies due to security concerns, replacing CCCC in Trieste with a German firm and withdrawing from joint space cooperation on the Tiangong-3 space station. Yet Italy’s economic structure complicates security-driven decoupling from China: its SMEs are embedded in German supply chains, and around 60 percent of its regional industries are linked to China through these networks, particularly in the manufacturing and automotive sectors.

Since the mid-2000s, especially after the “bra war”10 that devastated textile manufacturers, many Italians have viewed China’s rise as a threat, citing cheap imports, job losses, and Beijing’s industrial policies undermining SMEs, the lifeblood of the Italian economy.11 Public opinion has grown more critical of China, fueled by pandemic narratives and Chinese acquisitions linked to business closures. Tensions over values add another layer of friction: although Italian leaders rarely press China on human rights—a practice fairly common in Europe—public sympathy for Tibet and concerns about human rights violations have fueled negative perceptions.

Mask diplomacy and Italy’s BRI misstep

In March 2019, the signing of an MoU on the BRI during Xi Jinping’s state visit to Rome and Palermo proved controversial. The MoU, covering fifty agreements in economic, cultural, and infrastructural areas, made Italy the first G7 member—and the largest EU country—to join the BRI. Though legally non-binding, it was a major geopolitical win for Beijing and raised alarm in Brussels and Washington for breaking transatlantic unity. Strategically, Italy’s membership was crucial to China’s Twenty-First Century Maritime Silk Road.

The BRI deal, signed under the 2018-2019 Giuseppe Conte government—a coalition of the Five Star Movement and Lega—aimed at short-term gains but misread the broader strategic context. Ironically, it was finalized just one day after the European Council adopted a sharper China strategy, framing the PRC as a threefold challenge: negotiating partner, economic competitor, and systemic rival. Rome hoped the MoU would boost trade and attract investment to offset sluggish growth and mounting debt, with expectations of Chinese financing for infrastructure.

Before any traction was gained, however, the COVID-19 pandemic flipped the dynamic.12 Italy, one of Europe’s hardest-hit countries, became the focus of what was later called China’s “mask diplomacy”—Beijing’s effort to bolster its image as a responsible global power and shape the narrative around the pandemic. While Italy did purchase planeloads of masks and medical supplies from China, Beijing deliberately distorted the nature of this exchange through media, diaspora networks, and disinformation channels, portraying itself as Italy’s rescuer while casting the EU as absent. Italian intelligence and parliamentary reports later confirmed the coordinated nature of these influence and disinformation efforts, highlighting how China, alongside Russia, sought to manipulate Italy’s domestic discourse and weaken European cohesion. By late 2020, public opinion shifted, with 62 percent of Italians holding a negative view of China and seeing the pandemic-aid narrative as political manipulation. Chinese disinformation campaigns undermined the Italian government’s enthusiasm toward Beijing. Amid this growing skepticism—and increasing supply chain vulnerabilities—the second Conte government (2019-2021) began reassessing Italy’s BRI membership.

In 2021, Mario Draghi’s technocratic government accelerated this policy shift, strengthening the so-called “golden power” rules, tightening scrutiny of Chinese investment, and aligning more firmly with transatlantic partners. Meloni’s election in 2022 reinforced this course. Calling BRI membership a mistake, she blocked ChemChina’s bid for control of Italy’s iconic tire maker Pirelli in June 2023—and in December of the same year she opted not to renew the BRI deal. Still, Italy diplomatically reaffirmed its economic ties with China under the broad “strategic partnership,” first signed in 2004 and renewed in 2014 and 2024.13 Its BRI-exit did not trigger Chinese retaliation, but it dismantled key symbols of Beijing’s influence, realigning Rome with the EU’s de-risking strategy.

Technology: Pivoting to a “buy transatlantic” strategy

Chinese investment in Italy’s tech sector has focused on acquiring manufacturing know-how, expertise, and established brands in specialized manufacturing clusters. Essentially, it aims to move into higher-value products by building on—and at times blatantly copying—Italy’s strengths in industrial design and branding.14 The Conte government exacerbated Italy’s risky ties with China in infrastructure and high tech, including Huawei’s role in 5G. Draghi later sought to reverse course but faced pro-China voices within his coalition. Under Meloni, however, Rome moved to cut dependencies, including plans for a full ban on Chinese information and communication technologies (ICT).

During the first Trump administration, Huawei was branded a security threat, with the United States pressing allies to exclude the company from their 5G networks as part of a broader campaign of “de-coupling” from China in critical technologies, including semiconductors and artificial intelligence (AI). Italy, like several other EU states, opted for tighter vetting rather than an outright ban. By 2021, Huawei’s role in European networks had already begun to shrink. Italy’s “golden powers” framework, introduced in 2012, gave the government authority to block or condition foreign takeovers in strategic sectors.15 Initially limited to defense and security, it was expanded in 2017 to energy, transport, and communications.

After parliamentary calls in 2019 to “very seriously” consider banning Huawei, Conte resisted but agreed to expand oversight under “golden power” rules.16 Under US pressure, the framework was eventually expanded in 2020 to cover 5G, finance, health, AI, and media. During Draghi’s term, it became one of Europe’s broadest and most closely coordinated measures for blocking Chinese acquisitions in high-tech industries, complementing the EU’s new FDI screening mechanism.17 Meloni further reinforced the “golden power” rules in 2023, restricting ChemChina’s influence over Pirelli and curbing Huawei and ZTE in the telecommunications sector. Huawei’s share in Italy’s 5G infrastructure has since fallen from over 50 percent in 2019 to about 35 percent in 2024.18 Yet dependence remains, as Huawei and ZTE built much of Italy’s 4G network.19 Today, the “golden power” framework has become central to Italy’s broader de-risking strategy. In May 2025, Italy adopted a “Buy Transatlantic” law, prioritizing procurement from Italy, the EU, NATO, and allied partners to secure ICT and cybersecurity supply chains. The law goes beyond the EU’s “Buy European” policy and the United States’ “Buy American Act,” fostering a transatlantic zone of trusted suppliers and potentially serving as a model for defense procurement.

Security: Chinese diaspora networks and covert activities

Italy’s view of China has shifted from economic optimism to strategic caution, with heightened concerns about security, covert influence, and geo-economic risks. Rome’s 2019 BRI decision alarmed both the United States and the EU, while at home, politicians and security experts warned about Chinese investment in strategic sectors and the implications for Italy’s Western alignment.

Chinese information operations, which intensified during the COVID-19 pandemic alongside Russian propaganda, aimed to undermine democratic debate, promote pro-China narratives, stoke anti-EU “Italexit” sentiment, and weaken societal cohesion.20 Beijing also mobilized its diaspora network in Italy, one of the largest in Europe, with 309,000 people, including 50,000 students, blurring humanitarian engagement with influence operations.21 A report by the Italian parliamentary intelligence oversight committee confirmed these efforts, prompting Italy to strengthen counter-hybrid measures and align more closely with NATO and EU security frameworks to reinforce its transatlantic posture.22

Amid broader concerns about Chinese influence operations,23 reports of unofficial Chinese “police stations” in Italy—used to monitor the Chinese population abroad and force dissidents to return—drew scrutiny. Academic ties have also raised alarms: since the early 2000s, over one thousand agreements between sixty-four Italian and Chinese universities have included cooperative in sensitive dual-use fields such as biomedicine, robotics, and semiconductors. New agreements have declined since 2020 and the current government is preparing national research security guidelines to address security risks in research and academia. Still, sixteen Confucius Institutes operate in Italy without clear regulations.

Prime Minister Meloni has long criticized Beijing, denouncing authoritarianism, mismanagement of the COVID-19 pandemic, human rights abuses in Xinjiang and Hong Kong, and threats against Taiwan.24 While staunchly condemning Russia’s war in Ukraine,25 she has warned that aggression toward Taiwan could jeopardize China’s access to the EU market. Despite limited public support for military aid to Ukraine (currently at 39 percent), Meloni has firmly backed Ukraine while making NATO solidarity, EU strategic autonomy, de-risking efforts, and close ties with the United States the foundation of her China policy.26

Italy’s alignment with the EU’s China policy

Italy’s stance toward China has shifted toward EU alignment, shaped by external pressures and internal political dynamics. In 2017, Rome joined Berlin and Paris in advocating for an EU investment screening mechanism but abstained from the final vote, reflecting internal political divisions that also contributed to its decision to join the BRI in 2019. Its exit from the initiative in December 2023, coupled with stronger enforcement of “golden power” rules, signaled cross-party skepticism of China and Giorgia Meloni’s commitment to transatlantic cooperation.

China’s support of Russia’s war effort in Ukraine further reinforced Italy’s cautious stance, embedding the country firmly within the EU’s de-risking strategy by balancing economic ties with security vigilance. The discreet BRI withdrawal emphasized continuity through the relaunch of the strategic partnership and was aimed at depoliticizing relations while restoring Western credibility. Italian foreign policy is traditionally reactive and fragmented, driven by short-term economic gains and party politics rather than long-term strategic vision. Therefore, Rome is also less inclined than Brussels to cast China as a rival. Under Meloni, however, Italy has aligned more closely with the United States and the EU on security, adopting a cautious approach to limit Chinese access to strategic sectors.

Conclusion

Italy’s China policy has shifted from BRI-era optimism over economic benefits to a pragmatic need for closer alignment with the EU and the United States. Blending transatlantic loyalty with economic caution is now the guiding principle. Rome has strengthened investment screening, blocked Chinese acquisitions in strategic sectors, and withdrawn from the BRI, while still avoiding overtly confrontational rhetoric to protect its exports. The result is a China policy that is less ideological than the European Commission’s systemic rival framing and less securitized than the United States’ rivalry-driven approach. Nonetheless, Italy’s path reflects growing awareness of the geopolitical and security risks of conducting business with China—especially compared with the value- and security-based partnership it enjoys with the United States and the EU.

The US-China rivalry and Beijing’s alignment with Moscow have considerably hardened Italy’s stance. NATO engagement has reinforced Rome’s cautious security posture, limiting Chinese access to critical infrastructure and technology, while Russia’s war in Ukraine has deepened its resolve against Moscow and reaffirmed its commitment to the EU and NATO security frameworks. In the Indo-Pacific region, Italy participates selectively in deployments, signaling solidarity rather than projecting power, and avoids labeling China a direct security threat, focusing instead on resilience and coordination with transatlantic partners.

Economically, Italy balances EU de-risking with national pragmatism. Chinese investment has shifted from major takeovers to smaller greenfield projects under stricter “golden power” rules and EU screening mechanisms. Meloni’s alignment with the tougher US stance on China has reinforced this cautious, de-risking approach. Yet structural constraints remain: many Italian SMEs are linked to German supply chains that ultimately serve China. These dependencies could create domestic political risks if Italy attempts a radical decoupling from China. Italy’s exit from the BRI was a necessary recalibration and geopolitical realignment, not a rupture, as Sino-Italian ties have been repositioned toward a more pragmatic and cautious partnership.

The challenge ahead for Italy is to turn its reactive, domestically driven adjustments into a coherent long-term strategy that reconciles its domestic economic interests with transatlantic alignment. Italy’s ability to successfully balance US and EU demands with domestic economic realities will test both the strategic clarity of its vision and its skill in managing China as a geopolitical rival.

About the author

Related content

Explore the programs

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    Seamus Taggart, “Italian Relations with China 1978–1992: The Long Carnival Decade—Burgeoning Trade and Diplomatic Kudos,” Cahiers de la Méditerranée 88 (2014), 113–134, https://journals.openedition.org/cdlm/7512.
2    Nicola Casarini and Marco Sanfilippo, “Italy and China: Investing in Each Other,” in Mikko Huotari, et al., eds., “Mapping Europe–China Relations: A Bottom-Up Approach,” Mercator Institute for China Studies, October 2015, 46–50, https://www.iai.it/sites/default/files/2015_etnc_report.pdf.
3    “Italy Imports from China,” Trading Economics, last visited October 10, 2025, https://tradingeconomics.com/italy/imports/china.
4    The Conservative–Liberal coalition (2010–2015) pursued a liberal, finance-driven approach to China, laying the groundwork for the so-called “golden era” in bilateral relations. Coined around Xi Jinping’s 2015 state visit, the term reflected the David Cameron government’s effort to deepen engagement and attract Chinese investment in finance and infrastructure. William Matthews, “What the UK Must Get Right in Its China Strategy: Resilience, Flexibility and Autonomy as Core Principles for Engagement,” Chatham House, July 2025, https://www.chathamhouse.org/sites/default/files/2025-07/2025-07-08-uk-china-strategy-matthews.pdf.
5    “Italy Exports by Country,” Trading Economics, last visited October 10, 2025, https://tradingeconomics.com/italy/exports-by-country.
6    “China Imports by Country,” Trading Economics, last visited October 10, 2025, https://tradingeconomics.com/china/imports-by-country.
7    Agatha Kratz, et al., “Chinese Investment Rebounds Despite Growing Frictions—Chinese FDI in Europe: 2024 Update,” Mercator Institute for China Studies and Rhodium Group, May 21, 2025, https://merics.org/en/report/chinese-investment-rebounds-despite-growing-frictions-chinese-fdi-europe-2024-update.
8    “China Global Investment Tracker,” American Enterprise Institute, last visited October 9, 2025, https://www.aei.org/china-global-investment-tracker/.
9    Karin Smit-Jacobs, “Chinese Strategic Interests in European Ports,” Think Tank, European Parliament, February 27, 2023, https://www.europarl.europa.eu/thinktank/en/document/EPRS_ATA%282023%29739367.
10    Until 2005, global textile trade was governed by the Multi-Fibre Arrangement (MFA), but after its expiry on January 1, 2005, China’s low-cost textile exports surged—rising by more than 200 percent in Europe within six months. Italy’s textile industry was among the hardest hit, struggling to withstand the influx of cheap Chinese imports.
11    “The EU and China in ‘bra wars’ deal,” The Guardian, September 6, 2005, https://www.theguardian.com/business/2005/sep/06/politics.europeanunion.
12    Valbona Zeneli and Federica Santoro, “COVID 19 Pandemic and How It Affected Sino Italian Relations,” Orbis, Foreign Policy Research Institute, July 12, 2023, https://www.fpri.org/article/2023/07/covid-19-pandemic-and-how-it-affected-sino-italian-relations/.
13    Valbona Zeneli, “Italy’s ‘Arrivederci’ to China’s BRI Could Be a Template for Others,” Atlantic Council, December 11, 2023, https://www.atlanticcouncil.org/blogs/new-atlanticist/italys-arrivederci-to-chinas-bri-could-be-a-template-for-others/.
14    Carlo Pietrobelli, Roberta Rabellotti, and Marco Sanfilippo, “Chinese FDI Strategy in Italy: The ‘Marco Polo’ Effect,” International Journal of Technological Learning, Innovation and Development 4, 4 (2011), 277–291, https://www.researchgate.net/publication/264821612_Chinese_FDI_strategy_in_Italy_The_%27Marco_Polo%27_effect.
15    “Golden Power: The Italian Government’s Powers over Companies of Strategic Importance,” Rödl & Partner, May 10, 2024, https://www.roedl.com/insights/italien/golden-power-italian-government-powers-companies-strategic-importance.
16    Daniele Lepido, “Italian Lawmakers Urge Government to Consider Huawei 5G Ban,” Bloomberg, December 20, 2019, https://www.bloomberg.com/news/articles/2019-12-20/italian-lawmakers-urge-government-to-consider-huawei-5g-ban.
17    The “golden power” instrument has been used to prevent three Chinese takeovers, and undo one takeover that had been concluded during the previous government. These actions started with the blocking of the Chinese Shenzhen Investment Holdings from acquiring the Italian semiconductor enterprise LPE (specializing in epitaxy reactors). The prospective buyer had ties with the Chinese arms industry. The Italian government has blocked a Chinese robot maker’s 2-million euro investment in a domestic robotics company under the country’s “golden power law” for sensitive industries.
18    “Is There a Correlation between European Nations’ Level of Chinese Telecom Equipment, the Consumption of Russian Energy, and Military Aid to Ukraine?” Strand Consult, March 18, 2025, https://strandconsult.dk/is-there-a-correlation-between-european-nations-level-of-chinese-telecom-equipment-the-consumption-of-russian-energy-and-military-aid-to-ukraine/.
19    In 2020, the Italian government reviewed seventeen telecom-related cases; Huawei’s bid to supply Fastweb’s core 5G equipment was blocked, while the other sixteen proceeded under special conditions and monitoring.
20    Zeneli and Santoro, “COVID 19 Pandemic and How It Affected Sino Italian Relations.”
21    “ISTAT. Popolazione Residente e Dinamica Della Popolazione,” POP.ACLI, January 8, 2025, https://pop.acli.it/rubriche/post-it/759-istat-popolazione-residente-e-dinamica-della-popolazione.
22    Gabriele Carrer, “Hybrid Threats from Russia and China: Italy under Siege,” Decode39, March 4, 2025, https://decode39.com/10078/hybrid-threats-from-russia-and-china-italy-under-siege/.
23    Gabriele Carrer, “Chinese ‘Police Stations’ in Italy under US Scrutiny,” Decode39, April 3, 2025, https://decode39.com/10078/hybrid-threats-from-russia-and-china-italy-under-siege/.
24    Serena Console, “Come Potrebbe Comportarsi il Governo di Meloni con la Cina,” Today, September 23, 2022, https://www.today.it/politica/governo-meloni-rapporti-cina-taiwan-elezioni-25-settembre.html.
25    “Meloni si Schiera con Taiwan: ‘Ferma Condanna per l’Inaccettabile Condotta della Cina [Meloni sides with Taiwan. Strong condemnation for the unacceptable behavior of China],” Agenzia Nova, September 23, 2022, https://www.agenzianova.com/news/meloni-si-schiera-con-taiwan-ferma-condanna-per-linaccettabile-condotta-della-cina.
26    “Transatlantic Trends 2022: Public Opinion in Times of Geopolitical Turmoil,” German Marshall Fund of the United States and Bertelsmann Foundation, September 29, 2022, https://www.gmfus.org/sites/default/files/2022-09/Transatlantic%20Trends%202022.pdf.

The post Italy’s policy on China: The Belt and Road gamble and its aftermath appeared first on Atlantic Council.

]]>
Germany’s policy on China: From win-win to strategic competition https://www.atlanticcouncil.org/in-depth-research-reports/report/germanys-policy-on-china-from-win-win-to-strategic-competition/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=881692 Germany’s China policy has shifted from economic optimism to cautious competition—balancing trade interests with mounting security concerns. Once built on deep interdependence, Berlin now prioritizes “de-risking” and resilience in its approach to Beijing.

The post Germany’s policy on China: From win-win to strategic competition appeared first on Atlantic Council.

]]>
This is the fifth chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy.Read the full report here.

Germany’s relationship with China has evolved significantly over the past decades, with economic cooperation forming the backbone of bilateral ties. Its early posture toward Beijing mirrored its Cold War-era approach to trade with the Soviet Union—focused on pragmatic economic engagement despite political differences. As an outlier within the European Union (EU), Germany’s approach to China stood out for its industrial complementarity, mutual benefit, and limited political friction. This “win-win” model, formalized in a 2004 strategic partnership and upgraded to a comprehensive strategic partnership in 2014, fueled prosperity but also deepened dependency, shaping the EU’s broader asymmetry in dealing with China.1

The first disagreements emerged over human rights issues in Tibet and Xinjiang, but economic interest prevailed under Chancellor Angela Merkel’s “Wandel durch Handel” (“change through trade”) doctrine, which assumed that engagement with authoritarian regimes would eventually spur political liberalization.2 By 2016, China had become Germany’s largest trading partner, and its acquisitions of strategic firms such as Kuka and Aixtron triggered alarm over technological vulnerabilities. The Federation of German Industries (BDI) framed China as a systemic competitor in 2019, helping shape the EU’s “partner, competitor, rival” approach that same year. Merkel, however, continued to prioritize engagement, championing the Comprehensive Agreement on Investment (CAI) during Germany’s 2020 EU Council Presidency.3

The 2020s brought a reckoning. The pandemic, supply chain shocks, and Beijing’s increasing alignment with Moscow exposed the risks of overreliance. In 2021, Chancellor Olaf Scholz’s government included the term “Taiwan” in its coalition agreement for the first time and openly framed China as a rival.4 Berlin’s 2023 China Strategy marked a cautious pivot—reducing dependencies and emphasizing competition while preserving cooperation on global challenges.

Under Chancellor Friedrich Merz, Germany has aligned more closely with the EU’s “de-risking” agenda, dropping the term “partnership” from its China rhetoric and stressing competition and rivalry.5 Yet domestic resistance and corporate lobbying have slowed this shift. Today, Germany’s China policy mirrors the EU’s broader evolution—from optimism to caution, and from partnership to rivalry. As Europe’s largest economy and a key driver of integration, Berlin’s choices shape the EU’s China policy, even as its approach remains reactive, constrained by economic dependence, transatlantic expectations, and European ambitions.

Trade and investment: From growth engine to rivalry

Germany’s engagement with China dates back to the late nineteenth century, when it seized Jiaozhou Bay—home to the city of Qingdao—and began investing heavily in the colony’s infrastructure and industry. After decades of turbulent relations, the two countries established diplomatic ties in 1972, with a primary focus on economic cooperation. In the years that followed, Germany and China built a close trade relationship, grounded in extensive exchanges of goods and industrial complementarity. The German industry supplied cars, machinery, chemicals, and engineering know-how that fueled China’s growth while sustaining high-paying jobs at home, making Germany the EU’s growth engine.

Trade has grown by more than 900 percent since 2001—from $27 billion to $273 billion in 2024—with Germany accounting for 35 percent of total EU-China trade. While the United States was still reeling from the surge of low-cost Chinese imports and China’s entry into the World Trade Organization (WTO), Germany thrived on Chinese demand, particularly in the automotive, machinery, and chemical industries.6 This complementarity allowed German firms to weather economic shocks better than their peers—a rare “win-win” scenario. As an outlier within the EU, Germany stood out for its emphasis on industrial cooperation and limited political confrontation. The “win-win” relationship—with Germany exporting advanced technologies, luxury cars, and high-end products, and China supplying inexpensive consumer goods—created a structural imbalance in Europe’s engagement with China.

The first major rift between Berlin and Beijing arose over human rights issues in Tibet and Xinjiang, as well as Chancellor Angela Merkel’s 2007 meeting with the Dalai Lama, after which China suspended the Sino-German Rule of Law Dialogue.7 Despite these tensions, Berlin’s China policy remained rooted in Merkel’s “Wandel durch Handel” approach, emphasizing broad cooperation agreements intended to balance economic interests with Germany’s values-driven foreign policy.8 In the years that followed, China surpassed the United States to become Germany’s largest trading partner—initially fueling cautious optimism but later prompting alarm over Chinese acquisitions of high-tech firms such as Kuka and Aixtron.9

By 2020, the tables had turned. Chinese imports to Germany jumped 98 percent between 2020 and 2022 (from $105 billion to $208 billion), while German exports fell by 10 percent (from $110 billion in 2020 to $98 billion in 2024).10 Import growth slowed in 2024 as Berlin ended electric vehicle (EV) purchase subsidies and the EU imposed tariffs of up to 45 percent on Chinese EVs. Yet Germany still posted a $77 billion trade deficit, marking the end of balanced trade. Today, China is Germany’s top import partner (13 percent of total imports) but only its fifth-largest export market (6 percent of total exports). By 2024, China’s cumulative foreign direct investment (FDI) in Germany reached $35 billion, making it Germany’s tenth largest investor. That same year, China ranked as Germany’s third largest source of new FDI projects, while German FDI in China climbed to $80 billion—accounting for nearly 60 percent of all EU investment there.

The strain of this new relationship is most visible in the automotive and machinery sectors, while industries where China still lags—such as measurement equipment and pharmaceuticals—remain relatively resilient for now. China’s imports of German auto parts fell 22 percent between 2021 and 2023, signaling a weakening of industrial linkages.11 A partnership that was once mutually beneficial has become marked by asymmetry, intensified competition, and geopolitical strain.

As a result, Berlin has recalibrated its approach to China—a shift driven primarily by three factors: China’s rapid ascent up the value chain, its economic slowdown, and rising geopolitical risks.12 Beijing’s industrial push, crystallized in its “Made in China 2025” plan, was reinforced by a surge of acquisitions of European firms. Chinese FDI in Europe peaked at nearly $40 billion in 2016, including $12 billion in Germany alone.13That year, Merkel warned that China was emerging as an economic rival, while Beijing pressed for WTO market-economy status to weaken European trade defenses.14

The European Parliament, European industry, and labor unions—led by the steel sector mobilized in opposition, marking the EU’s first coordinated pushback.15 In 2019, the BDI publicly labeled China as a “systemic competitor,” issuing fifty-four policy demands, which urged the EU to reduce its dependence on the Chinese market, strengthen industrial policy, and ensure trade reciprocity.16 Merkel nonetheless continued to pursue engagement, using Germany’s 2020 EU Council Presidency to advocate for the CAI.17 She worked closely with French President Emmanuel Macron, presenting the effort as “strategic autonomy,” partly to shield European industry from the unpredictability of the first Trump administration and in response to pressure from German corporations deeply invested in China. Although Merkel never called China a “rival,” the BDI’s leadership helped steer Europe toward a more sober and defensive stance.

As the 2020’s ushered in the COVID-19 pandemic and exposed global supply chain vulnerabilities, Russia’s war in Ukraine and Beijing’s alignment with Moscow underscored the need for “de-risking” and diversification. Germany began reducing vulnerabilities while avoiding full decoupling, seeking to preserve dialogue even amid growing tension. In 2021, the newly-elected German government introduced tougher language on China, referencing Taiwan in its coalition agreement and framing China as a rival.18 Moreover, Germany’s 2023 China strategy seeks to cut dependencies in critical sectors, protect infrastructure, and counter espionage, while maintaining cooperation on global challenges such as climate change. Chancellor Olaf Scholz has combined criticism of market barriers and Chinese industrial overcapacity with acknowledgment of China’s importance for energy transition and innovation—signaling a pragmatic balancing act between German economic interests and continuity.

European Commission President Ursula von der Leyen’s “de-risking” agenda aligns with Berlin’s rhetoric as codified in its 2023 strategy. Yet many multinationals interpret this approach as deeper localization in China rather than genuine diversification.19 The “Mittelstand”—Germany’s small and medium-sized enterprises—faces intense competition as Chinese firms, having mastered their technologies, now outcompete them. With limited government support, de-risking remains more slogan than strategy.

In November 2022, a group of leading German business executives warned in the Frankfurter Allgemeine Zeitung that de-risking had gone too far, arguing that access to the world’s second largest market remains vital for competitiveness and jobs.20 This position echoed Scholz’s emphasis on reducing one-sided dependencies without full “decoupling,” contrasting sharply with Foreign Minister Annalena Baerbock’s much tougher stance on China—underscoring divisions within the coalition of the chancellor’s Social Democratic Party (SPD) and the foreign minister’s Green Party. Beijing, in turn, dismissed de-risking as “decoupling by another name,” while Premier Li Qiang assured German industrialists that “failure to cooperate was the biggest risk.”21

By 2025, awareness of risks had sharpened. Even trade unions such as IG Metall began pressing for measures once considered taboo.22 Protectionist instruments multiplied, signaling a major shift in industrial thinking. Still, divisions persisted. While the chemical and machinery sectors adjusted, the German automotive industry opposed tariffs on Chinese EVs, fearing the loss of key markets. As a result, Germany voted against broad EU tariffs.23 Rather than retreating, German firms doubled down on an “in China, for China” strategy, embedding production, research and development (R&D), and supply chains in the People’s Republic to remain competitive and shield against political shocks. In its 2023/24 survey, the German Chamber of Commerce in China found that over 90 percent of its members planned to maintain operations, with more than half intending to expand.24 In 2024, German firms invested €5.7 billion in China—accounting for 45 percent of EU and UK FDI in the country—with the automotive sector responsible for nearly three-quarters of the total investment.25 In that sense, Germany’s China playbook is shifting from economic complementarity to managed exposure: selective corporate deepening inside China to stay competitive, paired with EU-German derisking at home.

Technology: Industrial innovation and strategic exposure

Germany’s technological ties with China are characterized by a mix of cooperation and competition. What began as one-way technology transfer has evolved into partnerships: German firms co-develop and localize advanced technologies in China—especially EVs, smart manufacturing, and green systems—while collaborating on Industry 4.0 standards and interoperability.26 Chinese technological upscaling and import-substitution are displacing foreign suppliers and eroding German market share in EVs, batteries, machine tools, and industrial software driven by artificial intelligence (AI), both in China and in third markets.

Berlin has responded with de-risking, stricter investment screening, and trade defenses. Meanwhile, Germany’s large corporations have adapted through greater integration with the Chinese market, via “in China, for China” localization, “dual play” strategies, parallel supply chains, IP ring-fencing, and selective alliances. Viewing China as an innovation hub, German firms are localizing R&D and supply chains within the country to leverage scale and speed. Initiatives such as the Sino-German Standardization Innovation Center in Frankfurt, launched in 2025, promote industrial coordination and signal a commitment to building a joint technology ecosystem.27 Still, there is no one-size-fits-all corporate strategy, as the case of Infineon, Germany’s leading semiconductor company, illustrates. Infineon is pursuing a strategy of “targeted deepening,” carefully expanding ties with China to meet market demand while navigating the strategic sensitivities of semiconductors.

With regard to foreign investment screening, the 2016 takeover of German robot maker Kuka by the Chinese Midea Group was a turning point for Germany and the EU, highlighting Europe’s lack of defenses against strategic acquisitions in robotics and Industry 4.0. This triggered a chain reaction: amendments to the Foreign Trade and Payments Ordinance in 2017 tightened the national screening regime, lowering the threshold for when foreign acquisitions must be reviewed. In 2021, the rules became even stricter—any attempt by a foreign buyer to acquire more than 10 percent of a sensitive company can now trigger government scrutiny.

The main concern is that US chip controls combined with China’s rapid AI advances are accelerating a global tech split, leaving Germany squeezed and potentially falling behind in key technology fields. In July 2024, Berlin decided to exclude Chinese companies such as Huawei and ZTE from its 5G network products, aligning its telecom security policy with EU guidance after years of delay.28 A previous push by members of the Christian Democratic Union of Germany (CDU) to exclude Huawei from 5G, considering it a national security issue, had been blocked by Merkel, who maintained that no vendor should be barred if it met security requirements.29 Ultimately, Berlin adopted the EU’s 5G Toolbox as the framework for its approach. However, the fact that Huawei still accounted for 59 percent of Germany’s 5G RAN equipment and 57 percent of its 4G network in 2022 shows how firmly Chinese technology remains embedded in the country’s critical infrastructure.30

The German auto industry’s “China shock”

Many in Germany consider automakers the country’s economic lifeblood. With this in mind, it seemed rational to establish a market presence in China, entering the country in the 1980s through joint ventures that exchanged technology transfer for market access. There is little doubt that with this approach, Germany played a central role in developing China’s automotive sector. By 2009, China had overtaken the United States as the world’s largest automotive market, with German companies operating over 350 sites.

One outcome of Germany’s engagement in China was the transfer of technological knowledge and manufacturing expertise. Combined with Beijing’s heavy subsidies and industrial strategies—“Made in China 2025,” dual circulation, and dual carbon policies— China had built a complete EV value chain by 2015, while Germany remained largely tied to the combustion engine.31 By 2024, nearly half of China’s car sales were electric, representing two-thirds of global EV sales. Chinese brands like BYD, Geely, and NIO surged, with BYD surpassing Volkswagen as China’s best-selling brand.

The consequences for German firms were severe. Between 2022 and 2024, exports to China plunged 70 percent, while foreign automakers’ market share dropped from 53 percent to 33 percent. Yet since 2019, German companies had produced more cars in China than at home, increasingly relying on local suppliers and investing in Chinese EV and battery makers. In 1992, China produced approximately one million vehicles per year—by 2024, it reached 31 million, with roughly 40 percent (thirteen million units) classified as new energy vehicles (NEVs).32 China maintained its lead among major markets, with electric car sales exceeding 11 million—more than the global total just two years earlier.33 By 2025, its annual NEV production capacity is projected to reach twenty-five million vehicles, surpassing the combined output of Germany, Japan, and the United States.

With domestic demand unable to absorb this output, Chinese automakers are targeting global markets, including Europe, where BYD and NIO are gaining ground. For Germany, long reliant on China as its largest automotive market, this shift is a direct threat. Chinese firms now dominate at home and are challenging German manufacturers in Europe. Germany’s automakers thus face a dual squeeze—shrinking margins in China and rising competition from Chinese EVs worldwide.

Security: Responding to China’s global ambitions

Germany’s security outlook has shifted markedly in recent years, shaped by growing concerns over espionage, cyberattacks, and Beijing’s global assertiveness. Chinese hacking campaigns targeting German institutions—from the Federal Agency for Cartography to CDU party headquarters—have become routine.34 High-profile espionage cases in 2024 and 2025, including arrests of parliamentary aides, put Berlin’s security community on high alert. These incidents reinforced political support for stricter investment screening and raised doubts about whether China could still be treated as a straightforward “partner.”

In 2021, the Scholz administration signaled both continuity and change in its China policy. While building on Merkel’s approach, the coalition agreement adopted noticeably sharper language—describing China as a “partner, competitor, and systemic rival,” and making it the first official document to explicitly label Beijing a “rival.”35 Moreover, the coalition agreement explicitly mentioned Taiwan, marking a significant departure from past practice. Under Merkel, Taiwan had been entirely absent from Germany’s so-called policy guidelines for the Indo-Pacific, which framed the region in economic and multilateral rather than security terms.36 By contrast, the Scholz government’s 2024 progress report on the implementation of guidelines referenced Taiwan at least five times.37

In July 2023, Germany published its first dedicated China strategy, despite internal disputes between the Greens’ Foreign Ministry and the SPD-led Chancellery. The Greens advocated a values-based, critical stance on China, while Scholz’s party favored a pragmatic, trade-oriented approach centered on stability and engagement.38 The final document underscores China’s “systemic rivalry” but also notes that addressing global challenges requires cooperation with Beijing. Notably absent, however, is the EU’s “partner, competitor, rival” formula. Instead, the strategy omits any reference to “partner,” referring only to “cooperation.” The 2025 coalition agreement under Chancellor Merz commits to further revising the strategy “according to the principle of de-risking,” with greater emphasis on defense, cyber, infrastructure, and disinformation.39

Germany’s understanding of “rivalry” has also evolved. While it initially referred primarily to China’s authoritarian governance, it now encompasses Beijing’s challenge to the international order itself. China is no longer seen as merely more assertive, but as actively seeking to reshape global rules, promote multipolarity, and advance Beijing-centric frameworks—as illustrated by its ten-point paper on Ukraine.40 Russia’s 2022 invasion of Ukraine exposed the dangers of dependency on autocratic powers, prompting Berlin to stress resilience in critical technologies, supply chains, and democratic institutions. Critics of the Nord Stream 2 pipeline—built to carry Russian gas directly to Germany through the Baltic Sea—were vindicated, recalling earlier warnings that Vladimir Putin would weaponize energy.41

Since then, military developments have added further urgency. German Foreign Minister Johann Wadephul has warned that China’s assertive posture in the South China Sea threatens not only stability in Asia but also the international rules-based order and Europe’s economic lifelines.42 Beijing’s continued support for Russia throughout its war in Ukraine has deepened perceptions of systemic rivalry, fusing security concerns with the economic risks of overdependence on China.

New measures adopted in 2025 further illustrate this shift. The KRITIS law, implementing an EU directive, obliges operators of critical infrastructure in energy, transport, finance, health, and water to secure their installations against sabotage and cyberattacks. While prompted by Russia’s aggression and recent sabotage incidents, the law also reflects mounting concern over Chinese cyber operations.

Germany’s alignment with the EU’s China policy

While Germany’s China policy broadly aligns with the EU’s overall approach, Berlin has also played a pivotal role in shaping Brussels’ strategy from the outset—emphasizing economic engagement and industrial competitiveness. In response, Beijing has adopted a “twin-track” strategy, offering Germany reassurance and high-level access while simultaneously pushing back at the EU level with countermeasures when trade, defense and technology controls impinge on its interests.43

On the economic front, Germany was instrumental in shaping the EU’s “partner, competitor, rival” framework on China. While Chancellor Merkel resisted the term “systemic rival,” preferring to emphasize competition alongside partnership and cautioning against demonizing China for its success, the BDI helped frame China as a competitor.44 Berlin promoted a balanced approach—addressing unfair competition and limited market access without isolating Beijing.

Germany also shaped EU trade and investment policy, most notably by advancing the CAI after seven years of stalled talks. During Germany’s presidency of the Council of the EU in late 2020, Merkel made CAI a priority, urging the Commission to accelerate negotiations and securing an “agreement in principle” on 30 December, 2020.45 While this demonstrated Berlin’s influence in EU policymaking, it also exposed divisions within the EU and with the European Parliament, which criticized weak labor provisions and the lack of coordination with the United States.46 Merkel’s push for the deal appeared driven by Donald Trump’s “Phase One” agreement, transatlantic uncertainty, and pressure from German corporations heavily invested in China. Soon after, Merkel’s own party called for a stronger transatlantic approach to China, highlighting contradictions between her late push for CAI and the strategic consensus emerging within the EU and NATO.

In 2017, Germany, along with France and Italy, urged the European Commission to establish a common framework for investment screening, motivated by China’s 2016 takeover of Kuka. Berlin ultimately played a leading role in shaping the EU’s investment screening mechanism, formally adopted in 2019.47 Germany’s national regime, the so-called Außenwirtschaftsgesetz, is among the strictest in Europe and has been used to block or condition Chinese acquisitions.48 Pressure from German industry also helped steer the EU away from outright “decoupling” and toward a more moderate strategy of “de-risking,” later embraced by both Berlin and Brussels. Germany’s 2023 inaugural China strategy signaled a decisive shift from a business-centric posture to a strategic-industrial approach, aligning with the EU’s economic security narrative and lending political weight to Brussels’ new instruments.49

On technology, the EU has increasingly defined China as a systemic rival, introducing protective measures such as semiconductor export controls, 5G security guidelines, and investment screening,—while coordinating closely with the United States on standards and governance in areas like AI and quantum computing. Germany has been central to this agenda yet has prioritized industrial competitiveness, initially delaying restrictions on Huawei and favoring de-risking over decoupling. Thus, the EU’s approach is more security-oriented, while Berlin’s strategy remains industry-oriented. Nonetheless, Germany’s 2023 China strategy shows growing convergence with the EU’s approach to China by recognizing digital infrastructure and supply chain vulnerabilities.

On security, Germany’s China policy has evolved significantly. During Merkel’s tenure, Berlin prioritized “Wandel durch Handel” and economic stability, often softening EU initiatives by downplaying security issues such as Taiwan, the South China Sea, and Beijing’s alignment with Moscow. Under Scholz, Germany adopted tougher language and cautiously endorsed de-risking while protecting corporate interests. Since Merz has taken office, Berlin has aligned more closely with Brussels, dropping “partnership” language, explicitly framing China as a “competitor and rival,” and emphasizing resilience, cyber defense, and critical infrastructure protection—though corporate dependence still tempers a radical strategic break.

Through its dual role as Europe’s largest economy and a key geopolitical actor, Germany has helped steer the EU toward a more balanced China strategy—neither purely values-driven nor narrowly security-focused, but grounded in strategic pragmatism.

About the author

Related Content

Explore the programs

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    “Die Gemeinsame Deutsch-Chinesische Erklärung,” German China.org.cn, Dezember 2004, https://german.china.org.cn/german/237912.htm; “Join Declaration on the Occasion of Chinese President Xi Jinping’s State Visit to Germany from 28 to 30 March 2014: Establishment of a Comprehensive Strategic Partnership between Germany and China,” Federal Government of Germany, March 28, 2014, https://www.bundesregierung.de/breg-en/service/archive/archive/joint-declaration-between-germany-and-china-460244.
2    Mikko Huotari, “A New German Strategy toward China,” Mercator Institute for China Studies (MERICS), March 10, 2025, https://merics.org/en/comment/new-german-strategy-toward-china.
3    “Partner and Systemic Competitor—How Do We Deal with China’s State-Controlled Economy?” BDI, January 2019, https://www.wita.org/wp-content/uploads/2019/01/201901_Policy_Paper_BDI_China.pdf; Lily McElwee, “The Rise and Demise of the EU-China Investment Agreement: Takeaways for the Future German Debate on China,” Center for Strategic and International Studies, March 20, 2023, https://www.csis.org/analysis/rise-and-demise-eu-china-investment-agreement-takeaways-future-german-debate-china.
4    Chancellor Olaf Scholz’s government (2021–2025) was commonly referred to as the Ampelkoalition (traffic light coalition) including the Social Democratic Party (SPD) (red), Free Democratic Party (FDP) (yellow), Alliance 90/the Greens (green). “Dare More Progress: Alliance for Freedom, Justice and Sustainability. Coalition Agreement 2021–2025,” SPD, Alliance 90/the Greens, and FDP, November 24, 2021, 144, https://www.spd.de/koalitionsvertrag2021.
5    “Coalition Agreement: Responsibility for Germany,” Federal Government of Germany, April 9, 2025, https://www.bundesregierung.de/breg-en/federal-government/coalition-agreement-482268.
6    Noah Barkin and Gregor Sebastian, “Tipping Point? Germany and China in an Era of Zero-Sum Competition,” Rhodium Group, February 15, 2024, https://rhg.com/research/tipping-point-germany-and-china-in-an-era-of-zero-sum-competition.
7    “Tension Over Dalai Lama Meeting: China Cancels Human Rights Talks With Germany,” Der Spiegel International, October 15, 2007, https://www.spiegel.de/international/germany/tension-over-dalai-lama-meeting-china-cancels-human-rights-talks-with-germany-a-511473.html.
8    Huotari and Weidenfeld, “Germany’s China Policy.”
9    Cynthia Wrage and Jakob Kullik, “After Kuka—Germany’s Lessons Learned from Chinese Takeovers,” China Observers in Europe, July 21, 2022, https://chinaobservers.eu/after-kuka-germanys-lessons-learned-from-chinese-takeovers/; Maria Sheahan and Caroline Copley, “Germany Withdraws Approval for Chinese Takeover of Aixtron,” Reuters, October 24, 2016, https://www.reuters.com/article/business/germany-china-technology-takeover-idUSKCN12O13F.
10    “Germany Imports from China,” Trading Economics, last visited October 14, 2025, https://tradingeconomics.com/germany/imports/china.
11    Barkin and Sebastian, “Tipping Point? Germany and China in an Era of Zero-Sum Competition.”
12    Mikko Huotari and Max J. Zenglein, “Germany’s Dilemma over Strategic Recalibration with China,” Mercator Institute for China Studies, May 13, 2025, https://merics.org/en/report/germanys-dilemma-over-strategic-recalibration-china.
13    Thilo Hanemann and Mikko Huotari, “Record Flows and Growing Imbalances: Chinese Investment in Europe in 2016,” Mercator Institute for China Studies and Rhodium Group, January 3, 2017, https://merics.org/en/report/record-flows-and-growing-imbalances-chinese-investment-europe-2016.
14    Arne Delfs, “Merkel Says China Increasingly Becoming Germany’s Economic Rival,” Bloomberg, June 14, 2016, https://www.bloomberg.com/news/articles/2016-06-14/merkel-says-china-increasingly-becoming-germany-s-economic-rival.
15    Jonathan Stearns and Ewa Krukowska, “Chinese Trade Threat Prompts Steel-Led EU Industry Protest,” Bloomberg, February 15, 2016, https://www.bloomberg.com/news/articles/2016-02-15/chinese-trade-threat-prompts-steel-led-eu-industry-demonstration?.
16    “Partner and Systemic Competitor.”
17    McElwee, “The Rise and Demise of the EU-China Investment Agreement.”
18    “Dare More Progress,” 144.
19    “Strategy on China of the Government of the Federal Republic of Germany,” Government of the Federal Republic of Germany, 2023, https://www.auswaertiges-amt.de/resource/blob/2608580/49d50fecc479304c3da2e2079c55e106/china-strategie-en-data.pdf.
20    “German Business Leaders Warn against Pulling out of China,” Associated Press, November 10, 2022, https://apnews.com/article/europe-business-china-beijing-germany-2b9ce7a1b492ac4ad708521a218697f4.
21    Geir Moulson, “German Foreign Minister Urges Caution in China Relationship,” Associated Press, October 18, 2022, https://apnews.com/article/russia-ukraine-business-china-germany-152ada23c0bded3861d40cd55dd77169; “Chinese Premier Says Risk Prevention, Cooperation Not Opposites,” Xinhua, June 20, 2023, https://english.www.gov.cn/news/202306/20/content_WS6490d06dc6d0868f4e8dd003.html.
22    “Germany to Hold Steel and Automotive Summits: IG Metall Calls for Concrete Results,” Eurometal, September 9, 2025, https://eurometal.net/germany-to-hold-steel-and-automotive-summits-ig-metall-calls-for-concrete-results/.
23    “German Government Voted against EU Tariffs on EVs from China, Source Says,” Reuters, October 4, 2024, https://www.reuters.com/business/autos-transportation/german-government-voted-against-eu-tariffs-evs-china-source-says-2024-10-04/.
24    “German Firms Plan to Continue Operations in China,” Business Confidence Survey 2023/24, German Chamber of Commerce in China, January 24, 2024, https://china.ahk.de/en/download/business-confidence-survey.
25    Giulia Interesse, “China-Germany Economic Relations 2025: What Merz’s Leadership Means for Trade and Investment,” China Briefing, May 26, 2025, https://www.china-briefing.com/news/china-germany-relations-2025-merz-leadership-trade-investment/?utm.
26    Industry 4.0, or Fourth Industrial Revolution, refers to the ongoing transformation of manufacturing and industrial processes through digitalization, automation, and data-driven technologies. Henning Kagermann, Wolfgang Wahlster, and Johannes Helbig, “Recommendations for Implementing the Strategic Initiative INDUSTRIE 4.0,” National Academy of Science and Engineering and Forschungs Union, 2013, https://en.acatech.de/wp-content/uploads/sites/6/2018/03/Final_report__Industrie_4.0_accessible.pdf.
27    “Frankfurter Innovationszentrum für Standardisierungskooperation Zwischen China und Deutschland Eröffnet,” Taicang Municipal People’s Government, June 25, 2025, https://www.globenewswire.com/de/news-release/2025/06/26/3105529/0/de/Frankfurter-Innovationszentrum-für-Standardisierungskooperation-zwischen-China-und-Deutschland-eröffnet.html.
28    Tim Nicholas Ruhlig, “The ‘Huawei Saga’ in Europe Revisited: German Lessons for the Rollout of 6G,” French Institute for International Relations, 2025, https://www.ifri.org/sites/default/files/2025-06/ifri_ruhlig_huawei_saga_europe_2025.pdf.
29    Ben Knight, “Angela Merkel Faces Party Revolt over Huawei in German 5G Rollout,” Deutsche Welle, November 22, 2019, https://www.dw.com/en/angela-merkel-faces-party-revolt-over-huawei-in-german-5g-rollout/a-51372875.
30    “The Market for 5G RAN in Europe: Share of Chinese and Non-Chinese Vendors in 31 European Countries,” Strand Consult, last visited October 14, 2025, https://strandconsult.dk/the-market-for-5g-ran-in-europe-share-of-chinese-and-non-chinese-vendors-in-31-european-countries.
31    “Made in China 2025” is a Chinese government strategy launched in 2015 to transform China into a global leader in high-tech industries and reduce dependence on foreign technology by 2025 and lead global manufacturing innovation by 2049. The plan focuses on ten priority sectors, using a mix of state planning, subsidies, investment funds, and joint venture requirements to achieve the plan’s goals. Notice of the State Council on the Publication of ‘Made in China 2025,’” Center for Security and Emerging Technology, March 10, 2022, https://cset.georgetown.edu/publication/notice-of-the-state-council-on-the-publication-of-made-in-china-2025/?utm; Dual Circulation is a focused economic strategy in which China prioritizes strengthening domestic demand and innovation (“internal circulation”) while still engaging in global trade and investment (“external circulation”), aiming to make the Chinese economy more self-reliant and resilient amid global uncertainties. In China’s context, “Dual Carbon” refers to the national goals of peaking carbon emissions by 2030 and achieving carbon neutrality by 2060, guiding its transition toward a low-carbon, sustainable economy. Hongquiao Liu, et al., “The Carbon Brief Profile: China,” Carbon Brief, November 29, 2023, https://interactive.carbonbrief.org/the-carbon-brief-profile-china/index.html.
32    Hank Bekker, “2024 (Full Year) China: Car Production and Exports by Brand,” Best-Selling Cars, January 16, 2025, https://www.best-selling-cars.com/china/2024-full-year-china-car-production-and-exports-by-brand/.
33    “Trends in Electric Car Markets,” International Energy Agency, last visited October 14, 2025, https://www.iea.org/reports/global-ev-outlook-2025/trends-in-electric-car-markets-2.
34    Antonia Hmaidi, “‘Here to Stay’: Chinese State-Affiliated Hacking for Strategic Goals,” Mercator Institute for China Studies, November 22, 2023, https://merics.org/en/report/here-stay-chinese-state-affiliated-hacking-strategic-goals.
35    “Dare More Progess.”
36    “Policy Guidelines for the Indo-Pacific Region,” Federal Foreign Office of Germany, August 2020, https://www.auswaertiges-amt.de/resource/blob/2380514/f9784f7e3b3fa1bd7c5446d274a4169e/200901-indo-pazifik-leitlinien–1–data.pdf.
37    “Progress Report on the Implementation of the Federal Government’s Policy Guidelines for the Indo-Pacific,” Federal Foreign Office of Germany, September 25, 2024, https://www.auswaertiges-amt.de/resource/blob/2677460/9fbc35a4f327e4cf6648fadb20e3b56d/240925-llip-fortschrittsbericht-data.pdf.
38    “Strategy on China of the Government of the Federal Republic of Germany.”
39    Esther Goreichy, Jacob Gunter, and Grzegorz Stec, “China’s Overcapacity and the EU + German China Policy under Merz + EU-China Trade,” Mercator Institute for China Studies, May 16, 2025, https://merics.org/en/merics-briefs/chinas-overcapacity-and-eu-german-china-policy-under-merz-eu-china-trade.
40    “China’s Position on the Political Settlement of the Ukraine Crisis,” Ministry of Foreign Affairs, People’s Republic of China, February 24, 2023, https://news.cgtn.com/news/2023-02-24/Full-text-China-s-Position-on-Political-Settlement-of-Ukraine-Crisis-1hG2dcPYSNW/index.html.
41    The Nord Stream 2 pipeline was a Russia-Germany natural gas project completed in 2021 but never operated, as Germany suspended it in 2022 following Russia’s invasion of Ukraine. The United States heavily criticized the pipeline, arguing that it would increase Europe’s dependence on Russian gas and undermine Ukraine’s transit role. In February 2022, two days before Russia’s full-scale invasion of Ukraine, Chancellor Olaf Scholz suspended certification of the pipeline.
42    “German Foreign Minister Criticises ‘Aggressive’ China Ahead of Trip to Japan,” Reuters, August 17, 2025, https://www.reuters.com/world/china/german-foreign-minister-criticises-aggressive-china-ahead-trip-japan-2025-08-17/?utm.
43    Kristin Shi-Kupfer, “Courting Berlin, Countering Brussels: China’s Twin-Track Approach to Germany and the EU,” Mercator Institute for China Studies, July 16, 2020, https://merics.org/de/kommentar/courting-berlin-countering-brussels-chinas-twin-track-approach-germany-and-eu.
44    Dave Lawler, “Merkel Warns against Demonizing China for Its Success,” Axios, January 15, 2020, https://www.axios.com/2020/01/16/angela-merkel-warns-demonizing-china-success.
45    “EU Leaders Optimistic about Investment Protection Agreement with China,” Reuters, September 15, 2020, https://www.reuters.com/article/idUSKBN2660LV/.
46    Hans von der Burchard, “EU-China Investment Deal: Angela Merkel Pushes Finish Line Despite Criticism,” Politico, December 29, 2020, https://www.politico.eu/article/eu-china-investment-deal-angela-merkel-pushes-finish-line-despite-criticism/.
47    “Letter to Commissioner Malmström on Investment Screening,” Bundesministerium für Wirtschaft und Energie. “Schreiben an EU-Handelskommissarin Cecilia Malmström (de-fr-it).” PDF, https://www.bundeswirtschaftsministerium.de/Redaktion/DE/Downloads/S-T/schreiben-de-fr-it-an-malmstroem.pdf?__blob=publicationFile&v=1.
48    Federal Ministry for Economic Affairs and Energy (BMWi). Außenwirtschaftsgesetz (AWG) and Außenwirtschaftsverordnung (AWV), as amended 2020, https://www.bundeswirtschaftsministerium.de/Redaktion/DE/Artikel/Service/Gesetzesvorhaben/aenderungen-im-investitionspruefungsrecht.html.
49    “Strategy on China of the Government of the Federal Republic of Germany”, https://www.auswaertiges-amt.de/resource/blob/2608580/49d50fecc479304c3da2e2079c55e106/china-strategie-en-data.pdf; “European Economic Security Package,” European Commission, June 20, 2023, https://ec.europa.eu/commission/presscorner/api/files/document/print/en/ip_23_3358/IP_23_3358_EN.pdf?utm.

The post Germany’s policy on China: From win-win to strategic competition appeared first on Atlantic Council.

]]>
Hungary’s policy on China: Doing Beijing’s bidding https://www.atlanticcouncil.org/in-depth-research-reports/report/hungarys-policy-on-china-doing-beijings-bidding/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=881876 Under Prime Minister Viktor Orbán, Hungary has emerged as China’s closest ally within the EU, aligning its foreign policy with Beijing’s global agenda and repeatedly obstructing EU efforts to counter Chinese influence.

The post Hungary’s policy on China: Doing Beijing’s bidding appeared first on Atlantic Council.

]]>
This is the seventh chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy.Read the full report here.

Among the varied China policies of European Union (EU) member states, Hungary’s position represents the extreme end of the spectrum. Under Prime Minister Viktor Orbán, the country has become China’s closest ally in the EU, effectively aligning its foreign policy with Beijing’s international priorities and repeatedly obstructing EU efforts to counter Chinese influence. In trade and investment, Hungary has welcomed sizeable Chinese investments, making it the largest recipient of Chinese foreign direct investment (FDI) in the EU in recent years. In technology, Budapest has embraced Huawei’s and ZTE’s participation in its telecommunications sector and partnered with China on numerous Belt and Road Initiative (BRI) projects, including several involving critical infrastructure. Since the start of Russia’s war on Ukraine, Hungary has even deepened its partnership with China on security matters—allowing Chinese police officers to work in the country and tolerating an expanding Chinese intelligence presence.

During the Cold War, Hungary’s relationship with China largely mirrored the trajectory of Soviet-Chinese relations. In the first decade after the establishment of the Hungarian People’s Republic and the People’s Republic of China in 1949, the Sino-Soviet partnership was close, and ties between Budapest and Beijing grew stronger in parallel. When the Sino-Soviet split emerged around 1959, Hungary’s relations with China likewise stagnated and then deteriorated through the 1960s and 1970s.

By the late 1970s, as Deng Xiaoping launched China’s “reform and opening up,” Beijing began to look to Hungary as a model for market-oriented reforms within a socialist framework. Chinese policymakers studied Hungary’s New Economic Mechanism—introduced in 1968 to decentralize economic decision-making—as well as its later reform experiments of the late 1970s and early 1980s. As Sino-Soviet tensions eased, Hungary and China gradually rebuilt and expanded their political and economic relations.

After Hungary broke free of the Soviet bloc in 1989, the focus of its foreign policy shifted toward Euro-Atlantic integration—particularly toward Western Europe and the United States—resulting in a period of neglect in relations with China, similar to that seen in other former Soviet bloc countries. Prime Minister Péter Medgyessy’s official visit to China in 2003 marked a renewed interest in developing Hungary-China relations in the 2000s, albeit within the limits of Hungary’s new membership in NATO and the EU.1

Since 2014, Prime Minister Viktor Orbán—while distancing his country from the EU mainstream and the United States and championing “illiberal democracy”—has gradually transformed Hungary’s foreign policy and grand strategy to align more closely with the interests of China and Russia.2

The Hungarian government portrays its ties with China and Russia as part of a “connectivity” and “economic neutrality” strategy, under which Hungary seeks to maintain open channels with all major powers and avoid participation in bloc formation.3 However, this is largely rhetorical, as the Orbán government has strained relations with most of its EU and NATO allies while actively cultivating close ties with the EU’s and NATO’s competitors and adversaries.4

In reality, this represents a major strategic shift, as Hungary has intensified its engagement with Beijing and Moscow in economic, technological, and security affairs alike.5 Within the EU and NATO, the Hungarian government routinely advances Chinese and Russian interests in discussions on sensitive issues. In 2017, Hungary prevented the EU from joining a petition condemning China’s torture of detained attorneys.6 In 2021, it blocked a statement criticizing China’s crackdown on democracy in Hong Kong7—and in 2024, when NATO was considering labeling China as a “systemic challenge” to Europe, Hungary’s foreign minister protested, declaring that “Hungary does not want NATO to become an ‘anti-China’ bloc.”8

Hungary has faced growing criticism within the EU and from the United States for its democratic backsliding, pervasive corruption, and increasingly anti-Western foreign policy. In December 2021, the European Commission suspended a significant portion of Hungary’s cohesion funds due to the Orbán government’s undermining of the rule of law and judicial independence, as well as concerns over corruption.9 In response to the loss of Western funding and investment, Hungary has turned to China and Russia for its public financing and economic development—attracting huge industrial investments from Chinese manufacturers, awarding critical infrastructure projects to Russian and Chinese companies, and accepting a $1 billion loan from China on secret, government-classified terms.

Chinese President Xi Jinping’s visit to Hungary in May 2024 capped a decade of deepening Hungary-China relations.10 After Orbán received Xi with much pomp and circumstance, the two leaders agreed to establish an “all-weather comprehensive strategic partnership”11 and embark on what they called a “golden voyage” in bilateral relations.12 They signed several cooperation agreements in areas spanning railway and border infrastructure, oil pipelines, electric vehicle (EV) charging networks, and nuclear energy projects.13

Trade and investment: China’s gateway to EU markets

Over the past decade, as Hungary’s partnership with China has grown increasingly close, bilateral trade and investment have expanded significantly. The Orbán government has actively positioned Hungary as China’s regional gateway to EU markets and has sought to embed the country within China’s global supply chains.14 In 2024, trade between Hungary and China reached $16.2 billion—a 93 percent increase from 2013, when it stood at roughly $8.4 billion.15

Hungary’s cooperation with China also extends to infrastructure development. In 2015, Hungary became the first EU member state to join China’s BRI. Its flagship project is the Belgrade-Budapest high-speed railway, envisioned as a key segment of the BRI corridor connecting the Chinese-owned port of Piraeus in Greece to Duisburg, Germany.16 The construction of the railway has been contracted to Chinese and Hungarian companies since 2014, but it has yet to be completed.17 The project has proven controversial in Hungary, where the railway’s domestic segment is being built by a company owned by one of Orbán’s childhood friends. The Serbian section has drawn even greater criticism following the deadly collapse of the Chinese-renovated Novi Sad train station in November 2024, which sparked nationwide anti-government protests in Serbia.18

During Xi Jinping’s May 2024 visit, Beijing and Budapest agreed on two new railway projects: the V0 rail ring, designed to draw international transit freight traffic away from the Budapest bottleneck, and a new rail link connecting the country’s main aviation hub, Ferenc Liszt International Airport, with the capital. Xi and Orbán also agreed that Chinese companies would build “the most modern, largest, safest, and fastest border crossing between Hungary and Serbia,” near the town of Röszke.19 If completed, it would mark the first instance of a Chinese firm modernizing a border crossing within the EU’s Schengen Area.

Investment has been another key pillar of Hungary-China cooperation. In 2023, 44 percent of all Chinese FDI directed toward the EU flowed into Hungary.20 Since 2020, China has been Hungary’s largest source of foreign investment.21 Beginning in 2022, several Chinese industrial giants—including Contemporary Amperex Technology Co. Ltd. (CATL), BYD, EVE Energy, and XINWANDA—have established major factories in Hungary, especially in EV and EV battery production. CATL’s battery plant is considered the largest single investment in Hungary’s history.22

BYD first opened an electric bus factory in Hungary in 2017, built a nearly $5 billion EV production base in Szeged in 2024, and relocated its European headquarters from the Netherlands to Hungary in 2025 after signing a strategic cooperation agreement with the Hungarian government.23 However, China’s industrial expansion—especially its EV battery factories—has provoked controversy and opposition in Hungary, fueled by concerns over an influx of foreign workers, environmental degradation, and perceptions of “Chinese colonization.” Critics point to generous government subsidies, regulatory exemptions, and a lack of transparency or local benefit surrounding these Chinese investments.24

Hungary and China have also deepened their financial ties over the past decade. Although the Bank of China has operated in Hungary since the mid-1980s, its Budapest branch received official legal authority in 2015 and was designated as the bank’s Central and Eastern European headquarters.25 In 2014, the People’s Bank of China and the Central Bank of Hungary signed an agreement expanding the Renminbi Qualified Foreign Institutional Investor pilot program—allowing select foreign investors to invest directly in China’s bond and equity markets—to Hungary.26 Moreover, the Budapest branch of the Bank of China was designated as the region’s first “RMB clearing bank.”

In 2016, Hungary became the first EU country to issue “panda bonds”—bonds denominated in renminbi (RMB) and issued by a non-Chinese borrower in China—to attract Chinese investors and diversify funding sources.27 After an initial RMB 1 billion tranche, total issuance rose to RMB 2 billion in 2018, followed by the first-ever tranche of “green panda bonds” in 2021. In 2022, Hungary issued an additional RMB 2 billion tranche.28 Because of its high public debt and restricted access to EU cohesion and reconstruction funds, Hungary took out a record-setting loan from China in 2024. The $1.17 billion loan—the largest in Hungary’s history—was intended to finance infrastructure and energy projects and was provided jointly by the China Development Bank, the Export-Import Bank of China, and the Bank of China’s Budapest branch. The deal has sparked controversy due to the government’s classification of its terms.29

Technology: Defying EU and US pressure

Hungary’s cooperation with China in technology has intensified significantly over the past decade and, like its economic and security relations, has often run counter to EU and transatlantic policy priorities. Budapest has rejected calls from European nations and the United States to exclude Chinese firms from its telecommunications and critical infrastructure. Instead, it has welcomed Huawei’s investments throughout its telecommunications sector, including in the rollout of 5G infrastructure.

Huawei opened a research and development hub in Budapest in 2020 and, in 2023, signed a strategic cooperation agreement with 4iG—a company closely linked to the Orbán government—to develop 5G, fixed-line, and mobile networks across Central, Eastern, and Southeastern Europe.30 Huawei has also established a data center in Hungary serving Chinese and other Asian firms operating in the region.

Moreover, the Orbán government has expressed interest in Huawei-made facial recognition technology powered by artificial intelligence and has purchased surveillance cameras from Hikvision, a Chinese state-owned company. These actions have sparked widespread criticism amid fears that the Hungarian government could use such tools to monitor anti-Orbán protestors.31 The United States has repeatedly raised concerns about this cooperation—both during the first Trump administration and the Biden administration.32 Defying allied pressure and ignoring security risks, Hungary has continued to double down on its partnership with Huawei.33

The Orbán government has also permitted China to penetrate Hungary’s critical infrastructure. Beyond allowing Chinese firms to build railway networks and border crossings, Orbán and Xi agreed in May 2024 to cooperate on “the full spectrum of the nuclear industry.”34 Such cooperation contradicts EU and US policy and prompted the Biden administration to openly criticize the partnership. The second Trump administration, which has maintained a friendly rapport with Orbán, similarly opposed Hungary granting China broad access to its telecommunications networks and critical infrastructure. In April 2025, the Trump administration’s Chargé d’Affaires in Hungary, Robert Palladino, issued a rare warning to the Orbán government: “President Trump is clear: China poses strategic challenges to the United States and our allies, challenges that require vigilance, transparency, and unity… Countering China’s malign influences is a top priority… Whether it’s about digital infrastructure, technology transfer, or critical sectors, we encourage all of our partners to make choices that support long-term sovereignty.”35

Security: Intelligence cooperation and controversial agreements

As part of its grand strategic alignment, the Orbán government has established a security partnership with China, making Hungary the only EU and NATO country to do so—directly contradicting EU and transatlantic policy, which classifies China as a systemic rival. Hungary hosted the 2012 founding meeting of the Cooperation between China and Central and Eastern European Countries, formerly known as the “16+1” and “17+1” format. While other Baltic states withdrew from the grouping and Czechia and Romania became inactive following Russia’s invasion of Ukraine in February 2022, Hungary remains a key proponent. The Orbán government regularly echoes Chinese talking points in EU and NATO discussions and vetoes resolutions critical of Beijing’s domestic or international conduct.36 At the beginning of Hungary’s EU Presidency in July 2024, Orbán openly defied EU, NATO, and US positions by embarking on a series of “peace missions” related to the Ukraine war, including a visit to Beijing where he endorsed Xi Jinping’s peace plan.37

Hungary’s security relationship with China extends beyond political alignment and rhetoric. In 2022, human rights organizations uncovered that the country is hosting China-operated “overseas police service stations,” tasked with providing “administrative support” for Chinese citizens in Hungary and pressuring them to return to the mainland.38 In February 2024, the two countries signed a security cooperation agreement allowing Chinese police officers to patrol alongside Hungarian law enforcement—raising concerns that Beijing’s influence in this area could deepen further.39 China’s extensive and often secret security agreements, combined with the spread of overseas police stations, have sparked fears that Chinese officers in Hungary might not only handle routine administrative tasks but also surveil Chinese citizens, pursue dissidents, and potentially even monitor Hungarian opposition.40

Reports that Hungary and China are close to concluding an extradition agreement have intensified these concerns, as have signs of expanded Chinese intelligence activities in Hungary.41 Investigative journalists have revealed that the Chinese Communist Party’s external intelligence wing, the United Front Work Department (UFWD), is active in Hungary42—and that one of its recent operations involved the Fudan Hungary project,43 which aimed to establish a new campus of China’s Fudan University in Budapest. Ironically, while UFWD assets sought to quell local opposition, the suspicion that the campus would serve as a cover for Chinese intelligence agents fueled widespread protest and eventually forced the Hungarian government to abandon the project in 2021.44

Hungary’s alignment with the EU’s China policy

Among EU member states, Hungary’s China policy is the most divergent from Brussels’ overall approach. The country seeks deeper engagement with China in trade, investment, technology, and security, without the guardrails the EU imposes to mitigate economic and national security risks. Moreover, Hungary actively opposes EU efforts to balance and de-risk relations with China, often working to undermine and reverse these policies.

During Xi Jinping’s May 2024 visit, Orbán pledged to advance closer EU-China relations and roll back EU de-risking measures. During Hungary’s EU Presidency (July-December 2024), he criticized EU tariffs on Chinese EVs as an “economic cold war”45 and used Hungary’s veto power to block EU statements and decisions critical of China on Hong Kong, the Uyghurs in Xinjiang, Taiwan, and the South China Sea.46 According to Andrzej Sadecki, “while Budapest’s limited political clout means it could not completely stop the EU’s de-risking approach to China or block increased tariffs on Chinese electric vehicles, Beijing has benefited from EU disunity and Orbán had been one of its key proxies.”47

For more than a decade, Hungary has consistently advanced Beijing’s interests within the EU, opposing de-risking and balancing measures. In doing so, it has partially undermined EU cohesion and its alignment with the United States on China-related challenges.

Conclusion

In the three and a half decades since 1989, Hungary has transformed from a former Soviet bloc frontrunner in democratization and Euro-Atlantic integration into an electoral authoritarian country and China’s and Russia’s main ally within the EU and NATO. Under Viktor Orbán, the country has built a grand strategic alliance with Beijing and become the flagbearer of China’s interests, consistently blocking EU action addressing China’s challenges across all domains.

Hungary has developed a close economic relationship with China, facilitating substantial Chinese investments in EV and battery production, telecommunications, IT, and financial services. The country has welcomed Chinese companies like Huawei and ZTE into the telecommunications sector and allowed BRI projects to penetrate its critical infrastructure, from railways to the nuclear industry. Budapest has also aligned with Beijing on security matters. It is hosting Chinese overseas police stations and a significant and growing Chinese intelligence presence—and it has endorsed Xi Jinping’s Ukraine peace plan.

Not only has Budapest failed to align with EU China policies, but it has also actively sought to block EU-level de-risking and undermine European unity in addressing China’s strategic challenges.

About the author

Related Content

Explore the programs

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    Levente Horváth, “Magyar-Kínai Diplomáciai Kapcsolatok [Hungary-China Diplomatic Relations]” in Levente Horváth, ed., “Eredmények és Kihívások: A Magyar-Kínai Diplomácia 75 Éve [Achievements and Challenges: 75 years of Hungary-China diplomacy],” John von Neumann University, Eurasia Center, 2024, https://eurasiacenter.hu/wp-content/uploads/2024/10/75_evfordulo_online.pdf.
2    Zoltán Fehér, “The Implications of the Rise of Small and Middle Powers for U.S.-China Great Power Competition” in Philip Baxter, ed., Examining Perspectives of Small-to-Medium Powers in Emergent Great Power Competition (London: Palgrave Macmillan, 2025), https://link.springer.com/chapter/10.1007/978-3-031-86901-3_10.
3    Balázs Orbán, Hussar Cut: The Hungarian Strategy for Connectivity (Budapest: MCC Press, 2024).
4    Zoltán Fehér, “Hogyan Csináljunk Nagystratégiát? [How to Do Grand Strategy?],” Országút, September 23, 2024, https://orszagut.com/kozelet/hogyan-csinaljunk-nagystrategiat-6792.
5    Fehér, “The Implications of the Rise of Small and Middle Powers for U.S.-China Great Power Competition.”
6    Szabolcs Panyi, “Hungary in the Midst of a U.S.-Huawei War,” Direkt36, November 1, 2019, https://vsquare.org/hungary-in-the-midst-of-a-u-s-huawei-war/.
7    Hans von der Burchard and Jacopo Barigazzi, “Germany Slams Hungary for Blocking EU Criticism of China on Hong Kong,” Politico, May 10, 2021, https://www.politico.eu/article/german-foreign-minister-slams-hungary-for-blocking-hong-kong-conclusions/.
8    “Hungary Will Not Support NATO Becoming ‘anti-China’ Bloc, Minister Says,” Reuters, July 11, 2024, https://www.reuters.com/world/europe/hungary-will-not-support-nato-becoming-anti-china-bloc-minister-says-2024-07-11/.
9    Zselyke Csáky, “Freezing EU Funds: An Effective Tool to Enforce the Rule of Law?” Centre for European Reform, February 27, 2025, https://www.cer.eu/insights/freezing-eu-funds-effective-tool-enforce-rule-law.
10    Zoltán Fehér, “Xi Jinping Visited Europe to Divide It. What Happens Next Could Determine If He Succeeds,” Atlantic Council, June 1, 2024, https://www.atlanticcouncil.org/blogs/new-atlanticist/xi-jinping-visited-europe-to-divide-it-what-happens-next-could-determine-if-he-succeeds/.
11    James Kynge and Marton Dunai, “Xi Jinping Upgrades China’s Ties with Hungary to ‘All-Weather’ Partnership,” Financial Times, May 9, 2024, https://www.ft.com/content/563be6d0-ab62-47cc-9076-5dd20cac8cbd.
12    Csin-ping Hszi, “Kína és Magyarország Együtt Lép az ‘Arany Vízi Útra,’” Magyar Nemzet, May 7, 2024, https://magyarnemzet.hu/velemeny/2024/05/kina-es-magyarorszag-egyutt-lep-az-arany-vizi-utra#google_vignette.
13    Bela Szandelszky, “Hungary and China Sign Strategic Cooperation Agreement during Visit by Chinese President Xi,” Associated Press, May 9, 2024, https://apnews.com/article/chinas-xi-welcomed-hungary-talks-orban-0719880a351a5ef0763ae6a623a7798b.
14    Matt Boyse, “China Increasing Its Bets on Hungary and Serbia,” Geopolitical Intelligence Services, July 22, 2024, https://www.gisreportsonline.com/r/china-interests-central-europe/.
15    Tianyi Xiao, “China-Hungary Bilateral Relations: Trade and Investment Outlook,” China Briefing, June 27, 2024, https://www.china-briefing.com/news/china-hungary-bilateral-relations-trade-and-investment-outlook; “China and Hungary,” Ministry of Foreign Affairs, People’s Republic of China, 2024, https://www.fmprc.gov.cn/mfa_eng/gjhdq_665435/3265_665445/3175_664570/.
16    Zoltán Kiszelly, “China’s European Bridgehead,” Geopolitical Intelligence Services, June 26, 2025, https://www.gisreportsonline.com/r/china-hungary.
17    Ibid.
18    Jens Kastner, “Botched Belt and Road Project Triggers Political Crisis in Serbia,” Nikkei Asia, December 19, 2024, https://asia.nikkei.com/spotlight/belt-and-road/botched-belt-and-road-project-triggers-political-crisis-in-serbia.
19    Ádám Bráder, “Historic Visit of Chinese President Xi Jinping to Hungary Yields Eighteen Significant Agreements,” Hungarian Conservative, May 10, 2024, https://www.hungarianconservative.com/articles/current/historic_visit_bilateral_agreements_china_hungary_airport_railway_oil-pipeline_szijjarto.
20    “Tavaly az Európába Irányuló Kínai Beruházások 44 Százaléka Magyarországra Érkezett,” Kormany, November 26, 2024, https://kormany.hu/hirek/tavaly-az-europaba-iranyulo-kinai-beruhazasok-44-szazaleka-magyarorszagra-erkezett.
21    Xiao, “China-Hungary Bilateral Relations.”
22    Ibid.
23    “BYD Moves European HQ to Hungary, Sets up €250mn Business and Development,” BNE Intellinews, May 16, 2025, https://www.intellinews.com/byd-moves-european-hq-to-hungary-sets-up-250mn-business-and-development-381453.
24    Amerikai Népszava, “Nem Leszünk Kínai Gyarmat, Mert Már az Vagyunk,” Amerikai Népszava, May 7, 2024, https://nepszava.us/nem-leszunk-kinai-gyarmat-mert-mar-az-vagyunk; “Szegedbe is Belemar a Kínai Gyarmatosítás,” Greenfo, https://greenfo.hu/hir/szegedbe-is-belemar-a-kinai-gyarmatositas/; Besenyei Zsolt, “Azt Nem Ígérték, Hogy Kínai és Orosz Gyarmat se Leszünk,” Szeged.hu, April 15, 2024, https://szeged.hu/cikk/azt-nem-igertek-hogy-kinai-es-orosz-gyarmat-se-leszunk-besenyei-zsolt-jegyzete; Karl Harenbrock, “Behind China’s Massive Bet on Hungary,” Deutsche Welle, YouTube video, July 4, 2024, https://www.youtube.com/watch?v=fiCo0BASdkA.
25    “Interview: Hungary Looks Forward to Further Cooperation with China, Official Says,” Xinhua News Agency, May 5, 2024, https://eng.yidaiyilu.gov.cn/p/0DG0579C.html.
26    Choo Lye Tan, “The Renminbi Qualified Foreign Institutional Investor Program—Opportunities and Challenges for International Investors Interested in Direct Access to PRC Securities with Offshore Renminbi,” Investment Lawyer 21, 8 (2014), https://files.klgates.com/files/publication/a3986722-a0c2-436c-ad83-5474625d86d7/presentation/publicationattachment/04e0d5b1-d0f6-4bb1-a5a0-637065d6f6e9/the_renminbi_qualified_foreign_institutional%20investor_program.pdf.
27    “Panda Bonds Explained: Understanding China’s Growing Bond Market,” Deutsche Bank, February 28, 2025, https://www.db.com/news/detail/20250228-panda-bonds-explained-understanding-china-s-growing-bond-market?language_id=1.
28    “China and Hungary”; “Long-Term Cooperation between MBH Bank and Bank of China in Sight,” MTI-Hungary Today, September 27, 2024, https://hungarytoday.hu/long-term-cooperation-between-mbh-bank-and-bank-of-china-in-sight/.
29    Csongor Körömi, “Hungary Quietly Takes €1B Loan from Chinese Banks,” Politico, July 25, 2024, https://www.politico.eu/article/budapest-hungary-took-1-billion-loan-chinese-banks-peter-szijjarto/.
30    “Hungary MOU with Huawei Angers US,” Central European Times, November 2, 2023, https://centraleuropeantimes.com/hungary-mou-with-huawei-angers-us/.
31    Kiszelly, “China’s European Bridgehead”; Sebestyén Hompot, “Orbán Doubles Down on Turning Hungary into a Regional Hub of Chinese Influence,” China Observers in Central and Eastern Europe, November 9, 2023, https://chinaobservers.eu/orban-doubles-down-on-turning-hungary-into-a-regional-hub-of-chinese-influence; “Chinese-Made Surveillance Cameras Are Spreading Across Eastern Europe, Despite Security Concerns,” Radio Free Europe/Radio Liberty, May 6, 2024, https://www.rferl.org/a/china-surveillance-cameras-europe-dahua-hikvision/32930737.html.
32    Tamara Gyurkó, “Hungary Cooperating with Chinese Huawei: Biden Cabinet Outraged,” Daily News Hungary, October 31, 2023, https://dailynewshungary.com/hungarys-cooperating-with-chinese-huawei-biden-cabinet-outraged.
33    Hompot, “Orbán Doubles Down on Turning Hungary into a Regional Hub of Chinese Influence.”
34    “Hungary and China Sign Nuclear Energy Cooperation Agreement,” World Nuclear News, May 10, 2024, https://world-nuclear-news.org/articles/hungary-and-china-sign-nuclear-cooperation-agreeme; David Rogers, “China, Hungary Agree Rail Schemes and ‘Full-Spectrum’ Nuclear Cooperation,” Global Construction Review, May 15, 2024, https://www.globalconstructionreview.com/china-hungary-agree-rail-schemes-and-full-spectrum-nuclear-cooperation.
35    US Embassy Budapest, “Chargé d’Affaires Robert Palladino’s Remarks at the Central European Summit,” YouTube video, April 15, 2025, https://www.youtube.com/watch?v=C__usttFASw.
36    Panyi, “Hungary in the Midst of a U.S.-Huawei War”; von der Burchard and Barigazzi, “Germany Slams Hungary for Blocking EU Criticism of China on Hong Kong.”
37    Zoltán Fehér, “‘What Will NATO Leaders Make of Orbán’s ‘Peace Missions?’ Live Expertise Blog on the Washington NATO Summit,” Atlantic Council, July 10, 2024, https://www.atlanticcouncil.org/blogs/new-atlanticist/live-expertise-and-behind-the-scenes-insight-as-nato-leaders-gather-at-the-washington-summit/#feher-hungary-orban-visits; Jon Jackson, “NATO Country Leader Endorses China’s Peace Plan for Russia-Ukraine War,” Newsweek, May 9, 2024, https://www.newsweek.com/nato-country-leader-endorses-chinas-peace-plan-russia-ukraine-war-1899102.
38    Akos Keller-Alant, Mila Manojlovic, and Reid Standish, “Reports Of China’s Overseas ‘Police Stations’ Spark Controversy, Denial in Hungary And Serbia,” Radio Free Europe/Radio Liberty, November 9, 2022, https://www.rferl.org/a/reports-china-policestations-controversy-denial-hungary-serbia/32122899.html; “110 Overseas: 230,000 Chinese ‘Persuaded to Return,’” Safeguard Defenders, September 12, 2022, https://safeguarddefenders.com/en/blog/110-overseas-230000-chinese-persuaded-return.
39    Joseph Bebel, “Extradition Treaty Signals Beijing’s Wider Designs in Hungary,” Eurasia Daily Monitor, Jamestown Foundation, September 4, 2025, https://jamestown.org/program/extradition-treaty-signals-beijings-wider-designs-in-hungary; Liz Lee and Ryan Woo, “In Unusual Move, China Offers to Back Hungary in Security Matters,” Reuters, February 20, 2024, https://www.reuters.com/world/unusual-move-china-offers-back-hungary-security-matters-2024-02-19; Filip Jirouš, “PRC Exploitation of Russian Intelligence Networks in Europe,” China Brief 24, 8 (2024), https://jamestown.org/program/prc-exploitation-of-russian-intelligence-networks-in-europe.
40    Bebel, “Extradition Treaty Signals Beijing’s Wider Designs in Hungary.”
41    Jakub Janda and Richard Kraemer, “Orban’s Hungary: A Russia and China Proxy Weakening Europe,” European Values Center for Security Policy, December 8, 2021, 14, https://europeanvalues.cz/en/orbans-hungary-a-russia-and-china-proxy-weakening-europe.
42    Kamilla Marton, “How China’s United Front Extends Its Influence in Hungary,” Direkt36, October 5, 2024, https://vsquare.org/china-ccp-united-front-influence-hungary.
43    Ibid.
44    Ágota Révész, “The Pandora’s Box of Fudan Hungary,” Daedalus 153, 2 (2024), 207–216, https://direct.mit.edu/daed/article/153/2/207/121264/The-Pandora-s-Box-of-Fudan-Hungary.
45    Justin Spike, “EU Tariffs on Chinese Electric Vehicles Are Part of an ‘Economic Cold War,’ Hungary’s Orbán Says,” Associated Press, October 4, 2024, https://apnews.com/article/hungary-orban-eu-china-electric-vehicles-b255691c021fb901ceb2f1563e3a4346.
46    Samuel Dempsey, “The Sino-Hungarian Relationship’s Effects on the EU and NATO,” Blue Europe, August 2, 2024, https://www.blue-europe.eu/analysis-en/short-analysis/the-sino-hungarian-relationships-effects-on-the-eu-and-nato; Ramses A. Wessel and Viktor Szép, “The Implementation of Article 31 of the Treaty on European Union and the Use of Qualified Majority,” European Parliament, November 11, 2022, https://www.europarl.europa.eu/thinktank/en/document/IPOL_STU(2022)739139.
47    Andrzej Sadecki, “Hungary’s Orbán Walks US-China Tightrope,” Center for European Policy Analysis, April 3, 2025,
https://cepa.org/article/hungarys-orban-walks-us-china-tightrope.

The post Hungary’s policy on China: Doing Beijing’s bidding appeared first on Atlantic Council.

]]>
Czechia’s policy on China: Swinging between engagement and de-risking https://www.atlanticcouncil.org/in-depth-research-reports/report/czechias-policy-on-china-swinging-between-partnership-and-de-risking/ Mon, 10 Nov 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=881896 Although Czechia emerged as one of the EU’s early hawks and whistleblowers on China, its overall stance has shifted markedly over the past two decades—oscillating between engagement and balancing, with the fluctuations largely driven by domestic political divisions and sustained Chinese influence efforts.

The post Czechia’s policy on China: Swinging between engagement and de-risking appeared first on Atlantic Council.

]]>
This is the ninth chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic strategy.Read the full report here.

Although Czechia emerged as one of the EU’s early hawks and whistleblowers on China, its overall stance has shifted markedly over the past two decades—oscillating between engagement and balancing. These fluctuations were largely driven by domestic political divisions and sustained Chinese influence efforts. Controversies surrounding Chinese investments accelerated Czechia’s rise as a leading advocate of economic security and “de-risking.” Within the EU, the country has distinguished itself through a forward-looking approach to technological risk management grounded in anticipatory policy principles, although implementation has been uneven. Over the past decade, its approach has alternated between neglect and assertiveness in response to political shifts, economic pressures, and changing perceptions of China’s role in Europe.

High-level engagement with Taiwan has remained a cornerstone of Czechia’s strategy to counter Beijing’s influence, while Czech civil and political actors have grown increasingly vigilant about Chinese interference. Since Russia’s invasion of Ukraine—openly supported by China—Prague’s security posture has hardened further. The 2023 security strategy and the 2025 foreign policy framework codified this shift, defining China as a systemic challenge across economic, technological, diplomatic, and security dimensions. However, with the return of Andrej Babiš to power after the October 2025 elections, Czechia’s China policy could once again swing back toward engagement.

Early Czechia-China relations

Initial Czech perceptions of China were decisively shaped in 1989 by two pivotal and sharply divergent historical moments: Czechoslovakia’s anti-communist Velvet Revolution and China’s violent suppression of the Tiananmen protests. These twin events produced a lasting moral and political contrast. Over the following two decades, both the Czech public and political elite came to view China as a state that had abandoned liberalization and reverted to authoritarian Communism, while the newly independent Czech Republic defined its post-communist identity through democratization and human-rights advocacy. This divergence was personified by former dissident and first democratic President Václav Havel, whose foreign policy prioritized human rights and solidarity with political prisoners in China and elsewhere. Czechia’s frequent criticism of China’s human rights violations, along with the Dalai Lama’s 2009 visit to Prague, prompted China to freeze diplomatic communications with the country until 2012.1

In the early 2010s, Czech policy toward China underwent a sharp reversal, driven by Beijing’s expanding influence efforts and the rise of pro-China forces within Czech politics. In 2012, Czechia joined the “16+1” format— a Chinese initiative to promote business and investment relations between China and Central and Eastern European countries—marking the start of a decade-long rapprochement. The election of Miloš Zeman as president in 2013, followed by his Social Democratic Party government in 2014, consolidated this pro-engagement trajectory. Under Zeman, Czechia joined the Belt and Road Initiative in 2016, coinciding with Xi Jinping’s landmark visit to Prague—the first by a Chinese head of state—which produced a “strategic partnership” agreement.2 During the Zeman era, bilateral ties deepened through high-level visits—Zeman visited China seven times between 2013 and 2020—and high-profile Chinese investments, particularly by the Shanghai-based CEFC China Energy, whose chairman became one of Zeman’s economic advisers, and by the PPF Group, led by Czech billionaire Petr Kellner. Yet these ventures soon drew scrutiny over political influence and opaque financing, and both ultimately collapsed, underscoring the limits of the Czech-Chinese rapprochement.3

From the late 2010s onward, Czech policy toward China entered a new phase marked by growing skepticism and assertive distancing. During this period, Czechia emerged as one of Europe’s early advocates of “de-risking” from China, and its senior officials undertook high-profile visits to Taiwan and deepened bilateral cooperation with the island—moves that elicited sharp reactions from Beijing. In 2019, Prague’s mayor terminated the capital’s sister-city agreement with Beijing, symbolizing the shift in public and political attitudes. The 2021 parliamentary elections further consolidated this turn: voters ousted the traditionally pro-China Social Democrats and Communists from parliament, electing Petr Fiala’s center-right coalition— including the China-critical Pirate Party—which adopted a distinctly hawkish line toward Beijing. The election of Petr Pavel to the presidency in 2023 reinforced this orientation. His 2025 visit to Taiwan—the first by a European head of state—brought Sino-Czech relations to a historic low. Yet political volatility persists. Following the October 2025 elections, former Prime Minister Andrej Babiš is returning to power and is expected to form a coalition with far-right parties such as Freedom and Direct Democracy (SPD) and Motorists for Themselves, potentially steering Czechia’s China policy back toward engagement and continuing the cyclical pattern that has long characterized Czechia’s stance on Beijing.4

Trade and investment: Chinese acquisitions and domestic backlash

Trade between Czechia and China is substantial but highly asymmetrical. Imports from China reached €36.7 billion in 2024, compared to exports of €3.0 billion, leaving a deficit of €33.7 billion.5 Machinery, electronics, and consumer goods dominate imports, while Czech exports remain modest, concentrated in intermediate goods and automotive products. Large Czech manufacturers such as Škoda maintain operations in China, but policymakers have never treated these ties as strategically critical dependencies.

Czechia’s economic relations with China have mirrored the broader oscillation in its China policy between engagement and caution. During the Zeman era, two major Chinese investment episodes—initially promoted as symbols of strategic partnership—ultimately provoked domestic backlash and deepened skepticism toward Beijing. The first was CEFC China Energy’s 2015 move into the Czech market. With support from President Zeman, the Shanghai-based conglomerate—reportedly linked to the Chinese Communist Party and the People’s Liberation Army—rapidly acquired stakes in prominent Czech companies, including Czech Airlines, Lobkowicz Brewery, soccer club SK Slavia Prague, the Central European investment group J&T, the advertising firm Médea, and several landmark Prague properties. Zeman’s decision to appoint CEFC chairman Ye Jianming as his economic adviser further fueled controversy. Investigations by Czech media and think tanks soon raised concerns over opaque financing and political influence. These fears intensified in 2018 when Ye was detained in China for alleged economic crimes and CEFC was absorbed by the Chinese state-owned CITIC Group, giving Beijing indirect control over key Czech media holdings.6

The second case involved the PPF Group, a major Czech investment conglomerate led by billionaire Petr Kellner. PPF’s ventures channeling Chinese investments into Czech telecommunications, finance, and media—alongside cooperation with Zeman in cultivating business ties with China and Russia—were widely perceived as part of a broader influence network. Coverage in PPF-friendly media often portrayed Chinese investment favorably while adopting critical tones toward the United States and the EU. However, Kellner’s death in a 2021 helicopter crash ended the company’s China-focused expansion.7

Together, the CEFC and PPF cases came to epitomize the risks of politically driven economic engagement with China. Beyond these scandals, the Czech public was generally disappointed that most Chinese investment promises never materialized. The combination of these factors eroded the perception of economic partnership as a foreign-policy success and bolstered calls for a more guarded, security-focused stance toward Chinese capital.

Drawing lessons from the scandals surrounding CEFC and PPF, Czech authorities began to construct one of Central Europe’s most comprehensive frameworks for screening and managing foreign economic influence. As a result, Czechia had already taken its first concrete steps toward de-risking, well before the EU formally embraced the concept of economic security. In 2018, the Czech National Bank blocked CEFC’s planned $1 billion acquisition of a majority stake in the financial group J&T—which operated subsidiaries across Slovakia, Croatia, Russia, and Barbados—on the grounds of opaque funding sources. The intervention reflected a growing institutional awareness of financial and strategic vulnerabilities associated with Chinese capital—particularly since the European Central Bank had already approved the deal.8

Building on this experience, Czechia adopted the Foreign Investment Screening Act in May 2021, creating a robust national mechanism to vet acquisitions in sensitive sectors such as defense, critical infrastructure, and advanced data services.9 The law empowers authorities to approve, condition, or block transactions where risks cannot be mitigated, and its consistent enforcement has earned recognition as a model within the EU. The Mercator Institute for China Studies has cited the Czech FDI regime as an example for other member states to follow.10

Czechia has also extended this vigilance to the research domain: universities and funding agencies now apply strict research-security guardrails, systematically screening partnerships for dual-use and technology-transfer risks. Collectively, these measures have positioned Czechia as a regional frontrunner in translating early lessons from Chinese investment controversies into durable instruments of national and European economic security.

A central pillar of Czechia’s de-risking efforts has been the deepening of its economic ties with Taiwan, whose investments in the country now exceed China’s several times over. The flagship example of this growing relationship is the expansion of Taiwanese electronics manufacturer Foxxconn into Czechia, where its subsidiary Foxconn CZ employs five thousand workers and ranks as the sixth-largest corporation in the country by revenue.11

Technology: De-risking amid uneven enforcement

Czechia has also stood out among EU member states for its pioneering efforts in technological de-risking, which are both anticipatory and risk-based, although the execution of its policies has shown inconsistencies. Cybersecurity emerged as a prominent concern in Czech efforts to strengthen technological resilience. In December 2018, the National Cyber and Information Security Agency (NÚKIB) issued a warning about potential risks associated with Chinese technology suppliers, including Huawei and ZTE. The decision to publish the alert without prior government clearance sparked a political controversy in Prague, involving President Zeman, Prime Minister Babiš, opposition leaders, and NÚKIB officials. Zeman called NÚKIB’s warning unsubstantiated—and Babiš eventually fired NÚKIB’s director. Although the agency had briefed the government and intelligence services prior to publication, it could never fully explain its unilateral decision to make the warning public without cabinet consent. The domestic tensions caused by this move quickly spilled into foreign policy, with the Chinese embassy denouncing the warning as unfounded and demanding an official apology. This, in turn, prompted a public exchange of statements between Babiš and the Chinese ambassador that further strained bilateral relations.12

As a result of the NÚKIB scandal, Czech media and the public turned on Huawei, and the backlash spilled over to affect PPF, which had made a deal with Huawei to build a 5G network for its telecom subsidiary O2. Public pressure forced PPF to withdraw from the agreement and instead contract Ericsson to build the 5G network. Czech telecom operators subsequently diversified their suppliers for 5G infrastructure.

Czech political actors have also played a role in European and international cybersecurity cooperation. Backed by Prime Minister Babiš, the city of Prague hosted the 5G Security Conference 2019—and during its EU Presidency in 2022, Czechia hosted a high-level cybersecurity conference with representatives from over eighty countries. Moreover, the country’s EU Commissioner Věra Jourová served as Commissioner for Values and Transparency between 2019 and 2024, overseeing portfolios on cyberspace security and the fight against disinformation.

However, implementation of technological de-risking from China has been uneven. Czechia’s leading telecom companies—T-Mobile, Vodafone, and O2—have continued to use Huawei technology. Czech state institutions, including the police and Czech state television, are bound by law to select the lowest bidder for technology procurement, and some have therefore accepted bids from Chinese companies such as Huawei and ZTE.

Nevertheless, Czechia has taken a series of proactive measures to limit its technological exposure to China’s coercive or opaque practices. For example, authorities excluded China from the public tender for the expansion of the Dukovany nuclear power plant. In 2025, Czech authorities attributed cyber operations targeting the Ministry of Foreign Affairs to Chinese actors and banned the use of any products by the Chinese artificial intelligence (AI) startup DeepSeek in state administration.13 That same year, NÚKIB issued a warning on personal-data transfers, expanding the scope of oversight to include data governance.14 Some of Czechia’s cybersecurity measures, including its computer emergency response teams, have set benchmarks within the EU and can serve as examples for other member states to follow.15

Czechia has also demonstrated a clear preference for working with trusted allies on technology issues. Partnerships with Taiwan, Japan, and South Korea are framed both as values-driven alliances and as practical vehicles for modernizing Czech industry. Cooperation spans semiconductors, precision machinery, and talent development, including Taiwanese semiconductor facilities in Prague and Brno.16 This networked approach reflects a long-standing Czech strategy: collaborate with trusted democracies on sensitive technologies while minimizing exposure to Chinese supply chains.

Security: China as a systemic challenge, Taiwan as an ally

Czechia’s security policy has evolved in tandem with broader government policy toward China over the decades. While pro-China governments historically did not regard Beijing as a malign actor in Central Europe, more recent administrations have adopted a balancing approach and actively pushed back against Chinese operations.

Taiwan has long been a pillar of Czechia’s strategic balancing against China. In 2019, the Prague city council canceled a partnership agreement with Beijing and signed a new pact with Taipei, despite retaliatory measures by China. A year later, Senate President Miloš Vystrčil visited Taiwan and delivered his “I am Taiwanese” speech, provoking Beijing and prompting threats against Czech companies operating in China. In 2023, lower-house Speaker Markéta Pekarová Adamová led a large delegation that signed eleven memoranda of understanding in Taipei, followed by additional agreements on industrial development and semiconductors in 2024 and 2025. The Taiwanese foreign minister visited Prague in both 2021 and 2023—and following his election in January 2023, President Petr Pavel accepted a congratulatory phone call from Taiwan’s president Tsai Ing-wen. This was a first for a European head of state and drew further criticism from Beijing. Pavel’s August 2025 visit with the Dalai Lama ultimately prompted China to sever ties with the Czech president entirely.17

Czech civil society has also engaged with the security challenges that China poses. Universities have tightened vetting of foreign partnerships, particularly with Chinese institutions, to reduce risks of espionage or undue influence. NGOs and think-tanks, such as China Observers in Central and Eastern Europe—a Czech organization focused on analyzing China’s political and economic influence—play a key role in sustaining informed debate on the risks posed by Chinese engagement.18 Academia, NGOs, municipalities, and media have collectively fostered a critical stance toward China, informed by historical memory of authoritarian great-power domination.

Czech intelligence has consistently flagged China as a source of espionage and influence operations. The annual reports of the Czech Security Information Service highlight Chinese use of academic and business channels to cultivate access. NÚKIB’s 2018 warning on Huawei and ZTE marked a milestone in European cybersecurity, compelling operators of critical infrastructure to assess risks well ahead of the EU’s 5G Toolbox. Subsequent actions extended vigilance to software and data: in May 2025, Prague attributed a multi-year cyber-espionage campaign against its foreign ministry to APT3, a network of Chinese state-sponsored intelligence officers, contract hackers, and support staff;19 in July 2025, the Czech telecom regulator restricted the use of the Chinese DeepSeek AI model in high-risk infrastructure;20 and in September 2025, NÚKIB issued a warning on the transfer of personal data to China.21 Together, these measures demonstrate Czechia’s consistent treatment of China as a security and intelligence threat.

Since Russia’s invasion of Ukraine—which has been backed by China—Czech security policy has hardened further toward Beijing. The Czech government has deprioritized the Cooperation between China and Central and Eastern European Countries—in fact, Foreign Minister Jan Lipavský declared the “club” effectively dead for Central Europe in 2023.22 Czechia’s 2023 security strategy and the 2025 foreign policy framework codify what had already become the de facto guiding principle of Czech foreign and security policy under the Fiala government: namely, that China represents a systemic challenge across economic, technological, diplomatic, and security dimensions.

In the 2023 strategy, China is explicitly identified as a global “systemic challenge,” not only due to its influence operations in democratic states, but also because of its pursuit of alternative norms for the international order. The document situates China and Russia jointly as actors seeking to weaken European unity and the rules-based system, framing Czechia’s response in terms of resilience, institutional vigilance, and a whole-of-society approach. The strategy elevates economic security alongside cyber, internal, and defense domains as central arenas of strategic concern, signaling that techno-economic dependencies, supply-chain vulnerabilities, and investment-driven influence have become mainstream considerations in threat assessment.23

The 2025 foreign policy framework builds directly on that security doctrine, embedding the logic of “security first” across diplomatic, economic, and normative fronts. It underscores that safeguarding the state and its citizens is now the central objective of Czech foreign policy and places economic and technological security at the heart of external relations. In mapping the strategic environment, the framework highlights that challenges today are not solely military but also technological, geoeconomic, and ideological—thereby linking security to both national interest and global competition. By doing so, the framework institutionalizes longstanding Czech practice: engagement with external actors is now assessed against resilience, reciprocity, and risk mitigation rather than purely economic or diplomatic opportunity.24

Together, these documents signal a qualitative shift: China is no longer seen merely as a partner or competitor, but as a structural challenge intersecting with Europe’s strategic agenda. The integration of economic security into the core of Czech foreign and security doctrines reinforces the idea that Czechia aims to convert episodic reactive measures into a durable strategic posture toward China.

Czechia’s alignment with the EU’s China policy

Czechia’s stance on EU economic security and de-risking policies has shifted considerably over the past decade—alternating between periods of engagement and strategic balancing—reflecting the country’s polarized domestic politics, competing economic interests, and evolving perceptions of Chinese influence. These shifts are best understood across two distinct phases: the 2013-2021 period, shaped by Zeman’s pro-China governments and marked by selective alignment and strategic ambiguity, and the period since 2021, under more hawkish leadership, defined by closer convergence with Brussels and a pragmatic approach to balancing.

During Zeman’s decade in office, backed by Social Democratic and ANO-led coalitions, Czechia’s engagement with China complicated its alignment with EU-level de-risking efforts. While Prague voiced rhetorical support for bloc-wide instruments—such as investment screening and export-control coordination—implementation was uneven and politically contested, reflecting domestic divisions and entrenched Chinese influence networks. The government’s focus on attracting Chinese capital dampened advocacy for stricter economic-security safeguards, even as Czech institutions were among the first to develop regulatory tools later adopted at the European level. Analysts note that this duality—public endorsement of resilience frameworks combined with permissive domestic practice—left Czech policy Janus-faced, oscillating between security-driven caution and commercial opportunism.

Despite these inconsistencies, Czechia’s early encounters with CEFC and PPF’s opaque investments fostered an awareness of the risks inherent in strategic dependence and unclear ownership. This recognition informed Prague’s backing for emerging EU instruments such as foreign investment screening and anti-coercion mechanisms, even as political allies of Zeman resisted their enforcement at home. In this sense, Czechia under Zeman anticipated several elements of the EU’s later Economic Security Strategy, though it remained an unreliable advocate for their consistent implementation.25

Since 2021, under more hawkish governments, Czechia has shifted decisively toward the European mainstream on de-risking, more closely aligning its rhetoric and instruments with the European Commission’s agenda. It now emphasizes that economic resilience and competitiveness must be advanced through EU-wide mechanisms—such as export controls, research-security standards, and anti-coercion measures—rather than bilateral initiatives.26

Still, Czechia’s implementation of this strategy remains pragmatic rather than doctrinaire. In October 2024, the country abstained from a European Council vote on tariffs targeting Chinese electric-vehicle imports, aiming to balance its automotive sector’s exposure with its broader commitment to addressing structural distortions.27 Officials maintained that only coordinated EU action—not unilateral Czech measures—could effectively counter Chinese state capitalism while preserving European competitiveness. Within Central Europe, Czechia thus occupies the security-conscious end of the policy spectrum, distinguishing itself from member states that initially favored engagement with Beijing.

Across both political cycles, Prague has played a meaningful role in shaping EU frameworks on investment screening, subsidy control, and anti-coercion tools. Yet while its strategic rationale has increasingly converged with Brussels, the consistency of national implementation still hinges on domestic political alignment. The evolution from Zeman’s pro-China engagement to the center-right’s structured balancing underscores how Czechia’s approach to China—and to EU economic-security governance—remains dynamic, adaptive, and politically contested.

About the author

Related Content

Explore the programs

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    Rudolf Fürst, “Czechia: Early Ideological Whistleblower Turned European Mainstream” in Patrik Andersson and Frida Lindberg, eds., “National Perspectives on Europe’s De-Risking from China,” European Think-Tank Network on China, 2024, https://merics.org/sites/default/files/2024-06/ETNC%202024_National%20Perspectives%20on%20Europe’s%20De-risking%20from%20China_FINAL_low.pdf; Matt Boyse, “China Increasing Its Bets on Hungary and Serbia,” Geopolitical Intelligence Services, July 22, 2024, https://www.gisreportsonline.com/r/china-interests-central-europe/.
2    Jason Hovet and Jan Lopatka, “Chinese, Czech Presidents Forge Strategic Partnership on Prague Visit,” Reuters, March 29, 2016, https://www.reuters.com/article/world/chinese-czech-presidents-forge-strategic-partnership-on-prague-visit-idUSKCN0WV1F0/; “Enlargement of Memorandum of Understanding,” Czech National Bank, March 29, 2016, https://www.cnb.cz/en/cnb-news/press-releases/Enlargement-of-Memorandum-of-Understanding-00001.
3    Olga Lomová, “The Two Faces of Czech China Policy,” Echowall, July 8, 2020, https://www.echo-wall.eu/china-through-european-lens/off/two-faces-czech-china-policy; Boyse, “China Increasing Its Bets on Hungary and Serbia”; Dalibor Rohac, “Chinese Influence in Central and Eastern Europe,” American Enterprise Institute, September 11, 2024, https://www.aei.org/research-products/testimony/chinese-influence-in-central-and-eastern-europe/; Fürst, “Czechia: Early Ideological Whistleblower Turned European Mainstream.”
4    Rohac, “Chinese Influence in Central and Eastern Europe”; Boyse, “China Increasing Its Bets on Hungary and Serbia”; Fürst, “Czechia: Early Ideological Whistleblower Turned European Mainstream.”
5    “China/Czechia,” Observatory of Economic Complexity, June 2025, https://oec.world/en/profile/bilateral-country/chn/partner/cze.
6    Tobiáš Lipold, “The Rise and Fall of China-Czechia Relations,” Diplomat, October 6, 2025. https://thediplomat.com/2025/10/the-rise-and-fall-of-china-czechia-relations/; Lomová, “The Two Faces of Czech China Policy”; Rohac, “Chinese Influence in Central and Eastern Europe”; Fürst, “Czechia: Early Ideological Whistleblower Turned European Mainstream”; “Chinese State-Controlled CITIC Takes over CEFC Assets in Czech Republic,” Alliance For Securing Democracy, last visited October 14, 2025, https://securingdemocracy.gmfus.org/incident/chinese-state-controlled-citic-takes-over-cefc-assets-in-czech-republic/.
7    Rohac, “Chinese Influence in Central and Eastern Europe”; Fürst, “Czechia: Early Ideological Whistleblower Turned European Mainstream”; Lomová, “The Two Faces of Czech China Policy.”
8    Robert Muller, “China’s CEFC Hits Regulatory Hurdle in Pursuit of Czech JTFG Stake: Source,” Reuters, January 3, 2018, https://sg.finance.yahoo.com/news/chinas-cefc-hits-regulatory-hurdle-pursuit-czech-jtfg-192725091–sector.html.
9    “Act on FDI Screening,” Parliament of the Czech Republic, January 19, 2021, https://mpo.gov.cz/assets/en/foreign-trade/investment-screening/legislation/2022/11/Act-on-FDI-Screening_unofficial-translation_1.pdf.
10    “Profiling European Countries’ Resilience towards China,” Mercator Institute for China Studies, October 31, 2024, https://merics.org/en/report/profiling-european-countries-resilience-towards-china.
11    Daniel McVicar, “How the Czech Republic Became One of Taiwan’s Closest European Partners and What It Means for EU-China Relations,” Council on Foreign Relations, April 24, 2023, https://www.cfr.org/blog/how-czech-republic-became-one-taiwans-closest-european-partners-and-what-it-means-eu-china.
12    Dušan Navrátil, “Report on the State of Cybersecurity in the Czech Republic in 2018,” National Cyber and Information Security Agency, 2018, https://nukib.gov.cz/download/publications_en/report-czech-cyber-security-2018-en.pdf; Fürst, “Czechia: Early Ideological Whistleblower Turned European Mainstream.”
13    “Czech Republic Says China Was behind Cyberattack on Ministry,” Reuters, May 28, 2025, https://www.reuters.com/world/china/czech-republic-says-china-was-behind-cyberattack-ministry-summons-ambassador-2025-05-28/; “Czech Government Bans DeepSeek Usage in Public Administration,” Reuters, July 9, 2025, https://www.reuters.com/world/china/czech-government-bans-deepseek-usage-public-administration-2025-07-09/.
14    “NÚKIB Warns against the Transfer of the Data to and Remote Administration from People’s Republic of China,” National Cyber and Information Security Agency, September 3, 2025, https://nukib.gov.cz/en/infoservis-en/news/2295-nukib-warns-against-the-transfer-of-the-data-to-and-remote-administration-from-people-s-republic-of-china/.
15    “Profiling European Countries’ Resilience towards China.”
16    Boyse, “China Increasing Its Bets on Hungary and Serbia.”
17    “China Scoffs at New Czech President’s Phone Call with Taiwan,” Associated Press, January 31, 2023, https://apnews.com/article/taiwan-politics-government-china-czech-republic-3cde81857dd712aaeb1dc34eb6346841; Robert Muller, “Czech Senate Speaker Leaves for Taiwan Visit, Angering China,” Reuters, August 29, 2020, https://www.reuters.com/article/world/czech-senate-speaker-leaves-for-taiwan-visit-angering-china-idUSKBN25P0LF/; Fan Chen, “China Cuts Ties with Czech President over His Birthday Visit to Dalai Lama,” South China Morning Post, August 13, 2025, https://www.scmp.com/news/china/diplomacy/article/3321694/china-cuts-ties-czech-president-over-petr-pavels-birthday-visit-dalai-lama.
18    “Unraveling Czech–China Relations: What’s Next?” China Observers in Central and Eastern Europe, October 2, 2024, https://chinaobservers.eu/choice-newsletter-unraveling-czech-china-relations-whats-next/.
19    “Czech Republic Says China Was behind Cyberattack on Ministry.”
20    “Czech Government Bans DeepSeek Usage in Public Administration.”
21    “NÚKIB Warns against the Transfer of the Data to and Remote Administration from People’s Republic of China.”
22    Stuart Lau, “China’s Club for Talking to Central Europe Is Dead, Czechs Say,” Politico, May 4, 2023, https://www.politico.eu/article/czech-slam-china-xi-jinping-pointless-club-for-central-europe/.
23    “Security Strategy of the Czech Republic 2023,” Government of the Czech Republic, 2023, https://mzv.gov.cz/file/5161068/Security_Strategy_of_the_Czech_Republic_2023.pdf.
24    “Government Approves New Foreign-Policy Framework,” Ministry of Foreign Affairs of the Czech Republic, May 28, 2025, https://mzv.gov.cz/jnp/en/issues_and_press/press_releases/czech_government_approves_new_foreign.html.
25    “European Economic Security Strategy,” European Commission, June 20, 2023; Andersson and Lindberg, eds., “National Perspectives on Europe’s De-Risking from China.”
26    Fürst, “Czechia: Early Ideological Whistleblower Turned European Mainstream”; Rohac, “Chinese Influence in Central and Eastern Europe.”
27    Agathe Demarais, “Divided We Stand: the EU Votes on Chinese EV Tariffs,” European Council on Foreign Relations, October 9, 2024, https://ecfr.eu/article/divided-we-stand-the-eu-votes-on-chinese-electric-vehicle-tariffs/.

The post Czechia’s policy on China: Swinging between engagement and de-risking appeared first on Atlantic Council.

]]>
A next-generation agenda: South Korea-US-Australia security cooperation https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/a-next-generation-agenda-south-korea-us-australia-security-cooperation/ Tue, 04 Nov 2025 13:00:00 +0000 https://www.atlanticcouncil.org/?p=885110 Growing collaboration and cooperation between the United States, South Korea, and Australia could be key to maintaining security and prosperity in the Indo-Pacific. The Atlantic Council and the Korea Foundation gathered rising experts from the United States, South Korea, and Australia to identify obstacles to that cooperation and opportunities to overcome them.

The post A next-generation agenda: South Korea-US-Australia security cooperation appeared first on Atlantic Council.

]]>

Bottom lines up front

  • There is great potential for expanded trilateral cooperation among the United States, South Korea, and Australia, but they will need to overcome the “tyranny of distance” and the resulting diverging threat perceptions.
  • The three partners should do more to take advantage of the varied applications of critical and emerging technologies, as well as engage further with other partners in the region on these topics.
  • The partners can focus their efforts on concretely developing cooperation through public-private collaboration through avenues such as defense industry cooperation, research and development (R&D), and infrastructure projects.

South Korea and Australia have consistently built upon cooperation as two “middle powers” in a region of ever-growing global importance and dynamism. At the same time, the two countries have bolstered their respective alliances with the United States, building regional bilateral and multilateral collaboration. Ultimately, capitalizing on the potential for growing collaboration and cooperation between the United States, South Korea, and Australia could be key to maintaining security and prosperity in the Indo-Pacific. However, when it comes to bringing several countries together in a collaborative environment, there are inherent challenges to reaching a consensus.

To meet that challenge, the Atlantic Council and the Korea Foundation gathered mid-career and junior experts from the United States, South Korea, and Australia in two private workshops. The group identified several obstacles to cooperation—namely, differing geostrategic circumstances, diverging threat perceptions, different strategies for engaging with China, and a lack of consistent engagement between the countries. Despite this, there are several key opportunities to bolster cooperation—namely, defense industrial cooperation, joint endeavors in science and technology, developing maritime security, and collaborating on engaging additional partner countries and multilaterals.

The rising generation of policymakers we spoke with zeroed in on four ways to improve the trilateral relationship:

  • cultivate defense industry collaboration and public-private cooperation;
  • institutionalize relationships and expand joint exercises;
  • foster expanded R&D of critical technologies; and
  • develop disaster-resilient infrastructure projects and early warning systems.

view the full issue brief

about the authors

Lauren D. Gilbert is the deputy director of the Atlantic Council’s Indo-Pacific Security Initiative housed within the Scowcroft Center for Strategy and Security. In this role, she oversees research and programming focused on engaging with US, allied, and partner governments and other key stakeholders to shape strategies and policies to mitigate the most important rising security challenges facing the region.

Kester Abbott is a research associate at the United States Studies Centre at the University of Sydney and a non-resident James A. Kelly Korea fellow at the Pacific Forum. He works on US Indo-Pacific strategy, defense industry issues, and Northeast Asian security dynamics, with a focus on South Korean foreign relations.

Hannah Heewon Seo is the events administrator at The Australia Institute, with a background in international affairs organizations in Australia and South Korea. Her focus centers on foreign relations and diplomacy, particularly engagement with the Asia-Pacific, and the opinions expressed do not represent those of The Australia Institute.

related content

explore the program

The Indo-Pacific Security Initiative (IPSI) informs and shapes the strategies, plans, and policies of the United States and its allies and partners to address the most important rising security challenges in the Indo-Pacific, including China’s growing threat to the international order and North Korea’s destabilizing nuclear weapons advancements. IPSI produces innovative analysis, conducts tabletop exercises, hosts public and private convenings, and engages with US, allied, and partner governments, militaries, media, other key private and public-sector stakeholders, and publics.

The post A next-generation agenda: South Korea-US-Australia security cooperation appeared first on Atlantic Council.

]]>
Forging North America’s energy advantage: Mexico’s pivotal role https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/forging-north-americas-energy-advantage-mexicos-pivotal-role/ Thu, 30 Oct 2025 13:00:00 +0000 https://www.atlanticcouncil.org/?p=882936 With its expanding natural gas sector, export capacity, and more, Mexico can strengthen North America’s energy resilience and competitiveness.

The post Forging North America’s energy advantage: Mexico’s pivotal role appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Mexico, the United States, and Canada have each shifted their energy agendas to emphasize national interests over multilateral coordination.
  • Beneath surface-level tensions, however, their respective strategic priorities are in alignment, presenting an opportunity to enhance collaboration on energy market integration.
  • Within this trilateral relationship, Mexico’s role in particular could lean into its domestic priorities to expand energy infrastructure, strengthen its electric vehicle and semiconductor sectors, and develop its mineral wealth.

North America stands at a pivotal juncture as the United States, Canada, and Mexico navigate shifting policy priorities around economic and industrial sovereignty in the energy sector. At the same time, North America boasts an abundance of energy resources in both production and manufacturing capacity. With a solid trilateral trade foundation already in place, Mexico can play a unique role in bolstering regional security resilience through deeper coordination on cross-border supply chains, manufacturing, and energy trade.

Strategic integration of regional energy resources will be critical to realizing North America’s full potential as an energy powerhouse. With its expanding natural gas sector, growing LNG export capacity, and increasing integration and leadership into advanced manufacturing sectors such as semiconductors and electric vehicles, Mexico can strengthen North America’s energy resilience and competitiveness. Enhanced cross-border cooperation on energy infrastructure, supply chains, and technology transfer would drive local energy stability while lowering regional costs and stabilizing the grid.

As global energy value chains become more concentrated and China continues to dominate them, North American energy security takes on a renewed importance. The upcoming United States-Mexico-Canada Agreement (USMCA) review offers an opportunity to advance policy coordination, align industrial strategy, and build out more integrated energy markets, securing North America’s collective position as a global energy powerhouse. 

view the full issue brief

about the authors

Juan José Gómez-Camacho is a member of the board of directors of Citibank Mexico and the Board of Trustees of the Migration Policy Institute. He provides strategic advice to companies investing and operating in North America, particularly in light of the current political and economic climate.

Additionally, he is a professor and senior fellow at the Johns Hopkins University School of Advanced International Studies, where he teaches and lectures on global challenges and North American affairs.

Liliana Diaz is a nonresident senior fellow with the Atlantic Council Global Energy Center. She is also an adjunct professor of energy, climate policy, and markets in the Americas at the Paul H. Nitze School of Advanced International Studies at Johns Hopkins University, a lecturer at leading energy industry conferences, and a contributor to journals on the development of energy sources and markets, as well as clean technologies and innovation.

stay updated

related content

explore the program

The Global Energy Center develops and promotes pragmatic and nonpartisan policy solutions designed to advance global energy security, enhance economic opportunity, and accelerate pathways to net-zero emissions.

The post Forging North America’s energy advantage: Mexico’s pivotal role appeared first on Atlantic Council.

]]>
Democracy at a crossroads: Rule of law and the case for US engagement in the Balkans https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/democracy-at-a-crossroads-rule-of-law-and-the-case-for-us-engagement-in-the-balkans/ Wed, 29 Oct 2025 21:00:00 +0000 https://www.atlanticcouncil.org/?p=868913 This issue brief is the third in the Freedom and Prosperity Center's "Future of democracy assistance" series, which analyzes the many complex challenges to democracy around the world—and highlights actionable policies that promote democratic governance.

The post Democracy at a crossroads: Rule of law and the case for US engagement in the Balkans appeared first on Atlantic Council.

]]>

Bottom lines up front

  • The Western Balkans sit at a critical junction between NATO, the European Union (EU), and the eastern spheres of influence of Russia and China. Unchecked instability and democratic decline in the region would directly threaten European security and US interests.
  • US democracy assistance in countries such as Serbia, Bosnia and Herzegovina, Albania, and others must specifically address three pillars: fostering people-centered strategies, strengthening the rule of law, and safeguarding political processes.
  • While the EU has invested heavily in the Western Balkans, it cannot foster democratic development in the region alone. The United States should complement European efforts by engaging political parties, energizing civil society, and rewarding meaningful democratic reforms.

This issue brief is part of the Freedom and Prosperity Center’s “The future of democracy assistance” series, which analyzes the many complex challenges to democracy around the world and highlights actionable policies that promote democratic governance.

Introduction: A region undergoing transformation

Since the third wave of democratization—the global surge of democratic transitions beginning in the mid-1970s—Europe has often been regarded as a leader in the field of liberal democracy. In its 2024 Democracy Index, the Economist Intelligence Unit ranks Western Europe as the highest-scoring region worldwide, with an average of 8.38—making it the only region to record a net improvement in democratic performance during the latest annual cycle. However, this snapshot only captures part of Europe’s democratic story and can be misleading, given the complex challenges confronting many of its subregions.

Over the past fifteen years, Europe has endured a “polycrisis”—including the eurozone crisis, the migration crisis, climate change, the COVID-19 pandemic, and the Russia-Ukraine war—all of which have strained democratic institutions and weakened public cohesion.

Europe faces two primary authoritarian adversaries: Russia, which employs election interference, military aggression, and other forms of destabilization, and China, which wields influence through commercial trade deals, loans, and strategic alliances. Together, these pressures accelerate democratic backsliding across the continent.

In the Western Balkans, these dynamics are magnified by elite corruption, foreign interference, and internal political conflict—factors that block long-term democratic progress and stall European Union (EU) integration. The nations in this region face a constant balancing act between the West and its authoritarian rivals in Moscow and Beijing, striving to grow their economies while potentially jeopardizing security and stability. Without increased US support, the Western Balkans could become a serious vulnerability for the EU, with implications for the security and sovereignty of both NATO and the broader West.

The need for a revitalized, regionalized US democracy assistance approach 

Electoral manipulation, the erosion of the rule of law, and authoritarian instability undermine US-European trade, weaken security alliances, and open the door to Russian and Chinese influence. Moscow and Beijing—through disinformation, political infiltration, and economic leverage—have made the Western Balkans a particular focus. Both employ tailored strategies to exploit the weaknesses of the nations in the region—particularly with respect to their election processes, security mechanisms, and political divisions.

Given these circumstances, US democracy assistance in the Western Balkans is vital. Situated between the EU, NATO, and the eastern spheres of influence of Russia and China, the region occupies a critical geopolitical junction. Economically, the Balkans function as a transport hub for maritime trade, energy pipelines, and migrant flows, making it a flash point for European stability.

Today, the region faces intense pressure from the competing economic and political influence of China, Russia, Iran, and other rivals. Left unchecked, the Balkans could serve as a staging ground for authoritarian powers to entrench their hold on Europe. Current developments in the region underscore that this threat is no longer hypothetical:

  1. Serbia’s deepening ties to Moscow and Beijing—evident in its energy dependence, military cooperation, and expanding digital-surveillance infrastructure—pose direct threats to transatlantic interests.
  2. Russia’s sway over Republika Srpska obstructs Bosnia and Herzegovina’s path toward NATO and EU integration, while promoting constitutional instability that undermines national unity.
  3. Montenegro and North Macedonia, though NATO members, are increasingly vulnerable to hybrid threats from Russia and China, owing to weak institutions and growing political fragmentation.

To be effective, US democracy assistance must reflect the varying dynamics across the Balkans, from balancing Western ties with Russian and Chinese incentives to navigating complex internal conflicts amidst deteriorating democratic institutions. These challenges require programs that improve governance accountability and address frozen inter-state conflicts by working with legitimate political parties and local actors. Revitalized, region-specific democracy assistance is necessary to protect US interests and reinforce European democratic security. Supporting democratic development abroad strengthens US security, prosperity, and global influence, while delaying this support further endangers the United States and its allies through long-term instability and conflict.

In the Western Balkans, democracy is facing internal and external pressure

Today, the six countries comprising the Western Balkans are classified as hybrid regimes, reflecting the region’s persistent democratic decline and institutional fragility. Future democracy assistance must counter the persistent influence of Russia and China, which exploit energy and economic dependence to shift the Balkans away from EU integration.

Serbia

Serbia has wavered between pro-Western gestures and deepening ties with Russia and China—exemplified by its decision to provide military support to Ukraine while refusing to impose sanctions on Russia. According to the V-Dem annual reports, Serbia has experienced rapid democratic decay since the early 2000s under the Serbian Progressive Party (SNS). Over the past decades, the ruling party has entrenched its control over the judiciary and the media, undermining democratic checks and electoral competition.

The December 2023 snap elections revealed widespread manipulation, including group voting, falsified voter registration, and targeted attacks on election observers. The government’s growing alignment with Moscow and Beijing, including recent acquisitions of surveillance technology and energy deals with China, threatens Serbia’s European trajectory and regional stability. These developments not only signal the absence of free and fair elections but also invite authoritarian influence on NATO’s southeastern flank.

Since 2024, students have organized mass mobilizations to protest widespread corruption. These demonstrations are likely to continue, emphasizing the need for US support in fostering pluralism and protecting political contestation.

The unresolved conflict between Kosovo and Serbia continues to fuel internal unrest, violence, and protests. Serbia’s refusal to recognize Kosovo’s 2008 declaration of independence has deepened resentment between populations, restricted access to public services in northern Kosovo, and undermined democratic norms.  While the United States and most EU member states support Kosovo’s sovereignty, Serbia is backed by authoritarian powers, including Russia, China, and Iran. This continued denial, along with Serbia’s support for parallel structures in Serb-majority areas, remains a major barrier to Kosovo’s integration into the EU, the UN, and other international institutions.

Kosovo

In Kosovo, internal ethnic tensions and stalled dialogue with Serbia continue to destabilize governance. The May 2024 clashes, which included violence against NATO forces, highlight the fragility of peace in the region. Currently, Kosovo and Serbia share responsibility for public services in northern Kosovo: Serbia supplies education and health care, while Kosovo oversees law enforcement and the court system. This arrangement, however, has left the Serbian minority vulnerable. Prime Minister Albin Kurti deployed heavily armed police across the region, evicted Serbian institutions, banned the use of Serbian currency, and took other provocative actions, prompting roughly 10 percent of Kosovo’s Serbs to leave the country over the past year.

Politically, while Kurti’s Self-Determination Movement won the largest share of votes in the 2025 parliamentary elections, his inability to secure a majority or form a coalition with major opposition parties has stalled democratic reforms.  The prime minister’s hardline stance toward the Serb minority, which appears aimed at consolidating domestic support, has drawn criticism from both Western partners and opposition groups. In response, the United States and the EU suspended financial assistance to pressure Kurti to re-engage with inclusive governance and align with international norms. The resulting political dissonance continues to complicate coalition-building and delay key democratic initiatives aimed at reducing internal ethnic tensions, underscoring the need for external assistance.

Bosnia and Herzegovina

Governance remains stagnant in Bosnia and Herzegovina due to an outdated power-sharing arrangement and ethnically fragmented leadership resistant to meaningful reform. The stalled EU accession process and the exclusion of civil society from decision-making have undermined democratic momentum and weakened citizen trust. With political elites increasingly insulated from accountability, institutional resilience is eroding, and democratic contestation faces the risk of further collapse without stronger international support and grassroots mobilization.

Bosnia and Herzegovina’s democratic decline has been sharper than in other Balkan states. In Republika Srpska—a political entity that emerged from the violent breakup of Yugoslavia—Bosnian Serb President Milorad Dodik has worked to suppress public contestation, recriminalize defamation, and align the territory with the Kremlin’s anti-Western agenda. Dodik’s admiration for Vladimir Putin has facilitated growing Russian influence, undermining independent media and silencing opposition voices. In return, Dodik has received Russian political backing and propaganda support.

While Dodik’s mandate was revoked in late August following an appeals court verdict sentencing him to a one-year prison term, his influence has already entrenched ties to Russia and fueled intense contestation of central institutions. These authoritarian shifts are part of a broader ethno-nationalist strategy that heightens vulnerability to state capture and weakens institutional pluralism.

To reinforce the court’s decision, the Central Election Commission of Bosnia and Herzegovina has called early presidential elections in Republika Srpska. Scheduled for November 23, 2025, the OSCE Mission to Bosnia and Herzegovina and other international entities have voiced support, emphasizing the need for free, constitutional, and democratic elections and a peaceful transfer of power.

North Macedonia

Democratic governance in North Macedonia continues to be undermined by low public trust in judicial institutions, media polarization, and widespread corruption. Citizens perceive the judiciary as politicized and ineffective, even as landmark trials against former officials have concluded. Efforts to digitize courts and increase transparency remain promising but insufficient without broader structural reform. Corruption remains deeply entrenched in procurement processes and political appointments, while anti-corruption agencies are underfunded and lack prosecutorial power. Meanwhile, ethnic and political divisions continue to block electoral reform and erode public confidence in representative democracy. While civil society remains relatively active, government hostility toward critical NGOs signals a shrinking space for civic participation.

North Macedonia’s democratic trajectory has been weakened by increasing political polarization, institutional paralysis, and unresolved identity conflicts with EU members. Since 2022, the opposition party VMRO-DPMNE and the far-left party Levica have obstructed parliamentary proceedings to push for early elections, delaying key judicial appointments and agency confirmations. These deadlocks have stalled the Constitutional Court’s functionality, leaving only four of the required nine judges seated and risking a constitutional crisis. Similarly, state agencies such as the Judicial Council, the public broadcaster board, and antidiscrimination commissions remain vacant due to legislative obstruction, undermining government capacity and the rule of law.

These divisions intensified following the 2022 EU-facilitated “French proposal,” which aimed to resolve Bulgaria’s veto over North Macedonia’s accession negotiations. While the deal unblocked the EU path, it required controversial constitutional amendments recognizing the Bulgarian minority. The ruling Social Democratic Union of Macedonia (SDSM) coalition accepted the compromise, triggering mass protests, fueling nationalist backlash, and galvanizing Eurosceptic sentiment. The opposition launched multiple failed referendums and accused the government of “high treason,” stalling consensus on reforms necessary for EU integration. While the government’s acceptance of the proposal allowed accession talks to begin, it also deepened identity politics and weakened democratic cohesion.

Montenegro

Montenegro’s 2020 elections marked a critical turning point, ending the Democratic Party of Socialists’ (DPS) rule and opening the door to democratic renewal. The new coalition government, led in part by United Reform Action’s (URA) Dritan Abazović, entered with a reformist mandate centered on EU integration and anti-corruption. However, ideological fragmentation and a limited majority produced political instability and stalled reform efforts. Today, judicial appointments remain politicized, anti-corruption efforts are faltering, and deep-rooted patronage networks resist institutional change. The coalition’s collapse in 2022 and the formation of a minority government with DPS support highlighted the fragility of Montenegro’s democratic transition.

Amid Russia’s invasion of Ukraine, the EU expedited Montenegro’s accession process as a geopolitical priority. While the country remains a top candidate for EU membership by 2028, this acceleration has come at the expense of EU democratic standards. Despite progress, media politicization, weak judicial independence, and institutional capture persist.  The EU’s lenient conditionality—prioritizing regional stability over reform—risks reinforcing superficial compliance. US democracy assistance should focus on strengthening the rule of law, protecting independent media, and supporting civil society to ensure Montenegro’s accession reflects genuine democratic consolidation rather than merely geopolitical expediency.

Albania

Albania’s democratic system is historically fragile and deeply conflicted. Prime Minister Edi Rama and the Socialist Party (SP) hold a strong majority, having secured a fourth consecutive term in the 2025 parliamentary elections with 52.2 percent of the vote. Although the country’s elections are competitive and professionally administered, they take place in a polarized environment marked by allegations of vote-buying and the use of public funds in underprivileged areas to influence outcomes. The SP’s practices undermine pluralism and weaken local governments, which often struggle to provide basic services.

The main opposition, fragmented between factions of the Democratic Party, has failed to meaningfully challenge the government, resulting in diminished parliamentary oversight. This dysfunction culminated in violence in late 2023, after which the government passed restrictive laws curbing opposition activities.

Civil society contributes to national debates, but its impact is often limited due to underfunding, exclusion from policymaking, and occasional co-optation by partisan interests. The media landscape remains largely independent and frequently holds public officials accountable; however, ownership is concentrated in the hands of politically connected elites who leverage their platforms to influence parties and government actors. These insufficient accountability mechanisms have fueled disinformation and deepened public distrust—a vulnerability that Russia could exploit.

Despite these challenges, Albania has a strong foundation of civil society and independent media. The country needs comprehensive support that strengthens civic participation, protects independent journalists, and establishes equitable funding mechanisms for municipal governments.

Reaffirming ties with the EU

The EU recently met with Western Balkan leaders to conceptualize a Growth Plan for the Western Balkans. The meeting included pre-financing payments under the Reform and Growth Facility for North Macedonia, Albania, Montenegro, and Serbia, and further incentivized Kosovo and Bosnia and Herzegovina to pursue reforms.

Emerging deals included new flagship investments in clean energy, initiatives to integrate the region into the EU Single Market, and measures to enhance digital connectivity. Each of these steps outlines technical areas of alignment between the EU and the Balkans, yet questions remain about the future of democracy in the region.

The Western Balkans remain caught between competing pressures: democratic deterioration, unresolved regional conflicts, and growing authoritarian influence. While the EU has invested heavily in the region’s integration, technical improvements alone cannot guarantee democratic development. Therefore, the United States must support the EU’s expansion efforts while emphasizing the importance of democracy. This requires a revitalized approach—one that engages political parties, energizes civil society, and rewards meaningful democratic reforms.

A revitalized approach to democracy assistance

US democracy assistance should embrace three pillars: people, the rule of law, and political processes. These pillars can be broken down into thematic priorities—anti-corruption measures, the protection of independent media and civil society, the empowerment of political parties and contestation, and other vital actions to revitalize democratic progress.

Fostering people-centered strategies

Democracy can only be sustained with inclusive policies that foster an informed, engaged, and educated public. In the face of authoritarian power—which has provoked mass protests and ethnic tensions, creating openings for Chinese and Russian influence—incorporating people-centered objectives is vital to mitigate internal conflict. The United States should therefore prioritize civic education, inter-ethnic dialogue channels, and youth engagement, especially in areas where political violence and protests are prevalent.

Application examples

In Kosovo, this strategy would involve programs fostering interethnic dialogue between Albanian and Serb youth in schools and community spaces. Assistance could also expand civic education initiatives in Serb-majority areas and empower youth-led organizations focused on reconciliation, rights awareness, and political participation. In addition, the United States should provide legal and technical assistance to civil society groups seeking to hold municipal leaders accountable, particularly in border regions.

The United States should counter concentrated executive power through media literacy training in Republika Srpska, stronger protections for journalists and civic actors, and forums to address misinformation and anti-Western rhetoric. Ensuring access to education and multiethnic safe spaces would help mitigate the long-term effects of President Dodik’s autocratic, pro-Kremlin legacy, and support intra-group dialogue in preparation for a democratic election.

Serbia’s student-led protests reflect a desire to challenge government corruption and demand public safety. The United States should support this mobilization by investing in youth-led civic initiatives, combining education with inclusive services for ethnic minorities. However, progress between Serbs and Albanians will remain challenging unless Serbia’s political leadership accepts internationally recognized borders. 

Public services and rights must be non-discriminatory and inclusive of all minority populations. The United States should also work with judicial institutions in the Western Balkans to ensure protection for citizens facing disparities.

Supporting the rule of law

Building an independent, non-discriminatory judicial system is vital for reducing conflict during peace negotiations and to prevent executive overreach. US democracy assistance can deploy resources and anti-corruption support in Montenegro to encourage neighboring nations to uphold democratic standards, thereby addressing entrenched ethnic divides and intra-state violence. 

Application examples

In Albania, this strategy would prioritize strengthening anti-corruption organizations to curb executive abuse and the unfair treatment of opposition parties and municipal institutions. Cooperating with the Special Structure against Corruption and Organized Crime (SPAK)—which has successfully prosecuted high-level officials—should be expanded to include legal training, protective measures, and transatlantic cooperation opportunities. SPAK’s credibility offers a potential framework for broader rule-of-law assistance in North Macedonia, where transparency in public procurement and prosecutorial independence remain insufficient. Judicial reform in both countries must be accompanied by public awareness campaigns to build trust in institutions and deter political interference.

These themes should be applied to Montenegro, where politicized judicial appointments and weak enforcement mechanisms continue to undermine democratic transformation. As a likely future EU member, Montenegro must strengthen its political institutions, which in turn must be held accountable by independent courts and judges. Similarly, prioritizing Montenegro’s democratic and economic alignment would provide a model for other Balkan states pursuing EU integration.

Finally, in cases of severe ethnic tensions or disparities, the United States must ensure that judicial development promotes inclusive and non-discriminatory services for citizens. This will be vital in Kosovo and Serbia, where stalled dialogue efforts weaken public services and heighten conflict, as well as in other multiethnic states such as North Macedonia, Bosnia and Herzegovina, Serbia, and Montenegro. Supporting judicial institutions will not only build public trust but also protect opposition parties from executive overreach and political repression.

Safeguarding political processes

Political parties have had inconsistent levels of impact in the Western Balkans. Fair competition and coalition-building are vital to strengthen democracy and counter state capture. US assistance should directly engage with political parties to improve inclusivity, policy development, and voter mobilization.

Application examples

Montenegro’s recent election of the United Reform Action (URA) demonstrates the promise of a democratically driven government. In line with this pillar, the United States should address political fragmentation by supporting cross-party dialogue mechanisms, while also creating space for civil society members to participate in policymaking.

Similar mechanisms can be applied to Kosovo, Albania, and North Macedonia, where opposition parties struggle with ideological fragmentation. Open debates, local council meetings, and forums featuring civil society organizations and political representatives would help align citizens’ priorities and party platforms. Technical training should also be extended to countries with ethnic divisions, such as Kosovo and Serbia, focusing on inclusive policymaking and youth engagement. 

Finally, in states facing autocratic takeover, such as Bosnia and Herzegovina, this strategy would promote platforms that transcend ethno-nationalist lines and foster cooperation in coalition building. With many Western Balkan states reliant on opposition parties to revitalize democracy, US assistance must prioritize fair and inclusive political competition. By integrating political parties into assistance efforts rather than sidelining them, the United States can help restore the democratic dialogue necessary for government reform. People-centered mobilization, institutional reform, and the renewal of political processes must go hand in hand to ensure democratic resilience across the Western Balkans.

Strategic implications for the United States

A three-pillar strategy—centered on people, the rule of law, and political processes—provides a pragmatic and adaptive framework for revitalizing US democracy assistance in the Western Balkans. As the region struggles with authoritarian interference, ethnic conflict, political fragmentation, and democratic decay, sustained US engagement is critical to prevent long-term instability. Democracy assistance not only builds institutional resilience and civic participation but also protects strategic US interests by stabilizing NATO’s southeastern flank, advancing EU integration, and countering Russian and Chinese influence. To ensure long-term stability and democratic momentum in one of Europe’s most volatile regions, the United States must treat democracy assistance as a core component of its foreign policy and global leadership.

about the authors

Stephen Nix is the senior director for Europe and Eurasia at the International Republican Institute.

Megan Tamisiea is a researcher with an MA in Democracy and Governance from Georgetown University.

Related content

The future of democracy assistance

This paper series provides an in-depth look at the many complex challenges to democracy around the world and highlights actionable policies that promote democratic governance.

Trackers and Data Visualizations

Jun 15, 2023

Freedom and Prosperity Indexes

The indexes rank 164 countries around the world according to their levels of freedom and prosperity. Use our site to explore twenty-eight years of data, compare countries and regions, and examine the sub-indexes and indicators that comprise our indexes.

explore the program

The Freedom and Prosperity Center aims to increase the prosperity of the poor and marginalized in developing countries and to explore the nature of the relationship between freedom and prosperity in both developing and developed nations.

The post Democracy at a crossroads: Rule of law and the case for US engagement in the Balkans appeared first on Atlantic Council.

]]>
Authoritarian reach and democratic response: A tactical framework to counter and prevent transnational repression https://www.atlanticcouncil.org/in-depth-research-reports/report/authoritarian-reach-and-democratic-response-a-tactical-framework-to-counter-and-prevent-transnational-repression/ Mon, 27 Oct 2025 13:00:00 +0000 https://www.atlanticcouncil.org/?p=882895 When foreign governments conduct surveillance, intimidation, or enforcement actions—including through the exercise of extraterritorial police power by authoritarian regimes inside the nations they target—they undermine state sovereignty and threaten to erode public trust in institutions, representing a significant national security threat.  

The post Authoritarian reach and democratic response: A tactical framework to counter and prevent transnational repression appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Foreign interference (FI) and transnational repression (TNR) represent a fundamental challenge to the international rules-based order by employing tactics that exist below the threshold of armed conflict while violating national sovereignty.
  • Beyond national borders, authoritarian states have targeted policymakers, elected officials, researchers, journalists, activists, and diaspora communities worldwide to advance their political objectives.
  • These TNR tactics encompass cross-domain operations, including surveillance, cyberattacks, disinformation, legal and judicial harassment, and physical and psychological assault.

Transnational represssion (TNR) represents a growing threat to democratic societies worldwide, as authoritarian regimes extend their repression beyond borders, utilizing covert and overt influence operations to advance their political objectives. Over the past decade, the term “transnational repression” has been used to describe the actions of states that seek to control populations living outside their borders. University of Notre Dame Professor Dana M. Moss coined the term to refer to “the repression of diasporas by home-country regimes,” which aims to “punish, deter, undermine, and silence activism in the diaspora,” thereby preventing these populations from completely exiting authoritarian control. 

State, state-affiliated, and non-state actors employ a range of coercive strategies to silence critics, alienate opposition, and control diaspora communities via intimidation. TNR manifests into a sophisticated blend of operations, including surveillance, cyberattacks, disinformation campaigns, legal and judicial harassment (sometimes called lawfare), and even physical and psychological assault. As these operations often exist in legal gray zones, they exploit vulnerabilities within liberal democracies, challenging the international rules-based order below the threshold of major pushback from the international community. Despite growing efforts and attention toward the issue, democracies have struggled to counter these extraterritorial repression tactics effectively.  

When foreign governments conduct surveillance, intimidation, or enforcement actions—including through the exercise of extraterritorial police power by authoritarian regimes inside the nations they target—they undermine state sovereignty and threaten to erode public trust in institutions, representing a significant national security threat.  

A strategic framework on transnational repression is urgently needed to confront this rapidly evolving global threat. While the body of research and policy responses has been slowly developing over recent years, these actions remain largely fragmented, reactive, and uncoordinated. What is lacking is a unifying, practical framework that consolidates these efforts and provides a comprehensive, proactive approach to understanding, disrupting, preventing, and countering transnational repression.  

As resources to support activists, journalists, and diaspora communities targeted by TNR come under increasing strain— exacerbated by the growing absence of sustained US leadership and funding in this domain—the need for a common strategic framework is more urgent than ever. In this context, a unified framework to guide Western democratic allies will foster greater coherence and coordination, while also supporting the accelerated development, implementation, and effectiveness of policies and countermeasures. By providing a shared foundation for identifying threats, protecting vulnerable communities, and confronting the foreign regimes that engage in TNR, such a framework would strengthen collective democratic resilience at a time when it is most critically needed. Ultimately, the goal is to establish a global, whole-of-society approach that fosters collective responses across like-minded democracies.  

Rather than reinventing an entirely new architecture, the objective of this framework is to extend and enhance the utility of existing frameworks by tailoring their components to the specific dynamics of global TNR. This includes integrating elements that account for current policy gaps, diaspora vulnerability mapping, coordinated policy responses, and civil society resilience.  

By understanding the objectives and TTPs of transnational repression, this project aims to propose actionable countermeasures to disrupt, deter, and prevent future TNR operations at various stages through a comprehensive framework. 

Read the full report

About the authors

Marcus Kolga is a journalist, human rights activist, and a Canadian analyst of foreign disinformation and influence operations. Kolga founded DisinfoWatch.org in 2020 to monitor and analyze foreign disinformation targeting Canada. He is a senior fellow at the Macdonald-Laurier Institute Center for Advancing Canada’s Interests Abroad, The CDA Institute, and the Raoul Wallenberg Center for Human Rights.
 
Sze-Fung Lee is an independent researcher specializing in Chinese hybrid warfare, including Foreign Information Manipulation and Interference (FIMI), Grand Strategy, Gray Zone Tactics, and Cognitive Warfare. Zir research also focuses on Indo-Pacific security policy, challenges posed by emerging technologies, and the politics of Hong Kong. 
 
Iria Puyosa is a senior research fellow at the Atlantic Council’s Democracy+Tech Initiative. She specializes in the complex interplay between technology and political dynamics. For over a decade, Puyosa has investigated information operations that undermine democratic institutions and fuel political instability. Her work uncovers the multifaceted threats of digital authoritarianism and contributes to a deeper understanding of the challenges facing democracies in the digital age.

Kenton Thibaut is a senior resident China fellow at the Atlantic Council’s Digital Forensic Research Lab (DFRLab), where she leads China programming for the Democracy + Tech Initiative, and a resident senior fellow at the Atlantic Council’s Indo-Pacific Security Initiative (IPSI) at the Scowcroft Center for Strategy and Security.

Lisandra Novo is the senior law & tech advisor for the Strategic Litigation Project at the Atlantic Council. The Strategic Litigation Project works on prevention and accountability efforts for atrocity crimes, human-rights violations, terrorism, and corruption offenses around the world. 

Related content

Explore the programs

The Atlantic Council Technology Programs comprises five existing efforts—the Digital Forensic Research Lab (DFRLab), the GeoTech Center, the Cyber Statecraft Initiative, the Democracy + Tech Initiative, and the Capacity Building Initiative. These operations work together to address the geopolitical implications of technology and provide policymakers and global stakeholders necessary research, insights, and convenings to address challenges around global technology and ensure its responsible advancement.

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

The Democracy + Tech Initiative creates policy practices that align global stakeholders toward tech and governance that reinforces, rather than undermines, open societies. It builds on the DFRLab’s established track record and leadership in the open-source field, empowering global communities to promote transparency and accountability online and around the world.

The post Authoritarian reach and democratic response: A tactical framework to counter and prevent transnational repression appeared first on Atlantic Council.

]]>
Why Washington should pay attention to Turkey’s presence in Central Asia https://www.atlanticcouncil.org/in-depth-research-reports/report/why-washington-should-pay-attention-to-turkeys-presence-in-central-asia/ Thu, 23 Oct 2025 13:00:00 +0000 https://www.atlanticcouncil.org/?p=882087 Understanding Turkey's presence in Central Asia its implication for US foreign policy objectives in the region.

The post Why Washington should pay attention to Turkey’s presence in Central Asia appeared first on Atlantic Council.

]]>

Table of contents

Key findings

  1. Turkey has taken significant strides over the last two decades to establish itself in Central Asia, now boasting significant economic, cultural, and political presence, as well as steadily growing defense ties.
  2. Turkey and the other four Central Asian Turkic states continue to highlight shared cultural and linguistic heritage in government communications and public media. The underpinnings of these relationships are nonetheless pragmatic, with “pan-Turkic” thought remaining both diverse and debated across Central Asia. Turkey’s growing presence in the regioncombined with local media and governments promotion of pan-Turkic narratives, howeverwill likely mean such ideologies will be more influential on future generations of both Central Asians and Turks.
  3. Turkey’s activities in the region pose a dilemma to Russia: They are not overtly threatening enough to justify a strong reaction, but ultimately encourage economic and political autonomy. As a result, the Kremlin is concerned by Turkey’s presence in the region, though it has limited options to respond.
  4. Turkey’s activities and goals in the region often align with those of the United States. Those that do not are largely benign to US foreign policy objectives.
  5. The United States should consider greater partnership and communication with its allies better established in the region, including but not limited to Turkey. Doing so could augment US foreign policy goals at limited political and economic cost.  
  6. Despite strides in economic, cultural, and political presence, Turkish activities are still ultimately dwarfed by those of Russia and China. Russia, in particular, exhibits immense cultural staying-power that permeates many Central Asian societies.
  7. Both Tajikistan and Turkmenistan deserve increased examination by policymakers. Tajikistan will be an important factor to watch in determining the ultimate direction of Central Asian regional integration. Turkmenistan has major potential for augmenting the Middle Corridor project. Turkey’s relationships with both countries will prove important.

Introduction

In an increasingly turbulent world, the importance of Central Asia has grown rapidly. Abundant with mineral and energy resources, burgeoning markets, and strategically located between China, Russia, and Iran, the region that includes Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan is quickly drawing the attention of actors from around the globe—while Turkey burnishes its Central Asia ties. 

Russia and China still dominate the economic and political landscape of Central Asia, though the region is increasingly engaged by a diverse cast of characters. The rise of the Trans-Caspian International Transport Route—a project also known as the Middle Corridor, which functions as a multilateral transport network linking China and the European Union through Central Asia, the Caucasus, and Turkey—has opened the door to billions of dollars in funding and associated projects, including over £20 billion ($26.78 billion) from the United Kingdom, and €12 billion from the European Union since 2024. 1 France, Germany, the UK, and India have all fostered ties to the region in recent years, while Japan, South Korea, and the United Arab Emirates have long maintained an economic presence.2 In recent years few countries have so successfully integrated themselves into the cultural, political, or economic fabric of Central Asia as Turkey.

As the region rises in importance, understanding the increasingly complicated field of actors in Central Asia and its implications for US policy goals is key. A major NATO member with a complicated bilateral relationship with the United States, Turkey’s extensive presence in Central Asia deserves exploration, as well as an analysis of the opportunities and challenges surrounding Ankara’s influence in the region. This report seeks to understand Turkey’s policy toward and presence in Central Asia and offer interpretations for US policymakers.

For this report, the author interviewed thirty-seven foreign policy experts, including former and current government officials from across Central Asia, many of them speaking anonymously given consideration of their respective countries’ political environments. Information that could not be substantiated by open-source media is only included if it was widely agreed upon and regarded as “common knowledge” across several interviews and is explicitly indicated as such.

A brief history: Turkey in Central Asia until the 2010s

Following the Soviet Union’s collapse, Turkey quickly engaged Central Asia’s Turkic states and, to a lesser degree, Tajikistan, leaning heavily into the perception of shared linguistic, cultural, and religious ties to strengthen relations. The region’s opening coincided with Turkish politicians seeking greater global influence.

In 1991, Turkey swiftly recognized the independence of Central Asian countries, in particular building ties through its development agency, Turkish Cooperation and Coordination Agency (TIKA), and co-founding the International Organization of Turkic Culture (TURKSOY). Turkish businesses were some of the first to enter newly opened Central Asian markets.

The reception to Turkey’s overtures in the early 1990s was mixed. Relishing their newfound independence from Russia, many Central Asian states were skeptical of Turkish intentions and feared exchanging one “big brother” for another. At the time, Turkey was in an economically precarious situation and unprepared to assume the role it may have imagined; in addition, its growing and complicated relationship with Russia did not aid its outreach in Central Asia. Combined with Turkish aspirations to rapidly liberalize the region economically, many Central Asian leaders feared a loss in their newly gained sovereignty.

The religious aspects of Turkish engagement also raised alarm for many. While Kemal Atatürk’s secular legacy was largely respected by regional post-communist elites, outreach in the 1990s prominently featured religious elements through religious schools and the Turkish Directorate of Religious Affairs (Diyanet). Still a major soft-power institution today, the Diyanet established the Eurasian Islamic Council in 1994 and financed mosques across the region. Despite progress, by the mid-1990s, Turkey’s momentum in the region had notably declined, a product of economic constraints, Russia’s return to the region, and Turkey’s lukewarm reception among the Central Asian states.3

Uzbekistan represented the most severe fallout from mismatched expectations. President Islam Karimov deeply distrusted Turkish intentions, linking them with growing domestic terrorism from the Islamic Movement of Uzbekistan (IMU).4 In 1993, Uzbekistani opposition leader Muhammed Salih fled to Istanbul, further fueling Uzbekistani suspicions. Subsequently, Uzbekistani authorities targeted Turkish-associated political movements including the Erk and Birlik parties.5 Tensions peaked in 1999 when Uzbekistan accused a Turkish citizen of attempting to assassinate Karimov. Over the ensuing years, Uzbekistan would go on to target several Turkish businesses with severe restrictions.6 Relations did not recover until Karimov’s death in 2016.

By the late 1990s, pan-Turkic ambitions had given way to quieter, steady cultural and economic interactions.  Under Recep Tayyip Erdoğan’s regime, Turkey reemerged in the late 2000s within a transformed geopolitical environment: Russia’s resurgence and China’s growing influence. Erdoğan’s administration balanced ideological outreach with more pragmatic strategies, emphasizing aid, infrastructure work, military cooperation, and expanded trade.

This era marked a shift toward more inclusive engagement, supporting broader mutual interests, while retaining some of the pan-Turkic undertones. Multilateral forums emerged, notably the Turkic Council (today’s Organization of Turkic States, OTS), which was founded in 2009 on the basis of shared “historical ties, common language, culture, and traditions.”7 Although Turkish media and politicians continued emphasizing ethnic narratives, relations became driven primarily by pragmatism and Central Asia’s desire for diversification away from China and Russia. Erdoğan’s strong personal relationships with other Central Asian leaders also play a key role in deepening connections. Similarly, Erdoğan’s son, Bilal, is famously interested in and has spent extensive time in the region—both as an unofficial representative of his father and the head of the Turkish Youth Foundation and World Ethnosport Confederation, which was originally established in Bishkek before moving to Istanbul.8

Assessing attitudes towards Turkey today

Turkish cultural and business presence across Central Asia has elicited mixed reactions in the region, generally ranging from “lukewarm” to “brotherly.” A 2023 Central Asia Barometer (CAB) survey ranked Turkey as the most favorable country among respondents from Kyrgyzstan and Kazakhstan, ahead of Russia, Iran, China, and the United States. Kyrgyzstan displayed the greatest affection, with 40 percent of respondents holding “very favorable” views and 44 percent holding “somewhat favorable” views.9 Turkmenistan and Uzbekistan placed Turkey second, behind Russia. Turkish goods, particularly textiles, carry positive cultural associations of quality, bolstered by Turkish companies often importing European goods. Turkish diplomatic visits receive prominent coverage in Central Asian media. In non-Turkic Tajikistan, favorability remains notably lower but positive despite historical Turkish support for its then-regional rival Kyrgyzstan (the survey predated the landmark Tajikistan-Kyrgyzstan border agreement).

Among the political and business elites with warm attitudes toward Turkey, motivations vary. Some genuinely support pan-Turkic ideals; others view Turkey pragmatically as a reliable partner or gateway to the West. Debate persists over Turkey’s ideal role, with ideological factions including traditional pan-Turkists, pro-Russian groups, pragmatic nationalists, and advocates for regional integration as independently as possible from major powers.

Central Asia is increasingly trending toward regional integration, yet critical questions persist: How should non-Turkic Tajikistan be incorporated? How close should ties remain with Russia? What is Turkey’s appropriate regional political role? Such discussions remain contentious and vary significantly from country to country.

These questions are particularly important to Uzbekistan, which generally favors regional integration yet appears to remain among the most skeptical of pan-Turkic messaging, especially due to its deep economic and cultural ties with Tajikistan. Beyond the large populations of Tajikistani migrant workers, and a dependence on the Amu Darya and Zeravshan rivers,10 the two nations are culturally linked at the hip: Tajik is spoken widely in several important Uzbekistani cities, including Bukhara. Many Uzbekistanis interviewed for this project echoed the words of an Uzbekistani political analyst asked about the topic: “Uzbekistan will always put the idea of ‘Central Asia’ above Turkey.”

The Zeravshan river near Panjakent, Tajikistan. Photo by Petar Milošević, via Wikimedia Commons.

Despite ideological divides, interviewees across the region expressed that Ankara has cultivated strong institutional trust and bilateral relationships, particularly among senior state officials and younger diplomats who began their careers after the dissolution of the USSR. In contrast, older career bureaucrats trained or educated in Moscow tend to identify more with their Russian past.

Turkey’s reputation and diplomatic standing is not without its limits, however. Several Uzbekistanis and Kazakhstanis interviewed for this paper commented that the “big brother” attitude of Turks famously documented in the 1990s persists in the minds of many Turkish businessmen and diplomats,11 though most agreed this has improved in recent years. In interviews with Uzbekistani experts, there was a consensus that the decision of the Organization of Turkic States (OTS) to admit the Turkish Republic of North Cyprus (TRNC) as an observer state was done with great apprehension. This aligns with Uzbekistan’s later public downplaying of the situation and ensuing confusion about the status of the TRNC in Uzbekistani and Central Asian politics.12 In April 2025, Uzbekistan, Kazakhstan, and Turkmenistan appointed ambassadors to the Republic of Cyprus, and affirmed support for UN Security Council resolutions 541 and 550 which calls “attempts to create a ‘Turkish Republic of North Cyprus’ invalid,” to bolster ties with the EU—marking the pragmatic limits of Turkish influence.13 A joint declaration at the 2025 OTS summit held in Gabala called for the need to “reach a negotiated, mutually acceptable […] settlement,” to the “Cyprus issue”, and expressed “solidarity with the Turkish Cypriot people,” a statement likely designed to strike a neutral tone that balances both Ankara and Brussels.14

Understanding Turkish soft power

Media

Central Asian news media remains dominated by Russia and Russian-language sources, except in Uzbekistan, where local-language media promotion is vigorous. The Turkish state-owned Turkish Radio and Television company (TRT) is the sole major Turkish media outlet distributing content in Uzbek, Kyrgyz, Turkmen, and Kazakh. In December 2024, it expanded to include broadcasts in Farsi, spoken in Tajikistan.15 TRT also runs Avaz (meaning “voice”), a channel largely focused on promoting pro-Turkey and Turkic narratives through the form of soap operas, documentaries, news, and movies, which is distributed throughout the region in local languages. Other Turkish outlets typically publish only in Turkish or English, restricting local accessibility, while Turkish media that publishes in Russian, such as Anadolu Ajansi (the Turkish state-run news agency), rarely cover Central Asia. Turkish news is not widely consumed, except in Turkmenistan, where 47 percent of respondents in a CAB survey reported “occasionally viewing” Turkish news.16

In entertainment media, Turkish films and soap operas enjoy broad popularity throughout the region, including Tajikistan. Kazakhstan’s state television regularly airs Turkish dramas, and the two states have intensified cooperation in the field including jointly producing TV series and hosting a “Turkic film festival”.17 Some Turkish musicians are well-known, although Uzbekistani, Russian, and Kazakhstani artists still dominate the music scene. Media exchanges are increasingly reciprocal: Kazakhstan’s state-owned Silk Way TV began broadcasting in Turkish in May 2024, and many Turkish shows are filmed in the region. These Turkish TV exports are part of a broader trend, with global demand for Turkish series increasing 184 percent from 2020 to 2023.18

Development aid and projects

Turkey’s global development aid programs extensively engage Central Asia, historically prioritizing Kyrgyzstan and Kazakhstan. Uzbekistan resisted Turkish aid until rapprochement in 2017, while resource-rich Turkmenistan has shown fluctuating interest  and non-Turkic Tajikistan fell lower on the list of priorities. Between 1991 and 2018, Turkey ranked as Kyrgyzstan’s largest official development assistance provider ($1.156 billion) and the second largest to Kazakhstan ($669 million).19 Turkish aid often focuses on prominent infrastructure projects—including museums, mosques, hospitals, and universities—typically built by Turkish construction firms.

Recently, Turkey’s soft power model appears to be moving away from direct development aid however, influenced by rising alternative donors such as India, Gulf countries, and the European Union, Turkey’s own economic constraints, and its increasing prioritization of Syria and Africa. Importantly, rapidly developing Central Asian states like Kazakhstan and Uzbekistan prefer investments and technical assistance over traditional aid. Kazakhstan has rebranded itself as an aid provider, establishing the Kazakhstan Agency for International Development (KazAID) in January 2021.

Despite this shift, Turkish aid’s legacy continues to enhance its image in the region. TIKA’s projects are often strategically located and visible. Examples include the Recep Tayyip Erdoğan Bishkek Kyrgyz-Turkish Friendship State Hospital, adorned with Turkish flags, and the renovated Kyrgyz State History Museum, featuring a plaque thanking Turkey, adjacent to the Kyrgyzstani parliament.

Turkish-supported projects, such as archaeological excavations in Akmola (Kazakhstan) and a traditional handicrafts center in Khiva (Uzbekistan), frequently reinforce pan-Turkic narratives. Education initiatives explicitly promote Turkic cultural and historical studies, particularly the creation of “Turkology” departments, including in autonomous public universities.  Despite the creation of numerous faculties of Turkology across the region, there is still a major disconnect with everyday people, many of whom assume it is simply the study of Turkey, with one Kazakhstani professor of Turkology describing “even our students didn’t know about Turkology before they came to the department.”20

Beyond supporting Turkology departments, the Turkish government maintains a network of schools in the region both through its Maarif program and two joint universities: Hoca Ahmet Yesevi University (Kazakhstan) and Manas University (Kyrgyzstan), alongside quotas designed to encourage Central Asians to study in Turkey. In 2020, Central Asians received 793 university scholarships, comprising 21 percent of all Turkish international scholarships despite representing 6.5 percent of applicants.21

Regional integration, changing dynamics, and the Organization of Turkic States

Originally founded as the Turkic Council in 2009, the OTS has grown increasingly influential in Central Asia. Since its 2021 rebranding, OTS has moved toward more concrete regional integration and coordination, addressing significant economic and political issues. OTS’s evolution has involved the establishment of  several working bodies like the Civil Protection Mechanism for disaster relief, the Union of Turkic Chambers of Commerce (TCCI), and the Turkic Investment Fund (TIF), which launched in May 2024 with $500 million in starting capital,22 and increased to $600 million with Hungary’s entry in February 2025.23 As of September 2025, the TIF has yet to post its first tenders, which are largely expected to focus on supporting SMEs, renewable energy, and transportation. An announcement from OTS heads of state at a meeting in Budapest suggested the TIF may begin operating  in full by the end of 2025, though few details remain available.24

Turkish President Recep Tayyip Erdoğan speaks at the 7th OTS summit in Baku, Azerbaijan. Handout from the Press Office of the President of the Republic of Azerbaijan.

OTS’ primary focus has  increasingly transitioned from cultural to economic integration, supporting standardized customs processes, transport infrastructure development, and logistics improvements through its Transport Connectivity Program and Turkic Investment Fund. These projects have received broad international support, aligning with China’s Belt and Road Initiative and the Trans-Caspian International Transport Route (TITR/Middle Corridor), backed by institutions like the Asian Development Bank, European Bank for Reconstruction and Development, and the EU. Instead of working through these routes, Turkey prefers to support these initiatives via OTS and the Eurasian Transport Route Association, cofounded in September 2024 with Azerbaijan, China, Kazakhstan, Kyrgyzstan, Tajikistan, and Austria.25

It should be noted that OTS is not a military alliance, something that would conflict directly with the charter of the Collective Security Treaty Organization,26 but is increasingly moving toward security cooperation. The most recent development in this area came during the 2025 OTS summit in Gabala, Azerbaijan, when Azeri President Ilham Aliyev called for joint OTS military exercises, a significant step.27 Similarly, Kazakhstani President Kassym-Jomart Tokayev called for the establishment of a Turkic cybersecurity council designed to jointly prepare for and respond to cyberattacks and threats.28

While Turkey remains a major economic, military, and demographic power within OTS, it does not appear to dominate unilaterally. Experts interviewed from Uzbekistan, Kyrgyzstan, and Kazakhstan broadly emphasized their satisfaction with their representation in OTS, highlighting, for example, the foundational role of the former president of Kazakhstan, Nursultan Nazarbayev, and Azerbaijan’s active participation. Nonetheless, Turkey has secured notable policy victories through OTS, such as establishing the curriculum for the International University of Turkic States, based on Turkey’s university system, and admitting the Turkish Republic of Northern Cyprus as an observer state.29

Economic presence

Turkish businesses have established significant presence across Central Asia, leveraging shared language, culture, geographical proximity, and Western business connections. Predominantly active in construction, hospitality, and manufacturing (especially textiles), nearly 4,000 Turkish businesses currently operate in the region.30 By 2025, eight years after Uzbekistan’s reproachment with Turkey, nearly 1,900 Turkish companies operated in the country, ranking only behind China and Russia.31 Since 2008, Turkey has consistently ranked in Kyrgyzstan’s top three sources of foreign direct investment (FDI), sometimes as number one on the list, most recently in 2022.32 Additionally, Turkish markets are increasingly attracting Central Asian investors, exemplified by Kazakh fintech firm Kaspi.kz’s acquisition of Turkish e-commerce giant Hepsiburada in October 2024.33

Turkish businesses enjoy key competitive advantages in Central Asia, particularly easier access to capital and financial transactions through established Turkish banks. Demir Bank in Kyrgyzstan, now owned by HSBC, has operated for over twenty years and was Kyrgyzstan’s first fully foreign-capitalized bank.34 In September 2024, the Turkish state-owned Ziraat Bank announced plans to open a Bishkek branch, and was already operating subsidiaries in Uzbekistan, Turkmenistan, and Kazakhstan.35 By 2018, shortly after Turkey’s rapprochement with Uzbekistan, Ziraat’s Uzbek subsidiary had roughly 1,000 institutional customers and 13,000 individual clients, and it secured a $350 million credit line.36

Turkish businesses also maintain extensive connections and experience working alongside Russian banks and corporations, which are crucial to regional operations. Turkish companies often serve as intermediaries for Western firms hesitant about local market conditions, particularly in Uzbekistan and Kyrgyzstan. Three of sixteen US businesses in Kyrgyzstan operate through Turkish intermediaries. Additionally, US Chambers of Commerce (aka AmChams) in Central Asia increasingly welcome third-country involvement, promoting regional dialogues with Western businesses. Central Asian AmChams established partnerships with those from Turkey, Greece, and Bulgaria during the October 2024 Eurasian Economic Summit in Istanbul.37

Turkey’s economic footprint in Central Asia is increasingly shaped by bilateral agreements and diplomatic ties. Public pledges to aggressively increase bilateral trade often follow high-level meetings. Between 2018 and 2024, Turkey announced bilateral trade targets of $5 billion with Turkmenistan, $2 billion with Kyrgyzstan, $15 billion with Kazakhstan, $5 billion with Uzbekistan, and $1 billion with Tajikistan. Despite the goals, actual bilateral trade has only increased substantially with Kazakhstan and Kyrgyzstan, largely stagnating or inching forward elsewhere, according to UN Comtrade data.38 Nonetheless, Turkey has struck several deals to support its economic position in the region in recent years like preferential trade agreements with Uzbekistan or Turkey’s November 2024 commitment to purchase Kazakh beef at double China’s offered price.39 Though the economic impact of deals such as these is often limited, they are widely covered in local news, serving to strengthen Turkey’s local image. Economic policy increasingly underpins diplomatic ties, exemplified by an April 2024 memorandum of understanding for central bank cooperation between Turkey and Kazakhstan; Turkey’s November 2024 decision to waive Kyrgyzstan’s $59 million debt in exchange for renewable energy projects; and plans for a Turkish-backed industrial zone in Kyrgyzstan’s Chui province.40

The port of Aktau, in Kazakhstan, is pictured. Ashina via Wikimedia Commons.

Competition is intensifying as Central Asia’s geopolitical importance grows. Gulf-based companies are rapidly entering sectors traditionally prized by Turkish firms, particularly energy and hospitality in Uzbekistan and Kyrgyzstan. In Uzbekistan alone, Saudi Arabia recently launched $3 billion in renewable projects,41 the UAE has signed several agreements on tourism,42 and Qatar Airways launched flights to Uzbekistan in February 2024, challenging Turkish Airlines’ near monopoly on long-distance routes following Russia’s full-scale invasion of Ukraine.

Energy diversification ambitions significantly influence Turkey’s Central Asian strategy. Kazakhstan holds substantial gas reserves and thirty billion barrels of crude oil; Turkmenistan has the world’s fifth-largest gas reserves alongside major oil deposits. Uzbekistan, though comparatively smaller, has considerable undeveloped fossil-fuel reserves. While currently minor suppliers, these countries have long entertained increasing westward exports via Turkey, benefiting both Central Asian energy producers and Turkey by reducing Turkish dependence on Russian energy, enhancing Turkey’s energy hub ambitions, and allowing Central Asian states to gain direct European market access. Accessing Europe’s markets may be increasingly important for Turkmenistan, which exported 70 percent of its gas to China in 2024, while China has taken steps to diversify its energy sources, and Russia moves to corner the Central Asian gas market.43 Though the theoretical potential for western movements of Central Asian gas is often entertained by some outspoken Turkish energy analysts, there is a wide gap between potential and reality.44

The political environment may be changing to make these projects more feasible: Russia’s 2022 invasion of Ukraine, international interest in the Middle Corridor, and major infrastructure advancements present new opportunities for westward energy exports. The Baku-Tbilisi-Ceyhan pipeline (BTC), initially designed for Azerbaijani oil, now increasingly sources from Central Asia. Kazakhstan began BTC oil shipments from its Tengiz field in 2008; Turkmenistan followed in 2010.45 Discussions are reported to be underway for Turkmenistan to export gas via the Trans-Anatolian Pipeline (TANAP), bolstered by plans to double the pipeline’s capacity from 16 billion cubic meters to 32 bcm.46 By 2024, Kazakh and Turkmen oil accounted for about 18 percent of BTC’s throughput.47 In November 2024, Kazakhstan’s energy minister, Almasadam Satkaliyev, announced intentions to significantly reduce oil exports via Russia’s Caspian Pipeline Consortium (CPC), shifting instead to BTC and boosting exports from 1.5 million metric tons annually to 20 million tons.48

Security

Over the past decade, defense and intelligence cooperation has become increasingly central to Turkey’s Central Asia strategy, driven by the rapid growth and quality of Turkish arms. Turkish weapons exports grew 29 percent in 2024 alone, with Turkish ships, drones, and armored vehicles appearing in regions including Libya, Indonesia, Saudi Arabia, and Ukraine.49 Central Asia is no exception, as all four Turkic states now utilize Turkish defense technology, notably the competitively priced Anka, Akinci, and TB drone series to fill gaps left by Russian assistance. Historically reliant on neighboring Russian and, to a lesser extent, Chinese arms, Central Asian countries are cautiously exploring diversification. Kazakhstan’s agreements with Turkish firms YDA and Asfar to expand its Caspian fleet,50 and Kyrgyzstan’s October 2021 purchase of Turkish armored vehicles, exemplify this slow but steady shift.51 Turkey also pursued weapons sales to Tajikistan, including a July 2023 agreement offering  to front $1.5 million of arms purchases52 and, according to Turkish media reports, drone sales.53 However, Tajikistan’s procurement remains uncertain, even after its landmark February 2025 border agreement with Kyrgyzstan—a recipient of Turkish weapons and military aid. With Russia maintaining its sole regional military base there, and China having built an extensive security apparatus, including private contractors—and a “secret” base, according to The Telegraph (a British newspaper) but denied by China and Tajikistan—external pressures severely limit Tajikistan’s maneuvering space.54 Considering little has been heard from either Tajikistan or Turkey since their July 2023 agreement, these and other factors may indicate that further cooperation has stalled.

Turkey’s military cooperation in Central Asia extends beyond arms sales. Uzbekistan signed agreements for military and technical cooperation in 2022 and intelligence sharing in 2024.55 Kyrgyzstan, which first partnered militarily with Turkey in 1993, benefited from Turkish, Uzbek, and Russian support in defeating the IMU’s 1999 Batken incursion.56 By 2024, Kyrgyzstan-Turkey relations elevated to a “comprehensive strategic partnership,” explicitly incorporating security issues.57 All four Turkic Central Asian nations regularly join military exercises with Turkey and send personnel for training in Turkish military institutions.

The Indian Chief of Army Staff, General Bipin Rawat visits the Aselsan Engineering Defence Industrial Base in Kazakhstan, a joint project with Turkey. Handout from the Press Information Bureau of the Ministry of Defense of the Government of India.

Kazakhstan’s security relationship with Turkey is the deepest, particularly in defense industrial collaboration, beginning with the establishment of Kazakhstan Aselsan Engineering (KAE) in 2011, a joint venture between Kazakh Engineering JSC and Aselsan. Operational since 2013, KAE quickly expanded from electronics and optics to aircraft components and complete weapon systems refurbishments.58 Importantly, KAE is increasingly focusing on producing more sophisticated technologies including circuit-boards and cryptographic communication systems.59 Beyond KAE, Kazakhstan and Turkey reportedly signed agreements on broader defense-industry cooperation and intelligence sharing in 2020 and 2023.60 In 2022, both countries agreed to jointly produce Turkey’s Anka unmanned aerial vehicle, with additional reports of potential collaboration with Turkish drone manufacturer Baykar.61 Similarly, in August 2024 Turkey and Kazakhstan drafted an agreement opening their airspace to each other’s military personnel and equipment, although the current status remains unclear.62

Turkey’s NATO membership is a key consideration for its security engagement with Central Asia. Turkey has actively supported NATO’s Partnership for Peace program’s expansion to the region since the 2004 NATO Istanbul Summit,63 which also appointed a Turkish official as NATO’s first special representative to the region.64 Though NATO’s work in the region is collaborative and distributed among members, it is not uncommon to encounter Central Asians who perceive Turkey as a “bridge” to the Alliance. Many Central Asians “count on Turkey, as a member of NATO and the international order, to assist [Central Asian states] with sensitive international issues,” according to a former senior Uzbek foreign policy adviser. Still, Turkey does play a role in boosting NATO’s Central Asia presence through its sale of NATO-compliant arms as well as support for projects like Kazakhstan’s Military Institute of Foreign Languages. The institute has received funding from the United States and United Kingdom because of its perceived value to NATO relations.65

The Russia question and limits to Turkish ambitions

Russia remains an unavoidable factor in Central Asia, deeply influential in almost every sector ranging from agriculture to defense, telecommunications to aid (despite low formal official development aid rankings, Russia often acts through intermediaries like the World Food Programme.)66 Beyond economic and military might, Russians, along with many Central Asians, view the region as firmly within even the most conservative definitions of its sphere of influence, and essential to its interests.

So far, the Russian government’s official reaction to Turkey’s increasing regional presence appears largely muted; Turkey has historically balanced its approach to the region carefully, with consideration for Russia. Russian and Turkish officials in Central Asian countries reportedly maintain amicable relations and have cooperated previously. Yet Russia likely feels increasing discomfort with Turkey’s expanding security and political involvement—domains Russia guards zealously. Turkish firms are gaining market share in sectors prized by Russian companies such as defense, energy, and construction. In just the three months following December 2024, Turkish companies announced major infrastructure projects in areas historically dominated by Russia and China, including a 400 megawatt power plant in Kashkadarya, Uzbekistan;67 a seaport in Kuryk, Kazakhstan;68 and four power plants across Kyrgyzstan.69

Russia’s policy toward Turkey in Central Asia remains complex. First, Russians generally do not categorize Turkey as a blatantly “Western” entity despite its NATO membership, reflecting the pragmatism that exists between the two countries and Turkey’s often complicated relationship with the West. Additionally, Russia’s regional strategy has suffered from complacency, assuming Central Asia’s permanent alignment despite significant advancements in Central Asia’s economic wealth and development, cultural and political trends favoring increased autonomy, and the entrance of other actors in the region. Only in recent years has Russia begun to refocus on the region, due to both economic necessity amid the war in Ukraine and a response to geopolitical changes in the region. Second, increasing levels of economic interdependence between Turkey and Russia, particularly after the latter’s 2022 full-scale invasion of Ukraine, complicates direct confrontation; as of August 2025, Turkey is now Russia’s largest purchaser of oil products and third-largest buyer of both crude oil and pipeline gas.70 This economic interdependence helps ensure Russia and Turkey compartmentalize any issues to avoid broader disruptions; the two countries have sparred in Libya, the Caucasus, and elsewhere, with little impact on broader diplomatic and economic engagement. Third, while Turkey’s regional influence grows, it neither fully replaces nor directly threatens Russia, unlike a US presence would. Instead, Turkey merely provides a degree of relief to Russia’s dominance in security, intelligence, and energy, cautiously pushing boundaries without provoking extreme Russian reactions. Turks, Russians, and Central Asians recognize this dynamic, granting Turkey some protection; any severe Russian response would undermine Russia’s narrative as the region’s “benevolent protector.”

Nonetheless, there are signs that Turkey’s deepening security and economic ties may increasingly unsettle Russia. A leaked internal Russian document addressed to Russian Federation Prime Minister Mikhail Mishustin in April 2023 explicitly warned that Central Asian states sought integration “without Russia,” highlighting the Organization of Turkic States.71 The same document expressed anxiety over the region’s shifting worldview, including English replacing Russian as a second language. Shortly after, all OTS members except Kyrgyzstan adopted new Latin-script alphabets closely aligned with those of Azerbaijan and Turkey.72 In response, Russia initiated a campaign promoting Cyrillic script in Kyrgyzstan, including launching russian.kg, a website explicitly promoting Cyrillic and Russian use.73 A September 2025 analysis done by renowned Kazakhstani foreign policy expert Eldaniz Gusseinov found that Russia is increasingly promoting a “Greater Altai narrative” in its outreach to the region as a cultural counterweight to OTS’ pan-Turkic underpinnings, and that “Russia is beginning to see OTS as a challenge to its presence in Central Asia.”74 Though anecdotal and unquantifiable, many of the Uzbekistan experts interviewed for this paper noted a perceived uptick in “anti-Turkish” and “anti-pan-Turkic” sentiments in Russian-language news media over the past two years.

The drive to diversify relations intensified following Russia’s 2022 invasion of Ukraine. Symbolic incidents such as Tokayev’s last-minute decision to switch a speech to Kazakh to rebuke Putin’s claim that “Kazakhstan is a Russian speaking country,”75 or Tajik President Emomali Rahmon’s emotional demand for “respect” from Russia,76 though small were meaningful enough to garner millions of views. Such events do not imply sudden hostility between Russia and Central Asian states but illustrate a trend towards empowerment and regional autonomy.

Despite these subtle shifts, underestimating Russia’s profound influence remains unwise. Turkey, like all other external players, must tread carefully: The decision to expand its presence more aggressively than its current rate could lead to push back from not only Russia but also Central Asians. Beyond political leverage, and despite recent conversations raising a pan-Turkic or pan-Central Asian identity, the lingering cultural impact of nearly 150 years of Russian rule is impossible to ignore; as one Kyrgyzstani former cabinet minister mused when asked about relations with Turks: “I think in Russian.”77

Spotlight on Turkmenistan

Special attention should be paid to Turkey’s uniquely strong relationship with Turkmenistan, a reclusive, neutral country that tightly controls its media, economy, and security apparatus. Most countries struggle to engage meaningfully with Turkmenistan despite its vast resources, including the world’s fifth-largest gas reserves, significant oil deposits, critical minerals, and strategic location along the Caspian Sea.78 Turkey, however, enjoys exceptional access, rooted in its greater linguistic similarities than other Central Asian nations, prompting Turkey’s Ministry of Foreign Affairs to frequently describe relations as “one nation, two states.”79

Energy and construction form the pragmatic foundation of their relationship, initially driven by Turkish businessmen in the 1990s who actively lobbied for deeper economic ties. Today, Turkish-led projects are substantial, including an active role in the construction of the new smart-city project, Arkadag,80 and a major seaport in Turkmenbashi.81 Over 600 Turkish companies operate in Turkmenistan, with contractors undertaking $216 million in projects in 2024 and $50 billion since independence.82 A notable milestone occurred in February 2025, when the two countries agreed on their first gas swap via Iran. They exchanged a modest yet symbolic 1.3 bcm, representing progress toward linking their energy sectors. In March 2025, Turkey publicly invited Turkmenistan to “jointly develop its oil and gas deposits” as well as expand cooperation on electricity transfers, according to Hurriyet Daily News.83

The growing economic partnership has expanded into media and security, positioning Turkey alongside a select group of states—including Russia, Azerbaijan, and China (notably, Turkmenistan supplies more than 28 percent of China’s gas imports).84 Turkey has previously acted as a diplomatic bridge between Turkmenistan and the West, promoting broader regional engagement. Turkmenistan has indicated some receptiveness to the idea of joining OTS as a full member but progress remains slow.85

Signs of Turkmenistan’s gradual opening have emerged recently, including the Caspian Sea-Black Sea transport corridor agreement with Romania, Georgia, and Azerbaijan,86 and a free trade agreement with Uzbekistan.87 In March 2025, Turkmenistan announced it was considering joining the Gas Exporting Countries Forum, another meaningful step.88 However, optimism should be tempered, as prior hopeful developments have been undermined by Turkmenistan’s deep-rooted isolationism and stringent security priorities.

Turkmenistan’s potential role in the Middle Corridor

Meaningful engagement with Turkmenistan remains valuable to the West, as the country occupies a critical position between Russia and Iran and could significantly bolster Europe’s energy and mineral security. Turkmenistan’s complicated relationship with Russia, aggravated by Russia’s expanding interests in Central Asian gas markets89 and China’s ongoing diversification away from Turkmen gas, underscore this opportunity.90 Furthermore, Turkmenistan’s full participation in the Middle Corridor could notably improve the viability of the project. This would alleviate Uzbekistan’s and Kyrgyzstan’s reliance on Kazakh transit routes, previously a source of concern for Bishkek,91 and ease congestion in Kazakh ports such as Kuryk and Aktau, enhancing overall transportation efficiency. Despite major progress in the creation of key infrastructure—including port expansion projects in Kuryk, Poti, and Anaklia; Kazakhstan’s plans to purchase 446 new locomotives by 2028;92 and a 70 percent increase in Middle Corridor freight volume in 2024—significant challenges remain.93 These include inefficient Caspian port operations, overloaded rail infrastructure in Georgia, outdated logistics software, and inconsistent customs standards. Transportation via the Middle Corridor remains roughly 150 percent more costly than via the Northern Corridor, according to multiple interviews with experts. Turkmenistan seems unusually eager to expand its outside connectivity through corridors beyond the Middle Corridor project, including exploring coordination with Afghanistan.94

Interpretations for the American policy maker

Over two decades, Turkey has steadily grown into a major player in Central Asia across economic, security, and cultural spheres. Even in Tajikistan, the region’s sole non-Turkic state closely aligned with Russia and China, Turkey now ranks among the top five import and export partners, having accrued substantial economic and cultural presence.95 Similarly, Turkey has gained exceptional access to isolated Turkmenistan despite the nation’s restrictive political environment.

Despite Turkey’s significant presence in the region, Russia continues to dominate security, telecommunications, and media, while China holds unmatched economic influence. While Turkish media frequently emphasizes shared ethnic ties as the foundation for Turkey-Central Asia relations, pragmatism likely remains the primary driver of warm relations, with linguistic and cultural commonalities supporting, though not forming, the basis-of deep ties. Yet as the Organization of Turkic States strengthens and cultural and economic exposures increase, ethnic bonds will likely genuinely strengthen over time.

Turkey’s influence in Central Asia faces some external constraints, particularly from Russia, China, and to a lesser extent, Iran, all holding significant leverage over Turkish and Central Asian affairs. By gradually expanding its presence, Turkey can maintain control over its regional narrative and avoid overly provoking nationalist or pro-Russian elements. Attempting a more aggressive strategy risks backlash, both internally within Central Asia and externally from Russia or China. Internally, Turkey’s constraints have somewhat eased as it shifts from foreign aid to energy and security issues, thereby reducing the direct financial burden. Despite this, Turkey’s potential to project power in the region also remains constrained by its increasing commitments to other regions, including Somalia, Libya, and Syria.

On the flip side, the array of international actors interested in transport connectivity across Central Asia may end up bolstering Turkey’s presence and goals in the region, including the EU and China, due to Turkey’s key geostrategic position along the Middle Corridor route. The EU, which has already begun investing billions of euros in Central Asia’s energy, mining, and transport sectors, finds common ground with Turkey on this issue, which has long sought to function as an energy hub for Europe.96

All told, American policymakers should regard Turkey’s growing regional presence favorably, even amid broader disagreements between Washington and Ankara. Turkey has historically shown the ability to compartmentalize relations—collaborating and competing simultaneously with other states. Considering geographic distance, local attitudes, domestic politics, and budget constraints, US goals and expectations towards the region should be focused and pragmatic, a far cry from any dreams of hegemony.

US official policy objectives for Central Asia have not been publicly updated since 2019.97 Based on interviews and existing public documents, this paper proposes defining America’s core objectives in Central Asia today as:

  • Securing European and US critical mineral and energy security.
  • Providing viable political and economic alternatives to China and Russia to bolster Central Asian autonomy.
  • Promoting regional stability.
  • Countering Islamic terrorism, especially as radicalized Central Asian fighters and groups have demonstrated their reach as far as Russia, Syria, and Afghanistan, while continuing to threaten the stability of the region.98
  • Facilitating American business access to Central Asia’s growing markets.

Investing and engaging in Central Asia is in the United States’s interests, though this will inevitably remain severely limited by lack of political will and geographical difficulties.99 Though there is no substitute for fully focused American economic and military might, these goals may be more achievable at minimized political and economic cost by supporting partner countries already committed to and invested in the region, including Turkey. There is already established business collaboration, with many American businesses opting to partner with companies from friendly nations in joint ventures or as intermediaries to navigate the complexities of the region. Most importantly, Turkey’s activities in the region largely align with US interests, whether by promoting autonomy from Russia and China or developing transport and energy infrastructure. Areas of Turkish policy that don’t align with US interests, such as the emphasis on Turkic heritage or cultural overtures, are largely benign to US goals. Major opportunities for increased coordination remain, bolstered by the Trump administration’s already-indicated interest in working with Turkey on other foreign policy areas such as Libya and Syria.100 This paper recommends the following cost-effective policy actions:

  • Consider informal or technical engagement with the Organization of Turkic States, particularly to coordinate on transit and economic issues. Unlike the C5+1 format, OTS includes Azerbaijan and Turkey, both of which maintain deep and strategic ties to Central Asia and are essential players in projects like the Middle Corridor.101 Appointing a special envoy may be a solution that allows dialogue without full endorsement of OTS, akin to the US approach to the Organization of Islamic Cooperation (OIC). At the September 2025 OTS summit in Azerbaijan, the ensuing joint declaration also called for the establishment of an OTS+ framework to significantly expand cooperation with other states, though details remain to be revealed.
  • Create a regular multilateral dialogue platform involving major US-allied regional partners with strong existing ties to the region, especially Turkey, South Korea, and Japan, to coordinate Central Asian policy and facilitate greater dialogue. Partially inspired by the 2023 Camp David trilateral summit—which established annual trilateral dialogues, outlined common policy goals, and included a commitment to coordinate policy in the Indo-Pacific—this could further institutionalize policy coordination in Central Asia.102
  • Contribute targeted technical expertise to partner-led aid programs, especially in agriculture, water management, and resource mapping—fields where US technology outperforms that of many regional donors. For example, American seed and soil management technologies demonstrated superior results in Kyrgyzstan during prior USAID programs compared to a similar Turkish program.103 With direct US aid scaled back, supporting partner agricultural or environmental initiatives by contributing American tools or knowledge can yield significant development gains and enhance regional food and water security—at minimal cost and without expanding a direct US aid footprint.
  • Invest selectively in critical transport and energy infrastructure projects through minority stakes, with Turkish or other allied countries’ firms as primary operators. Though American companies have a long-established presence in Kazakhstan and in Uzbekistan to a lesser degree, elsewhere they often hesitate to lead due to regional complexities and geopolitical sensitivities. Indirect investment through trusted intermediaries, with consideration for political and environmental, social, and governance compliance, when necessary, could mitigate risk while advancing US objectives to link Europe and Central Asia economically.104
  • Explore consolidating intelligence sharing, particularly regarding Afghanistan and Taliban threats, among NATO allies, particularly Turkey and the UK, with the intention of coordinating with Central Asian states. The Taliban are a source of significant unease to Central Asian states, particularly with their diversion of 20 percent to 30 percent of the Amu Darya River’s water, which poses a serious security threat to Uzbekistan, Turkmenistan, and Tajikistan.105 Uzbekistan has made progress in overtures to resolve the issue in recent months, though major concerns remain. Leaked documents widely circulated on Russian and Central Asian social media platforms allege that the United States and the UK may already have intelligence-sharing agreements with Uzbekistan;106 extending this partnership across the region, as is safe and feasible, would bolster security against Taliban-linked extremism such as the Islamic Movement of Uzbekistan.107
  • Assist partner-led migrant labor exchange programs to reduce Central Asian dependence on Russian remittances,which form the supermajority of total remittance inflows in the region. Remittances are a major portion of the economies of Uzbekistan, Tajikistan, and Kyrgyzstan, representing 49 percent of Tajikistan’s gross domestic product in 2024, for example.108 Uzbekistan already actively sends migrant workers to Turkey, South Korea, and several European countries through exchange programs. Expanding such programs with US diplomatic and modest financial support would further loosen Russia’s economic grip at minimal cost.
  • Leverage Turkey’s relationship with Turkmenistan to advance US relations with this strategically critical but isolated state. Turkish President Erdoğan’s close ties with the Turkmen father-son presidential leadership of Gurbanguly and Serdar Berdimuhamedov, combined with American private-sector interest in partnering with Turkish corporations already trusted in Turkmenistan, represent strategic opportunities for enhancing Western access.

Over the past twenty years, Turkey has managed to secure a significant foothold in Central Asia, presenting as both a pragmatically useful economic and security partner, while reinforcing its standing through common linguistic and cultural ties. The bonds between Turkey and the region appear to be growing in strength. Though pragmatism largely motivates high-level relations today, future generations will likely bear increasingly tight bonds that supersede only the pragmatic.

Though Turkey’s influence is still overshadowed by the titans of the neighborhood—Russia and China—it is nonetheless noteworthy. For the United States, Central Asia represents a region with great potential value, though the current political and geographic circumstances make major investment difficult. By critically assessing and coordinating with other partners that are far more established and dedicated to working in the region, the United States could see significant progress toward goals that match its foreign policy objectives.

About the author

Kiran Baez is a research assistant at the Atlantic Council’s Turkey program focusing on Central Asia and energy issues. Add him on LinkedIn and X.

Related content

Explore the program

The Atlantic Council Turkey Program aims to promote and strengthen transatlantic engagement with the region by providing a high-level forum and pursuing programming to address the most important issues on energy, economics, security, and defense.

1    Toghrul Ali, “European and International Financial Institutions to Invest $10 Billion in the Middle Corridor,” Caspian Policy Center, January 2024, https://www.caspianpolicy.org/research/economy/european-and-international-financial-institutions-to-invest-10-billion-in-the-middle-corridor; Dana Omirgazy, “UK Parliament Sees Middle Corridor as Strategic Route for Resilient Global Supply Chains,” Astana Times, July 4, 2025, https://astanatimes.com/2025/07/uk-parliament-sees-middle-corridor-as-strategic-route-for-resilient-global-supply-chains/; and  Emma Collet, “EU Pledges €12 Billion to Consolidate Its Position in Central Asia,” Euractiv, April 4, 2025, https://www.euractiv.com/section/politics/news/eu-pledges-e12-billion-to-consolidate-its-position-in-central-asia/.
2    Neils Drost, Giulia Cretti, and Babette van Giersbergen, “Central Asia Emerging from the Shadows,” Clingendael Institute, January 2025, https://www.clingendael.org/sites/default/files/2025-01/central-asia-emerging-from-the-shadows.pdf.
3    Svante Cornell, “Türkiye’s Return to Central Asia and the Caucasus,” Central Asia-Caucasus Institute, July 2024, https://www.silkroadstudies.org/publications/silkroad-papers-and-monographs/item/13515-t%C3%BCrkiye%E2%80%99s-return-to-central-asia-and-the-caucasus.html.
4    Ahmed Rashid, “They’re Only Sleeping,” New Yorker, January 6, 2002, https://www.newyorker.com/magazine/2002/01/14/theyre-only-sleeping.
5    Bayram Balci and Thomas Liles, “Turkey’s Comeback to Central Asia,” Insight Turkey 20, no. 4: (2018), https://www.insightturkey.com/commentaries/turkeys-comeback-to-central-asia.
6    Altay Alti, “Turkish Businesses Getting Set for Uzbek Bonanza,” Asia Times, July 10, 2018, https://asiatimes.com/2018/07/turkish-businesses-getting-set-for-uzbek-bonanza/#.
7    “Nakhchivan Agreement: On the Establishment of the Cooperation Council of Turkic Speaking States,” Organization of Turkic States Online Archives, October 3, 2009, https://www.turkicstates.org/u/d/basic-documents/nakhchivan-agreement-on-the-establishment-of-the-copperation-council-of-turkic-speaking-states-1-en.pdf.
8    “The President of Turkmenistan Held a Meeting with the Head of the World Ethnosport Confederation,” Ministry of Foreign Affairs of Turkmenistan, September 27, 2024, https://mfa.gov.tm/en/news/4769.
9    Tlegen Kuandykov, Public Perception of Turkey in Central Asia, Central Asia Barometer, 2023, https://ca-barometer.org/assets/files/froala/7c9df247afe316b054e56a538aa8810219ae584d.pdf.
10    Young-Jin Ahn and Zuhriddin Juraev, “Examination of Regional Water Governance and Water Insecurity Issues in Central Asia,” Sustainable Water Resources Management 10, no. 3 (2024), https://doi.org/10.1007/s40899-024-01099-y.
11    Toni Alantra and Kritstiina Silvan, “Turkey in Central Asia: Limits and Possibilities of a Greater Role,” FIIA Briefing Paper 328, Finnish Institute for International Affairs, 2022, https://fiia.fi/wp-content/uploads/2022/01/bp328_toni-alaranta-kristiina-silvan_turkey-in-central-asia.pdf.
12    “Норов опроверг информацию о принятии Северного Кипра в Организацию тюркских государств (Norov Denies Information About Northern Cyprus’s Admission to the Organization of Turkic States),” Fergana News Agency, November 11, 2022, https://fergana.agency/news/128300/.
13    “Central Asian States Send Envoys to Cyprus, Accept UN Resolutions on Occupied North,” eKathimerini, April 14, 2025, https://www.ekathimerini.com/politics/foreign-policy/1266999/central-asian-states-send-envoys-to-cyprus-accept-un-resolutions-on-occupied-north/.
14    “Gabala Declaration of the Twelfth Summit of the Organization of Turkic States,” Organization of Turkic States, October 7, 2025, https://turkicstates.org/u/gabala-declaration-.pdf.
15    “Turkey Launches Persian Language News Media Aimed at Iran,” bne IntelliNews, December 18, 2024, https://www.intellinews.com/turkey-launches-persian-news-media-aimed-at-iran-359138/.
16    Kuandykov, Public Perception.
17    Abira Kuandyk, “Kazakhstan and Turkey to Cooperate in Alp-Arslan Historical TV Series,” Astana Times, April 5, 2021, https://astanatimes.com/2021/04/kazakhstan-and-turkey-to-cooperate-in-alp-arslan-historical-tv-series/.
18    Robert Badendeick, “Booming Turkish TV Drama Industry Captures Hearts and Minds Worldwide and Boosts Tourism,” eKathimerini, July 12, 2024, https://www.ekathimerini.com/in-depth/society-in-depth/1243830/booming-turkish-tv-drama-industry-captures-hearts-and-minds-worldwide-and-boosts-tourism/.
19    Arsen Omuraliev, “Donor Activity in Central Asian Countries Since 1991,” Central Asian Bureau for Analytical Reporting (CABAR), a project of Institute for War & Peace Reporting, 2020, https://cabar.asia/en/donor-activity-in-central-asian-countries-since-1991.
20    Virtual interview by author with Astana-based professor of Turkology, April 2025. Turkology is the study of the languages, culture, history, and linguistics of peoples who speak Turkic languages.
21    Turkiye Scholarships, Annual Report 2020, Presidency for Turks Abroad and Related Communities (aka YTB), 2020,  https://arsiv.turkiyeburslari.gov.tr/Content/Upload/files/TB%20Report-2020.pdf.
22    “Turkic States’ Joint Investment Fund to Debut with $500M Capital,” Daily Sabah (pro-government Turkish newspaper), May 19, 2024, https://www.dailysabah.com/business/economy/turkic-states-joint-investment-fund-to-debut-with-500m-capital.
23    “Charter Capital of Turkic Investment Fund to Be Increased to $600 Million,” kun.uz, February 17, 2025, https://kun.uz/en/news/2025/02/17/charter-capital-of-turkic-investment-fund-to-be-increased-to-600-million.
24    “Budapest Hosted Informal Summit of Heads of State of Organization of Turkic States,” APA Group (Azerbaijani press and media agency), May 21, 2025, https://en.apa.az/foreign-policy/budapest-hosted-informal-summit-of-heads-of-state-of-ots-updated-2-468138.
25    “Seven Nations Including Turkiye Establish Eurasian Transport Route Association,” Turkiye Today, September 21, 2024, https://www.turkiyetoday.com/region/7-nations-including-turkiye-establish-eurasian-transport-route-association-55663.
26    The CSTO is a security organization involving Russia, Belarus, Kazakhstan, Armenia, Tajikistan, and Kyrgyzstan. See Alexander Libman, Igor Davidzon, and Rheea Saggar, “How to Intervene Symbolically: The CSTO in Kazakhstan,” Chatham House, June 27, 2023, https://www.chathamhouse.org/2023/06/how-intervene-symbolically-csto-kazakhstan.
27    “12th Summit of the Council of Heads of State of the Organization of Turkic States Commenced in Gabala,” Office of the President of the Republic of Azerbaijan, October 7, 2025, https://president.az/en/articles/view/70283/print.
28    “Инициативы Казахстана на XII саммите ОТГ и как тюркское сотрудничество будоражит горе экспертов [Kazakhstan’s initiatives at the 12th OTS Summit and how Turkic cooperation is stirring up grief amongst experts],” Top Press KZ, October 8, 2025, https://toppress.kz/article/iniciativi-kazahstana-na-xii-sammite-otg-i-kak-tyurkskoe-sotrudnichestvo-budorazhit-gore-ekspertov.
29    Sergey Kwan, “International University of Turkic States Established in Tashkent,” Times of Central Asia, February 3, 2025, https://timesca.com/international-university-of-turkic-states-established-in-tashkent/?mc_cid=85def86067&mc_eid=3059708741.
30    “Turkiye’s Relations with Central Asian Republics,” Ministry of Foreign Affairs of Turkiye, accessed February 2025, https://www.mfa.gov.tr/turkiye_s-relations-with-central-asian-republics.en.mfa.
31    “Количество иностранных и совместных компаний в Узбекистане сократилось на 2,2% за месяц [The number of foreign and joint ventures in Uzbekistan decreased by 2.2% over the month],” LogiStan, March 14, 2025, https://t.me/logistan/8266.
32    Haley Nelson, “2022 FDI in the Caspian Region,” Caspian Policy Center, April 18, 2023, https://caspianpolicy.org/research/economy/2022-fdi-in-the-caspian-region.
33    “Kaspi.kz Completes Acquisition of Controlling Interest in Hepsiburadad,” GlobeNewswire, January 29, 2025, https://www.globenewswire.com/news-release/2025/01/29/3016953/0/en/Kaspi-kz-Completes-Acquisition-of-Controlling-Interest-in-Hepsiburada.html.
34    “Shareholders,” DemirBank, accessed February 2025, https://demirbank.kg/en/about/about/shareholders.
35    Abdullo Janob, “Discussions Underway for Opening Turkish Ziraat Bank in Kyrgyzstan,” Trend News Agency, September 20, 2024, https://en.trend.az/casia/kyrgyzstan/3947464.html.
36    Altai Alti, “Turkish Businesses Getting Set for Uzbek Bonanza,” Asia Times, July 10, 2018, https://asiatimes.com/2018/07/turkish-businesses-getting-set-for-uzbek-bonanza/.
37    “1st AmCham Eurasian Economic Summit Kicks Off on October 24-25, 2024, in Istanbul,” American Chamber of Commerce of Bulgaria, accessed January 2025, https://amcham.bg/2024/09/26/the-1st-amchams-eurasian-economic-summitkicks-off-on-october-24-25-2024-in-istanbul/.
38    Data accessed from the United Nations Commodity Trade Statistics Database (aka UN Comtrade), April 2025, https://comtradeplus.un.org/.
39    Dmitry Pokidaev, “Turkey Ready to Buy Kazakh Meat at Twice the Price Offered by China,” Times of Central Asia, November 11, 2024, https://timesca.com/turkey-ready-to-buy-kazakh-meat-at-twice-the-price-offered-by-china/.
40    Batygul Osmonalieva, “Turkey Invited to Participate in Creation of Industrial Zone in Chui Region,” 24KG (news agency), February 17, 2025,
41    Mohammed Al-Kinani, “Saudi Arabia’s ACWA Power Launches $3B Renewable Projects in Uzbekistan,” Arab News, December 18, 2024, https://www.arabnews.com/node/2583537/business-economy.
42    “UAE to Help Uzbekistan in Developing the Hotel Business,” Uzbek Travel, June 23, 2020, https://uzbek-travel.com/about-uzbekistan/news/uae-to-help-uzbekistan-in-developing-the-hotel-business/.
43    “Turkmenistan: Transition Report 2024-25,” European Bank of Reconstruction and Development, 2025, https://www.ebrd.com/publications/transition-report-202425-turkmenistan.
44    Bakhtiyar Mammadov, “Oguzhan Akyener: Turkiye Ready to Import up to 65 Billion Cubic Meters of Gas from Turkmenistan,” News.Az (portal), February 24, 2025, https://news.az/news/-oguzhan-akyener-turkiye-ready-to-import-up-to-65-billion-cubic-meters-of-gas-from-turkmenistan-interview.
45    Balci and Liles, “Turkey’s Comeback to Central Asia.”
46    “Turkemenistan: Homage to Anatolia,” Eurasianet, October 24, 2023, https://eurasianet.org/turkmenistan-homage-to-anatolia.
47    “Kazakhstan, Turkmenistan See Growth in Oil Transportation via BTC,” KazInform, August 20, 2024, https://qazinform.com/news/kazakhstan-turkmenistan-see-growth-in-oil-transportation-via-btc-f45f09.
48    “Kazakhstan Eyes Significant Boost in Oil Production Bypassing Russia,” Reuters, November 25, 2024, https://www.reuters.com/business/energy/kazakhstan-produce-884-mln-tons-oil-this-year-2024-11-25/.
49    Haluk Gorgun (@halukgorgun), “Türkiye, savunma sanayiinde uluslararası rotasını tüm paydaşları ile birlikte çizmeye devam ediyor! […], (English: Türkiye continues to chart its international course in the defense industry together with all its stakeholders!),” X, January 31, 2025,  https://x.com/halukgorgun/status/1885276270390362256.
50    Paul Goble, “Turkey Set to Help Kazakhstan Expand Its Caspian Fleet,” Jamestown Foundation’s Eurasia Daily Monitor 20, no. 123 (2023), https://jamestown.org/program/turkey-set-to-help-kazakhstan-expand-its-caspian-fleet/.
51    “Kyrgyzstan Procured Turkish TB2 UAVs,” TurDef, October 22, 2021, https://turdef.com/article/kyrgyzstan-procured-turkish-tb2-uavs.
52    Derek Bisaccio, “Tajikistan Ratifies Turkish Military Assistance Agreement,” Defense and Security Monitor, April 23, 2024, https://dsm.forecastinternational.com/2024/04/23/tajikistan-ratifies-turkish-military-assistance-agreement/
53    “Tajikistan Mulled to Buy Turkish Drones Amid Border Dispute with Kyrgyzstan,” Daily Sabah, April 28, 2022, https://www.dailysabah.com/business/defense/tajikistan-mulled-to-buy-turkish-drones-amid-border-dispute-with-kyrgyzstan.
54    Sophia Yan, “China Constructs Secret Tajikistan Military Base amid Fears of Taliban,” Telegraph, July 10, 2024,  https://www.telegraph.co.uk/world-news/2024/07/10/china-secret-military-base-tajikistan-taliban-afghanistan/; and Paul Goble, “China Increasing its Military Presence in Tajikistan, Eurasia Daily Monitor 20, no. 109: (2024), https://jamestown.org/program/china-increasing-its-military-presence-in-tajikistan/.
55    Richard Outzen, “Security and Military Cooperation among the Turkic States in the 2020s,” Central Asia-Caucasus Analyst, December 8, 2021, https://www.cacianalyst.org/publications/feature-articles/item/13781-security-and-military-cooperation-among-the-turkic-states-in-the-2020s.html.
56    Kanybek Kudayarov, “Kyrgyz-Turkish Cooperation in the Military Sphere,” Russia and the Moslem World: Science Information Journal, March 2023, https://hal.science/hal-04175958/document.
57    “Turkiye, Kyrgyzstan Boost Ties, Cooperation with Erdogan Visit,” Daily Sabah, November 5, 2024, https://www.dailysabah.com/politics/diplomacy/turkiye-kyrgyzstan-boost-ties-cooperation-with-erdogan-visit.
58    Zhanna Shayakmetova, “Aselsan Engineering Seeks to Increase Domestic Involvement in Kazakhstan in Producing Military Products,” Astana Times, April 17, 2019, https://astanatimes.com/2019/04/aselsan-engineering-seeks-to-increase-domestic-involvement-in-kazakhstan-in-producing-military-products/.
59    Damir Serikpayev, “Оптика, связь, боевые модули: как в Казахстане производят оборудование для силовиков (Optics, Communications, Combat Modules: How Equipment for Security Forces Is Produced in Kazakhstan),” Forbes Kazakhstan, July 25, 2023,
https://forbes.kz/articles/optika_svyaz_boevyie_moduli_kak_kazahstano-turetskoe_sp_rabotaet_na_vpk_respubliki.
60    “Turkey, Kazakhstan Agree on Military Cooperation That Covers Intelligence Sharing, Defense Industry,” Nordic Monitor, May 16, 2020, https://nordicmonitor.com/2020/05/turkey-kazakhstan-agree-on-military-cooperation-that-covers-military-intelligence-defence-industry-and-joint-projects/.
61    Vagit Ismailov, “Kazakhstan May Manufacture Turkish Bayraktar,” Times of Central Asia, October 25, 2024, https://timesca.com/kazakhstan-may-manufacture-turkish-bayraktar-drones/.
62    “Казахстан и Турция готовят новое соглашение в военной сфере (Kazakhstan and Türkiye Are Preparing a New Agreement in the Military Sphere),” Tengri News, December 26, 2024,https://tengrinews.kz/kazakhstan_news/kazahstan-turtsiya-gotovyat-novoe-soglashenie-voennoy-sfere-544616/.
63    “Turkey’s and NATO’s Views on Current Issues of the Alliance,” Turkish Ministry of Foreign Affairs, accessed January 2025, https://www.mfa.gov.tr/ii_—turkey_s-contributions-to-international-peace-keeping-activities.en.mfa.
64    Richard Weitz, “Towards A New Turkey: NATO Partnership in Central Asia,” Turkish Policy Quarterly 5, no. 2 (2006), https://www.hudson.org/sites/default/files/researchattachments/attachment/500/turkey_nato_partnership.pdf
65    Sébastien Peyrouse, “The Central Asian Armies Facing the Challenge of Formation,” Journal of Power Institutions in Post-Soviet Societies, no. 11: (2010), https://doi.org/10.4000/pipss.3799.
66    Russian Federation Helps World Food Programme to Support Poor Families in Kyrgyzstan,” World Food Programme, July 1, 2021, https://www.wfp.org/news/russian-federation-helps-world-food-programme-support-poor-families-kyrgyzstan.
67    “Uzbekistan and Turkey Partner to Launch 400 MW Power Plant in Kashkadarya,” Daryo.UZ, December 14, 2024, https://daryo.uz/en/2024/12/14/uzbekistan-and-turkey-partner-to-launch-400-mw-power-plant-in-kashkadarya.
68    “Turkish Companies Will Build a Shipyard in Kazakhstan,” Transport Corridors, December 31, 2024, https://www.transportcorridors.com/9961?no_cache=1.
69    Sergey Kwan, “Turkish Company to Build Hydropower Plants in Kyrgyzstan and New Heat and Power Plant for Bishkek,” Times of Central Asia, February 28, 2025, https://timesca.com/turkish-company-to-build-hydropower-plants-in-kyrgyzstan-and-new-heat-and-power-plant-for-bishkek/.
70    Petras Katinas, “August 2025 — Monthly analysis of Russian fossil fuel exports and sanctions,” Center for Research on Energy and Clean Air, September 10, 2025. https://energyandcleanair.org/august-2025-monthly-analysis-of-russian-fossil-fuel-exports-and-sanctions/.
71    Max Seddon and Chris Cook, “Russia Fears Over ex-Soviet Nations Laid Bare in Leaked Paper,” Financial Times, February 10, 2025, https://www.ft.com/content/2bb87769-805a-4270-bab2-2382e0b84cec.
72    Nagima Abuova, “Turkic States Revive Latin-Based Alphabet to Preserve Linguistic Heritage,” Astana Times, September 23, 2024, https://astanatimes.com/2024/09/turkic-states-revive-latin-based-alphabet-to-preserve-linguistic-heritage/.
73    “РУССКИЙ ЯЗЫК В КЫРГЫЗСТАНЕ (Russian Language in Kyrgyzstan),” accessed March 2025, https://www.russian.kg/ru.
75    Leo Chiu, “Kazakh Leader Bewilders Russian Delegation with Language ‘Power Move,’ ” Kyiv Post, November 10, 2023, https://www.kyivpost.com/post/23920.
76    “Tajik President’s Demand for ‘Respect’ from Putin Viewed Millions of Times on YouTube,” Radio Free Liberty, October 15, 2022, https://www.rferl.org/a/tajikistan-russia-rahmon-youtube-respect/32084773.html.
77    Author’s interview with former Kyrgyzstani cabinet minister, Bishkek, August 2024.
78    “Turkmenistan Country Commercial Guide,” International Trade Administration, November 30, 2023, https://www.trade.gov/country-commercial-guides/turkmenistan-oil-gas.
79    “Relations between Turkiye and Turkmenistan,” Turkish Ministry of Foreign Affairs, accessed March 2025, https://www.mfa.gov.tr/relations-between-turkiye-and-turkmenistan.en.mfa.
80    2024: Turkish Companies Receive Projects Worth $216 Million in Turkmenistan,” Business Turkmenistan, February 17, 2025, https://www.business.com.tm/post/13112/2024-turkish-companies-receive-projects-worth-216-million-in-turkmenistan.
81    “Turkish Firm Wins Prestigious Engineering Award with Caspian Port Project in Turkmenistan,” Daily Sabah, October 9, 2018, https://www.dailysabah.com/economy/2018/10/09/turkish-firm-wins-prestigious-engineering-award-with-caspian-port-project-in-turkmenistan.
82    “2024: Turkish Companies,” Business Turkmenistan.
83    “Turkiye Seeks New Energy Partnership with Turkmenistan,” Hurriyet Daily News, March 20, 2025, https://www.hurriyetdailynews.com/turkiye-seeks-new-energy-partnerships-with-turkmenistan-207127.
84    Danila Bochkarev, Turkmenistan: The Gas Monetization Challenge, Oxford Institute for Energy Studies, September 2024, https://www.oxfordenergy.org/wpcms/wp-content/uploads/2024/09/Turkmenistan-The-gas-monetization-challenge.pdf.
85    Haji Jadov, “Turkmenistan May Become Full Member of OTS in 2024,” Azeri Press Agency, March 4, 2024, https://en.apa.az/cis-countries/turkmenistan-may-become-a-full-member-of-ots-in-2024-429901.
86    Paul Goble, “Turkmenistan at New Crossroads of North-South and East-West Corridors,” Eurasia Daily Monitor 21, no. 111 (2024), https://jamestown.org/program/turkmenistan-at-new-crossroads-of-north-south-and-east-west-corridors/.
87    Kamol Ismailov, “Uzbekistan, Turkmenistan Roll Out Free Trade Regime,” Trend News Agency, March 7, 2025, https://en.trend.az/casia/uzbekistan/4014990.html.
88    Central Asia Review (@cenasreview), “Туркменистан рассматривает возможность присоединения к Форуму стран-экспортеров газа, что может способствовать укреплению позиций страны на мировом энергетическом рынке (Turkmenistan is considering the possibility of joining the Gas Exporting Countries Forum, which could help strengthen the country’s position in the global energy market),” Telegram, March 21, 2025,https://t.me/cenasreview/8146.
89    Bruce Pannier, “Russia Is Pushing Turkmenistan Out of the Natural Gas Market,” bne IntelliNews, May 24, 2024, https://www.intellinews.com/pannier-russia-is-pushing-turkmenistan-out-of-the-natural-gas-market-326833/.
90    Bochkarev, “Turkmenistan: The Gas Monetization Challenge.”
91    “Kyrgyzstan Complains of Kazakhstan Restricting Border Trade,” Reuters, October 18, 2017, https://www.reuters.com/article/markets/kyrgyzstan-complains-of-kazakhstan-restricting-border-trade-idUSL8N1MT5XP/.
92    Logistan (@logistan), “Казахстан намерен купить 446 локомотивов до 2028 года [Kazakhstan intends to purchase 446 locomotives by 2028],” March 19, 2025, https://t.me/logistan/8312.
93    Elvira Mami, “The Middle Corridor: Trends and Opportunities,” ODI Global, January 22, 2024, https://odi.org/en/insights/the-middle-corridor-trends-and-opportunities/.
94    Dana Omirgazy, “Kazakhstan, Turkmenistan to Build Trans-Afghan Corridor,” Astana Times, October 11, 2024, https://astanatimes.com/2024/10/kazakhstan-turkmenistan-to-build-trans-afghan-corridor/.
95    “Tajikistan Trade,” World Integrated Trade Solution, accessed March 2025, https://wits.worldbank.org/countrysnapshot/en/tjk.
96    “Joint Press Release following the First EU-Central Asia Summit,” European Council, April 4, 2025, https://www.consilium.europa.eu/en/press/press-releases/2025/04/04/joint-press-release-following-the-first-eu-central-asia-summit/.
97    “United States Strategy for Central Asia 2019-2025,” US Department of State, February 2020, https://tj.usembassy.gov/wp-content/uploads/sites/143/United-States-Strategy-for-Central-Asia-2019-2025-1.pdf.
98    Bruce Pannier, “Countering a ‘Great Jihad’ in Central Asia,” Foreign Policy Research Institute, November 19, 2024, https://www.fpri.org/article/2024/11/countering-a-great-jihad-in-central-asia/.
99    Haley Nelson and Natalia Storz, “Central Asia’s Geography Inhibits a Mineral Partnership,” EnergySource, Atlantic Council blog, April 15, 2025, https://www.atlanticcouncil.org/blogs/energysource/central-asias-geography-inhibits-a-us-critical-minerals-partnership/.
100    Joint Statement on the U.S.-Türkiye Syria Working Group,” US Department of State, May 20, 2025, https://www.state.gov/releases/office-of-the-spokesperson/2025/05/joint-statement-on-the-u-s-turkiye-syria-working-group.
101    Nicholas Castillo, “C5+1 in the New Year,” Caspian Policy Center, January 1, 2025, https://caspianpolicy.org/research/security/c51-in-the-new-year.
102    “The Spirit of Camp David: Joint Statement of Japan, the Republic of Korea, and the United States,” US Mission to Korea, August 19, 2023, https://kr.usembassy.gov/081923-the-spirit-of-camp-david-joint-statement-of-japan-the-republic-of-korea-and-the-united-states/.
103    Author’s interview with Tilek Toktogaziev, former minister of agriculture, Kyrgyz Republic, September 2024.
104    Aibarshyn Akhmetkali, “Sustainability Reporting Vital for Kazakh Companies’ ESG Compliance, Says Regional Expert,” Astana Times, April 5, 2024, https://astanatimes.com/2024/04/sustainability-reporting-vital-for-kazakh-companies-esg-compliance-says-regional-expert/.
105    Bruce Pannier, “New Canal Threatens the Peace between the Taliban and Central Asia,” Foreign Policy Research Institute, July 3, 2023, https://www.fpri.org/article/2023/07/new-canal-threatens-the-peace-between-the-taliban-and-central-asia/.
106    “Секретные документы, касающиеся тесного сотрудничества США и Великобритании с Кыргызстаном и Узбекистаном (Secret Documents Concerning Close Cooperation between the US and UK with Kyrgyzstan and Uzbekistan,” original source unknown for this widely circulated item, accessed August 2024, https://telegra.ph/Sekretnye-dokumenty-kasayushchiesya-tesnogo-sotrudnichestva-SSHA-i-Velikobritanii-s-Kyrgyzstanom-i-Uzbekistanom-04-02.
107    Author’s virtual interview with Ajmal Sohail, Founder, A.S. Geopolitics, October 15, 2024.
108    “Tajikistan: Country Overview,” World Bank, accessed May 2025, https://www.worldbank.org/en/country/tajikistan/overview.

The post Why Washington should pay attention to Turkey’s presence in Central Asia appeared first on Atlantic Council.

]]>
The CRINK: Inside the new bloc supporting Russia’s war against Ukraine https://www.atlanticcouncil.org/content-series/russia-tomorrow/the-crink-inside-the-new-bloc-supporting-russias-war-against-ukraine/ Thu, 23 Oct 2025 13:00:00 +0000 https://www.atlanticcouncil.org/?p=881911 The latest report in the Atlantic Council's Russia Tomorrow series details how Russia’s war against Ukraine has brought together a new set of partners--united not by shared values, but by shared grievances--on the international stage: China, Russia, Iran, and North Korea.

The post The CRINK: Inside the new bloc supporting Russia’s war against Ukraine appeared first on Atlantic Council.

]]>

Russia’s full-scale invasion of Ukraine in February 2022 challenged much of the common Western understanding of Russia. How can the world better understand Russia? What are the steps forward for Western policy? The Eurasia Center’s new “Russia Tomorrow” series seeks to reevaluate conceptions of Russia today and better prepare for its future tomorrow.

Table of contents

Russia’s war against Ukraine has brought it a new set of partners. While this group is sometimes referred to as an axis, in reality it is a set of intensifying bilateral ties with countries—China, Iran and North Korea—that are essential for Russia’s continued prosecution of the war. The presence of these countries’ leaders at the military parade in Beijing to commemorate the eightieth anniversary of the end of World War II in Asia—and their fulsome commitment to a new world order that the United States no longer dominates—suggests that these countries increasingly constitute an anti-US bloc, united not by shared values but by shared grievances.

These three authoritarian states are essential allies not only in the war on Ukraine, but also in Russian President Vladimir Putin’s plan for a “post-West” global order. In Putin’s vision, this would be a multipolar world in which the United States has lost its “hegemonic” role and is only one of several great powers setting the global agenda. As Putin noted at the 2024 Valdai International Discussion Club, “What is at stake is the West’s monopoly, which emerged after the collapse of the Soviet Union and was held temporarily at the end of the twentieth century. But let me reiterate, as those gathered here understand: any monopoly, as history teaches us, eventually comes to an end.”

What is the nature of Russia’s relationship with these three revisionist powers? To what extent do they coordinate their policies? How durable are these new sets of relationships and how might they evolve once the war is over?  This report will address these questions and suggest how the West might deal with “the CRINK”—China, Russia, Iran, and North Korea—collectively and individually going forward.

China

For centuries, Russia’s ties with China were complex and often adversarial, culminating in armed clashes on the Sino-Soviet border in 1969 (the latest in a series of skirmishes that occurred over the centuries). The original Russian mission to China was established in Beijing in 1658, and the two countries’ ties fluctuated between cooperation and conflict for the next three hundred years. The Russian empire in the mid-nineteenth century annexed what is now the Russian Far East from China, building up the city of Vladivostok, which in Russian means “ruler of the East.” Joseph Stalin did not welcome Mao Zedong’s victory in the Chinese Civil War and, after Stalin’s death, relations deteriorated rapidly, culminating in the 1969 border clashes. Relations began to improve under Mikhail Gorbachev, even though the Chinese were appalled by the collapse of the USSR and the end of Soviet communism. Throughout the centuries, it was clear that Russia and China were not natural partners; Russians consider themselves culturally to be Europeans, not Asians.

In 2022, Putin closed Russia’s window on Europe. Before the invasion of Ukraine, he had prioritized improving ties with China, but since 2022 he has made an unprecedented turn to Asia, courting a larger group of countries. In his quarter century in the Kremlin (with a technical hiatus from 2008–2012 when Dmitry Medvedev nominally led Russia), Putin has courted China, especially after Xi Jinping came to power in 2013. Xi’s first foreign trip was to Russia and the two leaders have met more than forty times since then. They appear to enjoy close personal ties, even if one discounts some of the hyperbole they use when praising each other. Both are autocratic leaders, ideologically aligned and allergic to Western criticisms of their democratic deficits. Neither publicly criticizes the other’s domestic politics. Both publicly favor a multipolar world in which the United States is much diminished and retreats from their respective neighborhoods. China has been Russia’s largest trading partner since 2009, and their bilateral trade has doubled since 2020. The economic relationship is much more important for Russia than for China, but China is a top purchaser of Russian hydrocarbons. Since the start of the war in Ukraine and the imposition of Western energy sanctions against Russia, China has benefited from importing cheap Russian oil.

Putin’s pivot to China began in earnest after the annexation of Crimea in 2014 and the beginning of the war in the Donbas instigated by Russian proxies and aided by Moscow. China intensified its economic and political ties with Russia after the imposition of Western sanctions and Russia’s ejection from the Group of Eight. Russia and China might not be formal allies, but their ties have deepened and strengthened since Russia’s full-scale invasion of Ukraine in 2022. As Putin has said, Russia and China “are better than allies.” So, despite all the asymmetries in this relationship, it represents a major reorientation of centuries-old Russian foreign policy away from the West and to the East. Even if the partnership is essentially transactional, as long as the leadership in Moscow and Beijing continues to share a basic worldview, the Russian-Chinese partnership will remain a serious challenge to the United States, Europe, and their Asian allies through 2050 and beyond.

What does Russia get out of its strategic partnership with China? Without knowing that China would support him, Putin would not have launched his full-scale invasion of Ukraine. Indeed, he visited Beijing weeks before the invasion and apparently understood that Xi would not criticize his actions as long as he delayed the invasion until after the end of the Beijing Olympics.

China is an enabler of Putin’s war. It has repeated the Russian narrative about NATO’s responsibility for the war and blames the West for the conflict. More importantly, China has given Russia substantial economic, military, and technological assistance for its war machine and is a top purchaser of Russian hydrocarbons, providing the financial wherewithal for the war to continue. Chinese contract soldiers are also fighting with the Russian army in Ukraine. Despite some initial Western hopes that Beijing could act as a mediator and help broker peace between Russia and Ukraine, China’s anemic peace plan was never serious and China has shown no interest in bringing the war to an end. Indeed, Chinese Foreign Minister Wang Yi told the European Union’s foreign policy chief Kaja Kallas that Beijing cannot accept Russia losing its war against Ukraine as this could allow the United States to turn its full attention to China, contradicting Beijing’s public position of neutrality in the conflict. Indeed, Putin sees China as essential for preserving his own regime’s security.

The Russia-China economic relationship is essential for Russia. China became Russia’s economic lifeline after the Western sanctions were imposed in 2022. It is a highly asymmetrical relationship, with Russia far more dependent on China than vice versa, exchanging raw materials and military hardware for Chinese manufactured goods and technology. Trade with China represents 26 percent of Russia’s total trade, while trade with Russia represents only 3 percent of China’s total trade. China remains Russia’s most important trade partner, whereas Russia ranks sixth for China and the United States is by far China’s highest-ranked trading partner. Chinese goods have now replaced many of the Western goods that disappeared from Russia after the 2022 sanctions. Bilateral trade has doubled since 2022 and payments in rubles and renminbi are replacing the US dollar and the euro. Beijing and Moscow are also actively constructing an alternative international payments system to the Society for Worldwide Interbank Financial Telecommunication (SWIFT) system, from which Russia was partially ejected after the invasion.

Moreover, there is evidence that China has increased sales to Russia of machine tools, microelectronics, and other technology that Moscow is using to produce missiles, tanks, aircraft, and other weaponry for use in its war against Ukraine. For example, 90 percent of Russia’s microelectronics come from China. Even if China does not directly export weapons to Russia, it supplies key components used in Russia’s arsenal.

Military cooperation has also increased significantly in the past few years. This includes joint exercises in the South China Sea, long-range bomber patrols near Alaska, and air and naval joint exercises that have intruded into Japanese and South Korean airspace. Russia and China have conducted joint naval exercises with Iran and with South Africa in recent years. While cooperation and integration between the Russian armed forces and China’s People’s Liberation Army is limited, the potential for deeper integration is there. Russian-Chinese technological cooperation in the military field is growing, including in artificial intelligence, quantum computing, and space technology. This multifaceted military cooperation has been beneficial for Russia, which remains behind China technologically.

China is Russia’s essential partner in seeking to challenge US and Western interests around the world and undermine the current international order. Both countries want to make the world safe for authoritarianism at home and abroad and to eliminate what remains of Western democracy-promotion efforts. Both see the United States as their principal adversary. And both are promoting alternative multilateral organizations, such as the expanding BRICS (Brazil, Russia, India, China, and South Africa) and the Shanghai Cooperation Organization, which have no Western members. Russia has managed to increase its influence in the Global South since the full-scale invasion of Ukraine and China has largely supported it in these efforts. It joins Russia in appealing to Global South countries that are wary of the United States and its allies, refuse to choose sides in the Russia-Ukraine war, or view the war as an opportunity to increase their own leverage internationally.  

But Russia’s quest for a post-West global order might put it at odds with China going forward. For now, Russia accepts being the junior partner in this alliance; it really has no other choice. But China ultimately does not view Russia as a peer. It sees Russia as a second-rate power, whereas China views itself as a first-rate power and an equal with the United States. As the world’s second-largest economy and largest trading state, China has a far greater stake in regional and global stability than does Russia. Putin used to favor a tripartite Yalta model (after the World War II US-UK-USSR Yalta Conference) for a future global order, in which Russia, China, and the United States would divide the world into three spheres of influence and would not interfere in the other countries’ spheres. But Putin also appears to favor a Hobbesian world order in which instability and disruption serve Russia’s interests. China seeks a post-West order with rules, while Russia prefers a world disorder will no rules. 

Despite proclamation of a “no-limits” partnership, mistrust and rivalry in the Russo-Chinese relationship persists. China is wary of Russia’s growing relationship with North Korea because it could embolden North Korea to act more aggressively on the Korean peninsula. Xi might also wonder about the longer-term implications of a reset of US-Russian relations under President Donald Trump. The Trump administration has implied that improved ties between Trump and Putin might cause Putin to rethink Russia’s close ties with China. This is probably an unrealistic goal, given the close ties between the two countries, but Xi cannot be unaware of Washington’s hopes on this score. Indeed, shortly before his election, Trump said of Russia and China, “I’m going to have to un-unite them, and I think I can do that, too.” Moreover, areas of potential Sino-Russian rivalry extend from Central Asia to Africa, South Asia, and the Arctic. And then there are unresolved territorial issues, although these are a longer-term problem. Many in China believe that the Russian Far East, which was conquered by the tsars in the mid-nineteenth century, rightfully belongs to China and must one day be returned.

The Russian concern about longer-term Chinese goals was revealed in a leaked document from the Russian Federal Security Service (FSB), which referred to China as “the enemy” and warned that China is a serious threat to Russian security. The FSB fears Beijing’s efforts to recruit spies from Russia’s scientific community and access sensitive military technology through them. China, it claims, is spying on Russia’s military operations in Ukraine to gain knowledge about Western weapons and warfare. There is also evidence that Chinese groups linked to the government have repeatedly hacked Russian government agencies and companies, searching for military secrets.

Despite mutual suspicions and espionage, Russia and China, in Xi’s words, will continue to walk hand in hand. Putin has framed defeating Ukraine and its Western supporters as an existential issue for both the survival of the Russian state and his own ability to remain in power. Without China, he cannot subdue Ukraine nor secure his regime’s security. 

Iran

Russia and Iran have historically had a complex and sometimes antagonistic relationship. But since February 2022, Iran has become an indispensable supporter of Russia’s war, supplying it with drones that have killed Ukrainian soldiers and civilians and destroyed Ukrainian infrastructure. Iran—like China, North Korea, and Russia—seeks to challenge the US-led international order.

For centuries, the Persian and Russian empires were rivals and fought a succession of wars in the eighteenth and nineteenth centuries. These wars led consecutive Iranian dynasties to cede the three South Caucasus states and Dagestan in the North Caucasus to the Russian Empire. The Soviet Union supported secessionist movements in Iran in the 1920s. And just after World War II ended, Moscow refused to withdraw its troops from northern Iran, which it had occupied during the war. The Soviets then developed a profitable economic relationship with the shah’s regime while, at the same time, supporting the Iranian Communist Party. In the initial years following the overthrow of the shah in 1979, relations between Moscow and Tehran became strained. Iran’s new rulers called the atheist Soviet Union the “Lesser Satan,” as opposed to the United States as the “Great Satan.” The Soviet invasion of Afghanistan further galvanized Islamic anti-Soviet sentiments, but ties improved after the Soviet-Afghan War ended. 

Once Putin came into office in 2000, nuclear power became a focus of the relationship, much to the consternation of the United States. Russia accelerated the construction of the Bushehr nuclear power plant and agreed to build eight more plants in Iran. When Medvedev was president, US President Barack Obama persuaded him to join tough United Nations (UN) sanctions against Iran after its secret uranium enrichment facility was uncovered near Qom. But after the sanctions were lifted, Russian-Iranian relations grew closer.

It is not known what Iran is receiving in return for its current support of Russia’s war and whether imports from Russia are strengthening Iran’s ability to weaponize its enriched uranium. A decade ago, a Russian Middle East expert reported a conversation with a Russian diplomat who said that “a pro-American Iran is far more dangerous for us than a nuclear Iran.”

From the 1990s until 2022, Russia provided important military assistance to Iran across the ground, aerospace, and naval domains. This was focused more on hardware than technology transfer and consisted of tanks, armored vehicles, anti-tank missiles, combat aircraft, and surface-to-air missiles. There was also unofficial assistance for Iran’s ballistic missile and suspected chemical and biological weapons programs.

Prior to the 2022 war on Ukraine, Russia and Iran also grew closer once Moscow involved itself in the Syrian civil war and joined with Iran in backing former Syrian dictator Bashar al-Assad. Russia’s intervention also strengthened the Iranian Revolutionary Guard Corps fighting there. Before February 2022, it appeared that the two countries were working closely together in Syria despite differences over issues such as the Caspian Sea demarcation.

Iran was instrumental in assisting Russia at the outbreak of the full-scale invasion of Ukraine after Moscow failed to take Kyiv in three days. It provided Shahed drones, which the two countries now co-produce, and Russian-Iranian defense cooperation has increased markedly since then. Russia, however, has been constrained in how much of its own equipment it can deliver to Iran, such as SU-35 fighter jets and the S-400 missile defense systems, given its own needs as Moscow continues the war.

Russia and Iran have also formalized this relationship. In January 2025, Iranian President Masoud Pezeshkian traveled to Moscow to sign a comprehensive strategic partnership treaty with Russia. The treaty was presented as a breakthrough between the two countries, but that is an exaggeration. It mainly codifies the close ties that have developed since February 2022. It also stipulates that Russia would not come to Iran’s assistance if it were attacked by the United States or Israel. 

Questions also hang over the Russian-Iranian relationship since the overthrow of Assad in Syria and the coming to power of Ahmed al-Sharaa, whose forces fought both Russia and Iran during the long Syrian civil war. While Russia and Iran were joined in supporting Assad, that cooperation is no longer relevant. 

Russia sees Iran as an important bridge between Central Asia, the Caucasus, the Middle East, and South Asia, enhancing the connectivity and the reach of Putin’s Greater Eurasia project. A key component of this project is the North-South Transportation Corridor (INSTC). The completion of the INSTC is now a strategic goal for Moscow, and the corridor will facilitate trade between Russia, Iran, and other regional partners, connecting Eurasia to the Persian Gulf and South Asia. The ability to bypass Western-aligned countries will allow Russia not only to skirt sanctions, but also to facilitate closer ties with countries along the corridor.

Before the Hamas terrorist attacks of October 7, 2023, Russia and Israel enjoyed close relations. Israelis described Russia as a neighbor because of its presence in Syria. Russia worked with Israel to prevent the Iranian-backed Hezbollah from attacking Israeli targets, and Israel remained dependent on Russia for security in its north. Since October 7, the situation has changed as Russia has supported Hamas and Putin has distanced himself from Israeli Prime Minister Benjamin Netanyahu. But at the same time, Russia does not share Iran’s commitment to the destruction of Israel. One-sixth of Israel’s population comes from the former Soviet Union and there are multiple family and business ties between Russia and Israel.

Of course, one important element of the Russian-Iranian relationship is ideological: their shared animosity toward the United States and commitment to a post-West world. Putin has said that he views Iran as important to the “formation of a more equitable multipolar world order.”

Russia and Iran have been driven closer together since February 2022 because of their isolation from much of the world. But that could change if the war with Ukraine ends and Trump’s new reset attempts result in a restored US-Russian relationship. How might that change the Russian-Iranian relationship? Over the years, Iran has become an increasingly important part of Putin’s drive to replace the current international system with a post-West order in which the United States can no longer set the rules. Even if US sanctions on Moscow are lifted and US-Russian ties improve, Iran will remain both a political ally and a customer for Russian goods. If either country experiences a regime change, the situation could look different. But for now, the leaders in Moscow and Tehran appear to be securely ensconced, even if their respective populations remain wary of each other. Just as a US-Russian rapprochement will not succeed in separating Russia from China, better ties with Washington will not induce Moscow to rupture the partnership it has developed with Tehran.

During the Obama administration, Russia played a positive role in negotiating the Joint Comprehensive Plan of Action (JCPOA) agreement restricting Iran’s nuclear program. However, Trump pulled the United States out of that agreement during his first term. Now he seeks to negotiate a new nuclear deal, and Putin has offered to help facilitate such an agreement. However, the Kremlin’s attitude toward a new deal is ambivalent. Lifting sanctions on Iran is not necessarily in Russia’s interest, as Iran could produce additional volumes of oil and compete with Russia again on the international market. So the ideal scenario for the Kremlin would probably be to have the negotiations continue indefinitely with no resolution.

Israel’s attack on Iran highlights the dilemma Moscow faces in dealing with Tehran—and the limits of its influence. Russia immediately condemned the attacks, and Putin and Xi called for a cease-fire and negotiations. But Russia has done little to help Iran militarily and is not obliged to do so by the terms of their strategic partnership treaty. It needs Iran less than it did at the beginning of the Ukraine war, because it is now capable of manufacturing up to 2,700 Iranian-designed Shahed drones a month inside Russia.

Russia’s relations with Iran are indeed linked to its complex ties with Israel. Despite the souring of Israeli-Russian relations since October 7, 2023, both Moscow and Jerusalem want to preserve their bilateral ties. Russia does not share Iran’s stated goal of destroying Israel and might have more to gain economically from Israel than from Iran.

North Korea

Relations between Moscow and Pyongyang have fluctuated in the eighty years since the Democratic People’s Republic of Korea (DPRK) was first established. Today, North Korea’s main value for Russia is twofold: to provide artillery, other weapons, and troops for Russia’s war against Ukraine and to be part of the cheering squad for Russia’s emergence as the leader of the so-called “world majority” (i.e., the Global South). Preventing Korea being reunited and allied with the West has always been a key Russian goal.

The Soviet Union helped create the DPRK and largely bankrolled it until the Soviet collapse. It was instrumental in launching the Korean War and then supporting North Korea during the war, although Stalin miscalculated the US response. The war remained a controversial topic between the two countries for many years. Demonstrating his independence, North Korean dictator Kim Il-Sung refused to join Comecon, the Soviet-led economic bloc, and North Korea remained neutral during the years of the Sino-Soviet split. No top Soviet leader ever visited the country, although the Soviet Union continued to provide military assistance to Pyongyang. When Gorbachev came to power, he upended the bilateral relationship by establishing diplomatic relations with South Korea and seeking investment and loans from Seoul. Shortly thereafter, the Soviet Union collapsed and financial support for Pyongyang disappeared, with disastrous consequences for North Korea. Bilateral ties recovered slowly, and Putin visited Pyongyang early in his presidency. Kim Jong-Il visited Russia in 2001 and 2002, but little came of these visits.

Before the full-scale invasion of Ukraine, Russia-North Korea ties had started to improve. Before the invasion, ten thousand North Korean workers were sent to work in Russia’s Far East. Despite UN sanctions on North Korea, Russia continued to export coal, oil, and food to North Korea. But China was seen as North Korea’s main supporter until the Russian war on Ukraine. 

Russia’s invasion transformed ties between Moscow and Pyongyang. North Korea immediately supported Russia after the war began, particularly at the UN. North Korea was one of only two states (Syria is the other) to give diplomatic recognition to the Russian-occupied Ukrainian territories of Donetsk and Luhansk in 2022. Unlike China, which often abstains on Ukraine-related votes, North Korea has voted many times to support Russian positions on Ukraine at the UN. In 2023, in recognition of North Korea’s support, Russia increased its exports of food and oil, and North Korea and Russia began to exchange high-level visits—more than two dozen since 2023.

A turning point came when Kim attended the 2023 Far East Economic Forum in Vladivostok, where he met Putin and visited the Vostochny Cosmodrome to see Russia’s latest technological innovations in the space field.

Shortly thereafter, Pyongyang began supplying millions of rounds of badly needed ammunition and missiles to Russia. In return, it is believed that Russia supplied North Korea with missiles and space technology; North Korea later carried out a successful missile test. And in the fall of 2024, Pyongyang began sending soldiers to fight in the Kursk region of Russia to dislodge Ukrainian forces there. It is estimated that up to twelve thousand soldiers have fought the Ukrainians, approximately four thousand of whom have died. Ukraine has produced videos of captured North Korean soldiers saying they did not know where they were going or who they would be fighting when they deployed.

North Korea and Russia are now formal allies. In June 2024, Putin went to Pyongyang and the two leaders signed a treaty on comprehensive strategic partnership. It includes a mutual defense clause, obligating both parties to come to the other’s defense should it be attacked by a third party: “Russia shall immediately provide military and other assistance” to the other party if it “falls into a state of war due to armed invasion from an individual or multiple states.” Putin said that the treaty represented a “breakthrough” in Russia’s relations with North Korea.

It is clear what Russia is getting out of this relationship—ammunition, missiles, and troops to fight in Kursk. North Korea has also announced that it will send thousands of military construction laborers to work in Russia.

North Korea likewise receives weapons, including attack drones directed by artificial intelligence, tanks with improved electronic warfare systems, a new naval destroyer fitted with supersonic cruise missiles, and a new air-defense system. Russia is helping North Korea to modernize its antiquated Soviet-era arsenal.

This is a transactional partnership that has elevated North Korea’s international profile and reinforced Putin’s claim that Russia is a leader of the world majority. It has also helped Russia to continue fighting Ukraine. 

Is the CRINK an axis?

The US 2025 Intelligence Community’s Worldwide Threat Assessment, delivered to Congress, does not refer to the CRINK as an axis:

These primarily bilateral relationships, largely in security and defense fields, have strengthened their individual and collective capabilities to threaten and harm the United States, as well as improved their resilience against US and Western efforts to constrain or deter their activities. Russia’s war in Ukraine has accelerated these ties, but the trend is likely to continue regardless of the war’s outcome.

US adversaries’ cooperation has nevertheless been uneven and driven mostly by a shared interest in circumventing or undermining US power, whether it be economic, diplomatic, or military—Russia has been a catalyst for the evolving ties, especially as it grows more reliant on other countries for its objectives and requirements including in but not limited to Ukraine. Moscow has strengthened its military cooperation with other states, especially Pyongyang and Tehran. Russia also has expanded its trade and financial ties, particularly with China and Iran, to mitigate the impact of sanctions and export controls.

Some analysts, on the other hand, have argued that the CRINK represents a new “Axis of Upheaval.”

“The group is not an exclusive bloc and certainly not an alliance,” Andrea-Kendall-Taylor and Richard Fontaine wrote in Foreign Affairs. “It is, instead, a collection of dissatisfied states converging on a shared purpose of overturning the principles, rules, and institutions that underlie the prevailing international system.” More recently, Kendall-Taylor and Nicholas Lokker have argued that the group has intensified its military collaboration, creating new challenges for the West.

Experts claim that because these countries share a common goal of ending what they view as a Western-dominated system that ignores their interests, they collectively represent a new threat to the interests of the United States and its allies.

Historian Philip Zelikow argues that the CRINK members’ cooperation is closer than that of the original Axis powers before Pearl Harbor.

Others disagree, arguing that the analogy of the World War II Axis between Germany, Italy, and Japan is not apt because that was a formal alliance dedicated to defeating the Grand Alliance of the United States, the United Kingdom, and the Soviet Union. Moreover, as Sino-Russian relations expert Elizabeth Wishnick argues in a report for the Foreign Policy Research Institute, “An axis would require more than a shared authoritarian playbook and anti-Western orientation. We would expect to see some formalized cooperation among the three countries—We would anticipate a coordinated approach to assisting Russia in Ukraine.”

Russia’s relations with the three countries that have enabled it to continue its war against Ukraine are focused on bilateral ties. Moscow has separate partnerships with all three countries and they vary; the mutual defense clauses with North Korea and Iran, for example, are quite different. Russia is obliged to come to North Korea’s defense should it be attacked, but it has no such obligation to Iran. The four countries have not signed a quadrilateral pact and, apart from a shared desire to upend the current international order, their respective interests are not always congruent. Tensions between Russia, China, and North Korea from the Korean War remain. And China looks warily on the burgeoning Russia-North Korea relationship.

Moreover, the Israeli and US attacks on Iran and the destruction of some of its nuclear program raise issues about the future Russian-Iranian relationship and the Chinese-Iranian relationship. While Putin and Xi condemned the Israeli attacks, warning of the risks of escalation, they were both silent following the US attacks. They subsequently held a phone call urging negotiations but did not come to Tehran’s defense. Given the destruction of Iran’s military installations and the elimination of its key scientists and leading officials, both Russia and China will question Iran’s role as a reliable partner in the future. Russia needs Iran for drone production much less that it did at the beginning of the war, but the Israeli strike might have disrupted elements of Russia’s drone-production supply chain. If the Trump administration were to succeed in improving ties with Iran, that could further complicate the Russian-Iranian relationship.

Moscow will continue to rely on these partners for the duration of its war against Ukraine and beyond. They collectively represent a threat to the United States and its European and Asian allies. But alliances of autocratic leaders contain inherent contradictions. They might collectively share the goal of upending the international order, but they are mainly focused on remaining in power and advancing their own interests, as opposed to creating a new order on which they all agree. Russia might be the driver of the CRINK today, but a new reality might emerge if leadership changes in any of these countries.

Recent developments suggest that the CRINK could be developing into a bloc. As noted earlier, Xi hosted the leaders of North Korea, Iran, and Russia for the first time in September to watch a military parade celebrating the end of World Word II in Asia, a historic show of united opposition to the US-led world order. Western nations, whose leaders were largely absent from the parade and who have voiced disquiet over China’s military ambitions in East Asia, rightly expressed concern about this ostentatious show of unity. Indeed, during the parade China showcased its nuclear ambitions by debuting two new intercontinental ballistic missiles, the DF-5C and DF-61.

The optics of the leaders of China, Russia, and North Korea standing together to review troops and weapons was a powerful reminder that a new global order no longer dominated by the United States is emerging. On his Truth Social site, Trump took aim at Xi as he hosted the parade: “Please give my warmest regards to Vladimir Putin, and Kim Jong Un, as you conspire against The United States of America.” Trump also questioned whether Xi would credit the United States for the “massive amount of support and blood” it provided to China during World War II. Trump added, “Many Americans died in China’s quest for Victory and Glory.”

Responding to the CRINK

The CRINK represents a growing challenge to the West, both individually and collectively. Responding to the dangers these countries represent will be difficult and costly. Moreover, the Trump administration’s uneven, and at times uncoordinated, approach to countering these threats has raised questions about the extent to which the most powerful Western country will be willing to expend the resources to resist these countries in the future. Driving wedges between them—particularly between Russia and China—is unlikely to work in the short term. The inherent tensions between all of them might eventually lead to a fraying of their ties, but that is unlikely to happen for the duration of the Russian war and its immediate aftermath.  

The first Western goal should be to seek to contain the ambitions of all four countries. The United States Department of Defense has defined China as the main pacing threat: “China is the only country that can pose a systemic challenge to the United States in the sense of challenging us, economically, technologically, politically and militarily.”

The Trump administration has highlighted the threat from China and is engaged in difficult tariff negotiations with the country. Trump has also indicated that he would like to improve ties with China, even though he has acknowledged that it will be difficult to reach a deal. 

The second goal should be to contain Russia more effectively than has been the case since the Soviet collapse. Every US president since 1992 has sought to reset ties with Russia, but all these resets have failed because of fundamentally mismatched expectations on both sides. Trump’s Russia policy has been contradictory and inconsistent, praising Putin and criticizing Volodymyr Zelensky, reversing himself, and then reiterating his praise for the Russian autocrat. His failure to impose penalties on Russia after Putin reversed himself on agreements that he and Trump had apparently reached days before at their Alaska summit revealed the US inability to follow a consistent policy of deterring Russia from further attacks on Ukraine. Trump has repeated that he seeks a reset of ties with Russia, and he envisages a bright economic future for bilateral relations. 

The current US determination to improve ties with Russia works against any attempt to push back against the CRINK. Washington’s European and Asian allies are almost unanimous in their agreement that Moscow must be contained and isolated as long as Russia continues its war. If the United States moves in the opposite direction, allies’ influence will be limited. Nevertheless, the US allies in Europe and Asia might need to step up their policies aimed at containing both Russia itself and its CRINK partners.

The United States has also stressed the threat that North Korea represents. However, Trump has suggested resuming talks with Kim on North Korea’s nuclear weapons program after the failed negotiations of his first administration. And after the US strikes on Iran, Trump has also suggested resuming negotiations on Tehran’s nuclear program.

In other words, it is unclear how far the Trump administration will be willing to take actions to push back consistently against the CRINK and lessen the danger it represents to Western interests. So far, “America First” has not meant a US withdrawal from the world, but has included both military actions against Iran and negations to resolve a number of difficult regional conflicts.

In the face of these uncertainties, Russia will continue to view the CRINK countries as essential partners in its determination to defeat Ukraine and upend the current international order. In addition to seeking to constrain Russia’s ability to continue waging its war against Ukraine and acting as a disruptor on the world stage, the United States should refrain from taking actions that push these four countries toward closer cooperation. Although India is not a member of this group, Prime Minister Narendra Modi went to Beijing for the Shanghai Cooperation Organization meeting that preceded the military parade. India and China have been involved in various border disputes over the past few years, but Modi’s public show of warm ties with both China and Russia in Beijing occurred shortly after Trump imposed 50-percent tariffs on India because of its purchases of Russian oil. Modi has also appeared to endorse the new world order Xi touted in Beijing.

The presence of so many leaders from the Global South at the parade in Beijing was also a reminder that Russia’s war against Ukraine has strengthened both Moscow’s and Beijing’s ties with Global South countries, which do not want to be drawn into the conflict and often reiterate the Russian version of the war’s origins. The United States needs to develop a more effective way of reaching out to countries in the Global South.

While the CRINK appears to be emerging as a more coherent bloc, many tensions continue to exist among all four countries. The United States should devise a consistent, targeted strategy of seeking to exploit the points of tension between the countries, however difficult that is. It should also seek to deter further aggression by Russia, alone or in concert with its CRINK partners, and strengthen its own defenses against future military challenges by these countries.

Read the full issue brief

About the author

Angela Stent is a senior fellow at the American Enterprise Institute (AEI), where she focuses on US-Russia policy and Russia’s relations with Ukraine, China, Europe, and the Global South. Concurrently, Stent is senior adviser to Georgetown University.

Before joining AEI, Stent was professor of government and foreign service at Georgetown University and directed its Center for Eurasian, Russian and East European Studies. She was also a nonresident senior fellow at the Brookings Institution, senior adviser to the United States Institute of Peace, and senior fellow at the German Marshall Fund. Previously, she served as a member of the external advisory board to the director of the CIA, a national intelligence officer
for Russia and Eurasia for the National Intelligence Council, and a member of the State Department’s Office of Policy Planning.

Stent’s work has been published in a variety of media outlets and academic journals, including Foreign Affairs, Internationale Politik Quarterly, the Washington Post, and Politico. A popular speaker, she has appeared on CBS, CNN, Bloomberg, BBC, and NBC, among other cable news outlets. Stent has also testified before Congress and is the author of Putin’s world: Russia against the West and with the rest (2023).

She holds a PhD in government and an AM in Soviet studies from Harvard University. Stent also holds an MSc in international relations from the London School of Economics and Political Science and a BA in economics and history from the University of Cambridge.

Related content

Explore the program

The Eurasia Center’s mission is to promote policies that strengthen stability, democratic values, and prosperity in Eurasia, from Eastern Europe in the West to the Caucasus, Russia, and Central Asia in the East.

The post The CRINK: Inside the new bloc supporting Russia’s war against Ukraine appeared first on Atlantic Council.

]]>
South and Southeast Asia are on the front lines of the democracy-autocracy showdown https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/south-and-southeast-asia-are-on-the-front-lines-of-the-democracy-autocracy-showdown/ Thu, 16 Oct 2025 22:15:54 +0000 https://www.atlanticcouncil.org/?p=868874 How do democracies die? Not with a dramatic coup, but through quiet, intentional dismantling—rules bent just slightly, laws rewritten, oppositions discredited and then disarmed. This warning from political scientists has proven prophetic across South and Southeast Asia, where the past decade has witnessed steady democratic erosion.

The post South and Southeast Asia are on the front lines of the democracy-autocracy showdown appeared first on Atlantic Council.

]]>

Bottom lines up front

  • The region includes resilient, strained, fragile, and collapsed democracies—all benefit from democracy assistance that preserves civic space, delegitimizes authoritarian leaders, and protects free media across the region.
  • Key challenges include no-strings-attached Chinese financing, restrictions on political choice, and disinformation.
  • Protecting democratic institutions and practices can create governance stability and help the United States fortify important economic relationships.

This issue brief is part of the Freedom and Prosperity Center’s “The future of democracy assistance” series, which analyzes the many complex challenges to democracy around the world and highlights actionable policies that promote democratic governance.

Introduction

How do democracies die? Not with a dramatic coup, but through quiet, intentional dismantling—rules bent just slightly, laws rewritten, oppositions discredited and then disarmed. This warning from political scientists Steven Levitsky and Daniel Ziblatt has proven prophetic across South and Southeast Asia, where the past decade has witnessed steady democratic erosion.

According to Freedom House’s 2025 assessments, nine countries across South and Southeast Asia registered net declines in political rights and civil liberties since 2015—including Cambodia, India, Indonesia, the Maldives, Myanmar, Pakistan, the Philippines, Thailand, and Vietnam—while others such as Bangladesh and Sri Lanka saw modest improvements. The Varieties of Democracy (V-Dem) Institute also reports significant declines in the Electoral Democracy Index scores of several countries in the region in recent years. This trend underscores that even seemingly stable democracies can undergo serious erosion of their democratic institutions.

Yet the pattern is not uniform. From Indonesia’s institutional resilience to Myanmar’s military collapse, the region reflects not a single arc but a mosaic of democratic experiences—some unraveling, others resisting, many caught in an uneasy limbo. To make sense of these divergent patterns, this paper outlines four broad categories of country cases—not intended to simplify, but to reflect recurring traits: democracies that have held firm under pressure (resilient democracies); those that appear intact but are internally weakening (strained democracies); those whose institutions exist in name more than practice (fragile democracies); and those where the democratic practice has been openly dismantled (collapsed democracies).

With nearly 2.8 billion inhabitants, South and Southeast Asia are on the front line in the contest between liberal and authoritarian governance models. China’s state-led modernization offers an appealing, albeit illiberal template. Russia and other powers lend not just rhetorical support but operational tools to repress, manipulate, and surveil. The region’s democratic trajectory will carry implications far beyond its borders. As democracy is tested and redefined here, the terms of legitimacy, resistance, and political belonging across much of the world will be as well.

Resilient democracies

Despite facing similar pressures as their neighbors, Malaysia and Indonesia have managed to preserve their democratic institutions through a combination of judicial independence, active civil society, and political cultures that still value competitive elections. Their resilience offers lessons for other countries grappling with authoritarian pressures.

Malaysia

Malaysia has demonstrated remarkable democratic resilience through successive political transitions, most significantly during the watershed 2018 elections that ended Barisan Nasional’s sixty-one-year grip on power.[i] Despite the political instability that followed—including the controversial “Sheraton Move” parliamentary reconfiguration and three changes in premiership between 2020 and 2022—constitutional processes prevailed, ultimately yielding a durable unity government under Anwar Ibrahim after the 2022 elections. This political settlement between former adversaries reflects a maturing democratic culture where coalition-building efforts trumped winner-takes-all politics. While Malaysia continues to navigate challenges including ethnic and religious polarization, endemic corruption networks, and institutional legacies from its semi-authoritarian past, its judiciary has increasingly asserted independence in landmark cases, most notably in upholding the conviction of former Prime Minister Najib Razak.[iii] Civil society organizations maintain active oversight of governance, even as authorities occasionally employ outdated sedition laws to restrict political expression. Malaysia’s capacity to weather multiple leadership crises while preserving core democratic institutions stands in sharp contrast to the authoritarian regression evident elsewhere in Southeast Asia.

Indonesia

The fall of Suharto’s authoritarian regime in 1998 ushered in democratic reforms in Indonesia, leading to multiple peaceful transfers of power. In February 2024, former General Prabowo Subianto, Suharto’s controversial ex-son-in-law, won the presidency in an election widely considered competitive, despite concerns over the outsized influence of his predecessor, Joko Widodo. Provincial and regional elections in November further demonstrated Indonesia’s commitment to regular electoral processes. While Indonesia largely operates within democratic rules, it continues to grapple with systemic corruption and restrictions on religious freedom. Although the constitution guarantees religious freedom, only six religions are officially recognized, and blasphemy laws are enforced, leaving religious minorities vulnerable to discrimination. These challenges reflect enduring tensions within the country’s democracy. Nevertheless, civil society continues to play an essential role in defending democratic norms. In recent months, rushed legislative processes and Subianto’s appointment of an active general to a civilian post prompted mass student protests demanding transparency, demonstrating continued public engagement and resistance in Indonesia.

Strained democracies

India and the Philippines reveal a troubling paradox: Even countries with deep democratic traditions can experience significant erosion while maintaining competitive elections. Their struggles show that democracy’s survival depends not just on electoral competition, but on protecting the institutions that make elections meaningful.

India

Since Prime Minister Narendra Modi’s election in 2014, India has experienced rising Hindu nationalism, communal tensions, and constraints on civil liberties, alongside a concentration of executive power and weakened checks and balances. Communal violence has increased rapidly; in 2024, there were fifty-nine communal riots, an 84 percent increase from 2023. Media freedom has deteriorated, with increased censorship of content critical of Modi and the Bharatiya Janata Party (BJP), such as a BBC documentary and films depicting the 2002 Gujarat riots. Independent journalism is under attack, and civil society groups have been targeted through funding cuts and mass shutdowns.

In the face of these threats, India’s democratic institutions have shown resilience. The 2024 general elections, which were peacefully conducted with over 640 million voters, were widely regarded as free and fair. Although Modi secured a third term, the BJP underperformed, losing sixty-three seats and failing to secure a parliamentary majority. While the BJP’s platform centered religious nationalism, voters prioritized local issues, reflecting the enduring strength of India’s electoral processes.

The Philippines

The Philippines has experienced significant political and human rights challenges in recent years. Under the populist and illiberal administration of former President Rodrigo Duterte, the country witnessed thousands of extrajudicial killings linked to a brutal drug war. Democratic institutions weakened rapidly, and critics in the judiciary were forced out as the Supreme Court began backing the executive. While the Philippines has a historically strong and diverse civil society, civic space and the media environment were suppressed through regulations, censorship, intimidation, and disinformation.

In 2022, Duterte was succeeded by President Ferdinand Marcos Jr., the son of the late dictator Ferdinand Marcos Sr. Although human rights have improved slightly under the current president, over 840 extrajudicial killings have occurred since he took office. Duterte’s March 2025 arrest in Manila on an International Criminal Court warrant exacerbated the tense divide between Marcos Jr. and Vice President Sara Duterte ahead of the May midterm elections. While competitive, the elections exposed institutional vulnerabilities and were marked by aggressive disinformation campaigns, concerns about Chinese interference, and deep polarization. The government continues to bring unfounded cases against civil society groups, and “red-tagging” (i.e., accusing individuals and groups of communist sympathies) persists, exposing people to harassment and violence. Despite these threats, civil society remains active, criticizing injustices, advocating for reforms, and fighting for accountability.

Fragile democracies

Bangladesh and Pakistan remain caught between democratic aspirations and authoritarian realities. While their institutions remain weak and elections flawed, the persistence of civil society activism and public demands for accountability suggest that democratic possibilities have not been extinguished.

Bangladesh

Bangladesh is amid a pivotal political transition following the ousting of Prime Minister Sheikh Hasina in August 2024. Hasina’s fifteen-year rule and the Awami League’s (AL) increasingly autocratic administration ended after mass student protests and were replaced by an unelected interim government led by Nobel laureate Muhammad Yunus. Although Yunus has pledged democratic reforms and elections, his administration continues to exhibit some of the authoritarian tendencies seen under Hasina. AL supporters, who once dominated Bangladeshi politics and suppressed opposition, now face similar harassment under the interim government and its allies.

Despite the erosion of civil liberties and democratic institutions under the AL, Bangladesh’s economy averaged healthy annual growth of 6.5 percent. However, following the political instability in 2024, foreign investments plummeted, inflation rose, and gross domestic product  growth fell below 2 percent per annum. Meanwhile, the interim government has repeatedly postponed the promised elections, likely into 2026, raising concerns. Bangladesh’s democratic transition remains uncertain, with potential for either progression or regression. Opposition leaders have pushed for timely elections; this, along with economic and political reform, will be vital to sustaining the country’s democratic aspirations.

Pakistan

Pakistan’s persistent civil-military imbalance continues to hinder democratic prospects, with the military maintaining an outsized influence over the government. Judicial activism can act as a counterbalance, as Pakistan’s judiciary maintains remarkable independence despite the entrenchment of the military. Yet the assertiveness of the judiciary may also be a double-edged sword, increasing institutional competition and instability.

Although the majority voted against the military establishment during the 2024 elections, the military continues to act as a veto power. Recent attempts to manipulate election outcomes, such as the rejection of former Prime Minister Imran Khan’s nomination papers, stripping his party, Pakistan Tehreek-e-Insaf (PTI), of its electoral symbol, and manipulating vote counts, were reminiscent of military-engineered elections in the 1990s. However, the failure of these interventions in 2024 has revealed vulnerabilities in the military’s grip, signaling the persistence of democratic aspirations and potential shifts in power dynamics.

Collapsed democracies

Myanmar and Cambodia demonstrate how quickly democratic gains can be reversed when authoritarian forces consolidate power. External support from China and Russia has made these reversals more durable, showing that democracy’s enemies are increasingly coordinated across borders.

Myanmar

Myanmar’s democratic experiment ended abruptly with the February 2021 military coup, which deposed the elected government of Aung San Suu Kyi and precipitated the country’s descent into widespread conflict. By early 2025, the junta’s territorial control had contracted dramatically, with large areas now governed by a patchwork of ethnic armed organizations and People’s Defense Forces aligned with the National Unity Government (NUG) operating from exile. The military has responded with escalating brutality—deploying airstrikes against civilian populations, systematically torturing political detainees, and implementing scorched-earth campaigns in areas of resistance—resulting in over 5,000 civilian deaths and forcing more than 2.5 million into displacement since the coup. Elections promised by the military have been repeatedly deferred, while Suu Kyi’s detention was extended for an additional two years in January 2025 through transparently politicized corruption charges. International engagement has fragmented along geopolitical lines, with Western nations strengthening sanctions and extending recognition to the NUG while China, Russia, and Thailand maintain pragmatic relations with the junta. Myanmar represents the region’s most catastrophic democratic collapse, transforming from an imperfect but functioning electoral democracy into a failing state characterized by civil conflict, economic implosion, and humanitarian catastrophe.

Cambodia

Cambodia’s democratic prospects continue to fade under the Cambodian People’s Party (CPP), now led by Hun Manet, who succeeded his father, Hun Sen, after uncompetitive elections in July 2023. Cambodian elections have been widely recognized as rigged, with international observers documenting widespread irregularities, fraud, and vote tampering. The disqualification of the main opposition party, the Candlelight Party, over alleged registration issues effectively dismantled meaningful electoral competition. The regime has become increasingly repressive, targeting critics like environmental and human rights activists through arbitrary arrests and forced disappearances.

The CPP has also cracked down on independent media by revoking licenses and censoring critical media outlets. China’s growing influence in Cambodia has further entrenched the CPP’s authoritarian rule, as it provides economic support and political backing. As Cambodia’s largest investor, trading partner, and donor, China has been able to exert considerable sway over the administration’s policies, and Cambodia has aligned more closely with Beijing’s foreign policy interests. Without democratic alternatives to China’s influence and aid, this dynamic will leave little room for democratic renewal in Cambodia.

Cross-cutting challenges

Across South and Southeast Asia’s varied political systems, certain challenges repeatedly surface that make democratic governance more challenging regardless of a country’s context. Four of these challenges are particularly salient.

Digital authoritarianism and the rewiring of civic space: The early hopes that digital tools might democratize information have been overtaken by a more sobering reality. Across the region, states now wield surveillance, censorship, and algorithmic distortion not as exceptions but as deft instruments of coercive control. India has deployed surveillance of online speech; Cambodia has centralized digital infrastructure control; and the Philippines has blurred state messaging and disinformation. These tools are part of a broader architecture of control, quietly redefining the limits of dissent and the shape of public discourse.

China’s model and strategic recalibration: Beijing’s growing regional presence offers political elites a convenient alternative: stability without pluralism, growth without accountability, an undemocratic form of social contract. Chinese financing arrives without governance conditions and provides diplomatic cover against international scrutiny. Increasingly, the Chinese Communist Party also engages subnational actors—both governmental and nongovernmental—where scrutiny is weaker and institutional vulnerabilities are more pronounced. In Cambodia and Myanmar, this support has emboldened autocratic actors; in more open settings, it narrows strategic space for democratic engagement. Democracy assistance must contend with an emerging geopolitical reality that favors regime durability over democratic deepening.

Developmental absolutism and the erosion of political choice: Democratic rollback is increasingly justified through development discourse. Leaders frame electoral mandates as licenses for centralized control while dismissing institutional checks as inefficiencies. In India and Bangladesh, majoritarian governance is defended as a prerequisite for growth; in Thailand and Singapore, technocratic authority substitutes for political deliberation. The result is marginalization of political choice, overtaken conveniently by performance-based legitimacy.

Information disorder and the fragility of shared reality: Across the region, democratic discourse is being reshaped by disinformation; algorithmic self-fulfilling echo chambers; and digitally amplified hate, especially through WhatsApp. In Myanmar, online propaganda fueled ethnic violence; in India and the Philippines, deepfakes and coordinated misinformation campaigns distort elections. The fundamental problem is the collapse of shared language through which citizens might contest, interpret, or imagine their politics. Democratic institutions cannot function when the conditions for contestation of ideas have eroded.

Policy recommendations

US government support for democracy should be targeted and responsive to the different realities of the countries within each of these categories. For instance, countries experiencing democratic breakdown need different support than those still defending democratic space or those working to deepen democratic quality.

For resilient democracies: Deepening democratic quality

Democratic resilience, while encouraging, should not be mistaken for consolidation. In countries like Indonesia and Malaysia, support should move beyond preserving existing norms to actively strengthening democratic infrastructure. Fast-tracked visas for civil society leaders—across regime types—could facilitate regional mentorship networks through which democratic lessons diffuse more organically, especially when those lessons emerge from other Asian contexts rather than transatlantic ones. Bilateral trade agreements can be made contingent on demonstrable gains in press freedom and judicial independence. Cross-border investigative journalism, jointly supported by local and international media, can expose corruption networks that threaten institutional integrity.

For strained democracies: Defending democratic space

Where democratic institutions are under strain—as they evidently are in India and the Philippines—US government support must focus on preserving the civic space and avoiding normalization of authoritarian tactics. It should avoid high-level engagement with leaders who are actively involved in prosecuting journalists and/or silencing dissent, even if technical cooperation continues in parallel. Development aid can be redirected from compromised central agencies toward subnational governments that are overtly committed to democratic norms. Targeted sanctions against individuals involved in judicial capture or media repression can also send clear signals of accountability.

For fragile democracies: Building institutional resilience

In fragile democracies like Bangladesh and Pakistan, where institutions exist but often lack independence and/or depth, the priority should be to rebuild credibility. International financial institutions, particularly the International Monetary Fund, should tie future programs to transparent constitutional processes that include the opposition’s participation. Funding for civil society-run parallel election observation/monitoring programs can strengthen integrity where official mechanisms fall short. Regional judicial networks can provide both technical assistance and normative pressure to bolster court independence and resist political interference.

For collapsed democracies: Supporting democratic resistance

Where constitutional order has collapsed—as in Myanmar and Cambodia—support must shift toward those still defending democratic legitimacy. Recognition and funding should be extended to exiled national unity governments and aligned civil society organizations that retain public trust. “Democracy visa” pathways can offer protection and continuity for endangered journalists and activists. Financial sanctions should be imposed on military units and regime-linked families responsible for repression, thus reinforcing pathways for international legal accountability.

Addressing cross-cutting challenges

Support secure communication tools and digital literacy to push back against growing digital authoritarianism. Offer faster, transparent infrastructure financing to counter China’s influence while underscoring the material benefits of democracy. Sponsor and fund research that links transparency to economic growth, and support business coalitions that champion the rule of law. Strengthen civic education and fact-checking efforts to resist disinformation and restore shared civic ground. Partner with regional democracies—Japan, South Korea, Taiwan, and Australia—to jointly support democratic actors across South and Southeast Asia. Such coordination not only amplifies reach but also serves as a visible and forceful counterweight to China’s expanding illiberal influence.

Conclusion

The Cold War model of supporting elections and civil society organizations, while still important, cannot possibly address the sophisticated ways that elected leaders employ to dismantle democratic institutions from within. We need a differentiated approach that recognizes the distinct challenges facing countries at different points along the democratic spectrum while addressing the cross-cutting pressures that undermine democratic governance across the region. Democracy assistance must evolve beyond its traditional fixation on electoral processes. Instead of just funding election monitors and civil society training, donors should condition trade agreements on improvements in press freedom, invest in secure communication technologies for activists, and support independent judiciaries through targeted capacity-building programs. Without these foundations, electoral democracy remains symbolic. The future of democracy in South and Southeast Asia will not only shape national destinies. It will quietly, but decisively, alter how the world understands power, legitimacy, and the meaning of democratic resilience. This is where the United States must lead—not only with aid dollars, but also with the political will to make democratic governance a nonnegotiable component of its economic partnerships.

about the authors

Prakhar Sharma is a public policy researcher with more than eighteen years of experience in democratic governance and fragile states. He completed his PhD in political science at Syracuse University. Sharma was a senior specialist at the International Republican Institute, and has advised US government institutions, multilateral organizations, and Afghan partners on conflict and state-building.

Gauri Kaushik holds a master’s degree from Georgetown University in democracy and governance, where she focused on democratic and security challenges in the Indo-Pacific region. She has worked on democracy assistance and development programs at organizations including the National Democratic Institute and Democracy International.

Related content

The future of democracy assistance

This paper series provides an in-depth look at the many complex challenges to democracy around the world and highlights actionable policies that promote democratic governance.

Trackers and Data Visualizations

Jun 15, 2023

Freedom and Prosperity Indexes

The indexes rank 164 countries around the world according to their levels of freedom and prosperity. Use our site to explore twenty-eight years of data, compare countries and regions, and examine the sub-indexes and indicators that comprise our indexes.

Explore the program

The Freedom and Prosperity Center aims to increase the prosperity of the poor and marginalized in developing countries and to explore the nature of the relationship between freedom and prosperity in both developing and developed nations.

The post South and Southeast Asia are on the front lines of the democracy-autocracy showdown appeared first on Atlantic Council.

]]>
What Taiwan can learn from China’s gray-zone actions against the Philippines https://www.atlanticcouncil.org/in-depth-research-reports/report/what-taiwan-can-learn-from-chinas-gray-zone-actions-against-the-philippines/ Wed, 15 Oct 2025 21:00:00 +0000 https://www.atlanticcouncil.org/?p=881085 China uses different tactics for different aims: slow but persistent maritime incursions off the coast of the Philippines and high-speed aerial harassment in Taiwanese airspace. But Manila’s responses offer useful lessons for Taipei. A new study of the Philippines’ experience shows what Taiwan can do to create limits on Chinese action without triggering open conflict.

The post What Taiwan can learn from China’s gray-zone actions against the Philippines appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Drawing on the Philippines’ experience as Beijing attempts to physically dominate the South China Sea, Taiwan should: systematically document and expose airspace violations;
  • Use a layered response including radio warnings, UAV monitoring, and selective interceptor deployment, instead of scrambling fighter jets for every incursion; and
  • Lean on arms purchases, low-profile military training exchanges, deeper intelligence sharing, and diverse trade relationships to strengthen international ties.

Off the coast of the Philippines, China uses its coast guard forces, naval vessels, maritime militias, and other low-intensity methods to assert physical control and create “irreversible facts” in the South China Sea. These gray-zone operations enable Beijing to assert dominance in disputed maritime areas and secure strategic and economic interests while minimizing the international backlash that more direct military aggression could provoke.

China employs distinct tactics toward Taiwan—slow, persistent maritime incursions in the South China Sea challenge Philippine sovereignty and establish control, while high-speed aerial harassment in Taiwan’s Air Defense Identification Zone (ADIZ) delivers more aggressive messages. In its gray-zone operations aimed at Taiwan Beijing’s aims are to gradually erode Taiwan’s defense capabilities and political resolve to facilitate potential reunification.

Despite the differences, the Philippines’ responses to Chinese assertiveness offers lessons and policy recommendations that Taiwan can adopt to strengthen its resilience, sharpen deterrence, and counter China’s coercive tactics effectively. This new study by Chung-Yu Chou, a lieutenant colonel in the Taiwanese army, aims to derive practical insights from Manila’s experience that can inform Taiwan’s own strategic responses to ongoing Chinese pressure. Chou is a military instructor at the Taiwanese Army Command and Staff College and a visiting military fellow at the Atlantic Council’s Indo-Pacific Security Initiative.

The study’s results make clear that there is much Taiwan can do to create escalatory limits on Chinese action without triggering open conflict. High-profile joint drills, for instance, can be politically sensitive and provoke Beijing. Military training exchanges in which military officers and noncommissioned officers from unofficial partner nations including the United States, Japan, European countries, and others participate in professional military education and related training courses in Taiwan are lower profile but no less effective.

Deepening unofficial partnerships through arms purchases, strengthening intelligence sharing, and reducing economic dependence on China can also boost Taiwan’s military readiness—and its international support. Ultimately, sustained engagement in these areas is essential for Taiwan to mitigate China’s gray-zone coercion effectively.

View the full report

Related content

Explore the program

The Indo-Pacific Security Initiative (IPSI) informs and shapes the strategies, plans, and policies of the United States and its allies and partners to address the most important rising security challenges in the Indo-Pacific, including China’s growing threat to the international order and North Korea’s destabilizing nuclear weapons advancements. IPSI produces innovative analysis, conducts tabletop exercises, hosts public and private convenings, and engages with US, allied, and partner governments, militaries, media, other key private and public-sector stakeholders, and publics.

The post What Taiwan can learn from China’s gray-zone actions against the Philippines appeared first on Atlantic Council.

]]>
How the US and Europe can deter and respond to Russia’s chemical, biological, and nuclear threats https://www.atlanticcouncil.org/in-depth-research-reports/report/how-the-us-and-europe-can-deter-and-respond-to-russias-chemical-biological-and-nuclear-threats/ Wed, 15 Oct 2025 19:19:48 +0000 https://www.atlanticcouncil.org/?p=879392 A willingness to use chemical weapons has long been a feature of Russian aggression, on the battlefield in Ukraine and on the streets of Europe. Will Russia escalate to the use of biological weapons? And what about the country’s nuclear saber-rattling? An in-depth study of how Russia uses these threats calls for a strong NATO response.

The post How the US and Europe can deter and respond to Russia’s chemical, biological, and nuclear threats appeared first on Atlantic Council.

]]>

Table of contents

Key findings

  1. Russia will likely continue using chemical weapons in Europe in a range of scenarios over the next five to ten years, particularly if doing so undermines Alliance unity and disrupts Ukraine’s integration into the West. Based on its recent behavior, however, Russia appears less likely to use biological weapons. Furthermore, while Russia has threatened nuclear use, a large-scale nuclear attack appears unlikely.
  2. To credibly deter Russia from nuclear escalation, the United States and its European allies and partners must ensure that Russia understands that using—or threatening to use—chemical and biological weapons would both fail to achieve its intended outcome and incur intolerable costs.
  3. Since the end of the Cold War, CBRN (chemical, biological, radiological, and nuclear) defense has been deprioritized among NATO allies, including the United States. Amid calls for increased defense spending, CBRN defense capability development is an area primed for greater investment.
  4. The United States should leverage NATO to facilitate greater coordination between civilian and military entities to enhance whole-of-society resilience to CBRN threats. 
  5. Information and intelligence sharing is critical to achieving a common threat perception among NATO allies and partners. Expanded information sharing and effective strategic communications can deter Russian use of chemical or biological weapons and ensure a coordinated response if deterrence fails. 
  6. The United States and its European allies and partners should take steps to raise the public IQ related to CBRN threats, particularly as it pertains to chemical and biological threats.
  7. The governance of emerging and applied technologies is difficult within the bounds of existing treaty regimes. Sanctions and export controls can complement treaty organizations to monitor and contain potential CBRN threats from such technologies, including dual-use systems and components.

Introduction

This report presents the findings and recommendations of the Atlantic Council project, Sustaining Allied Responses to the Threat of Russian Chemical, Biological, Radiological, and Nuclear (CBRN) Escalation. The objective of the project was to analyze the prospects for Russian use of chemical or biological weapons specifically in Europe over the next five to ten years; identify how the United States and its European allies and partners could deter and prevent Russian use of these weapons in Europe; and, should deterrence fail, assess response options.

Background

Russia has a well-established and clearly demonstrated strategic objective of undermining stability in the Euro-Atlantic region to reverse its loss of status following the end of the Cold War.1 This strategy is characterized by hostility toward the United States and its allies and partners in Europe.2

Over recent years, Russia has demonstrated its intent to provoke instability in Europe by acting with malign aggression that is both overt and hybrid in nature. The starkest example of Russia’s revanchist aggression is its full-scale illegal invasion of Ukraine, launched in 2022. Russia has also been conducting hybrid attacks—hostile activities using tools of statecraft below the threshold of conventional warfare to shift the balance of power in its favor—against the United States and its allies in Europe.3

A willingness to use chemical weapons has long been a feature of Russian aggression, both on the battlefield in Ukraine (specifically chloropicrin), and on the streets of Europe.4 As a result, Russia was described as “the most acute nuclear, biological, and chemical threat in the near-term” in the United States’ 2023 Strategy to Counter Weapons of Mass Destruction.5 This parallels the same terminology used in the 2022 National Defense Strategy and 2022 National Security Strategy.6 Undermining the cohesion of the United States and its NATO allies is a core goal of Russia’s political and military strategy. The Kremlin has shown that it is willing to use, or threaten to use, whatever capabilities it possesses, including CBRN weapons, to achieve this goal.

Research question

Our primary research question was, “What are the prospects for Russian use of chemical or biological weapons in Europe over the next five to ten years, and how can the United States and its European allies and partners counter such threats?” To address this question, the project team examined the following:

  • In what scenarios might Russia use its arsenal of chemical and biological capabilities to achieve its geopolitical goals in the five-to-ten-year time frame? What developments in European security more broadly over the same period would increase or decrease the risk of Russian use of chemical or biological weapons?
  • How might the United States and its European allies and partners enhance their overall defense and deterrence posture to reduce the risk of potential chemical or biological weapons use in the next five to ten years?
  • How can the United States work with European allies and partners to coordinate and standardize comprehensive responses to the potential deployment of Russian chemical and biological weapons?
  • To what extent could Russian use of chemical or biological weapons in Europe escalate further to the use of nuclear weapons, and how can the United States work with its European allies and partners to reduce the risk of escalation?

Key findings summary

Our project illuminated several findings for US and European decision-makers:

  • Russia will likely continue using chemical weapons in Europe in a range of scenarios over the next five to ten years, particularly if doing so undermines Alliance unity and disrupts Ukraine’s integration into the West. Based on its recent behavior, however, Russia appears less likely to use biological weapons. Furthermore, while Russia has threatened nuclear use, a large-scale nuclear attack appears unlikely.
  • To credibly deter Russia from nuclear escalation, the United States and its European allies and partners must ensure that Russia understands that using—or threatening to use—chemical and biological weapons would both fail to achieve its intended outcome and incur intolerable costs.
  • Since the end of the Cold War, CBRN defense has been deprioritized among NATO allies, including the United States. Amid calls for increased defense spending, CBRN defense capability development is an area primed for greater investment.
  • The United States should leverage NATO to facilitate greater coordination between civilian and military entities to enhance whole-of-society resilience to CBRN threats.
  • Information and intelligence sharing is critical to achieving a common threat perception among NATO allies and partners. Expanded information sharing and effective strategic communications can deter Russian use of chemical or biological weapons and ensure a coordinated response if deterrence fails.
  • The United States and its European allies and partners should take steps to raise the public IQ related to CBRN threats, particularly as it pertains to chemical and biological threats.
  • The governance of emerging and applied technologies is difficult within the bounds of existing treaty regimes. Sanctions and export controls can complement treaty organizations to monitor and contain potential CBRN threats from such technologies, including dual-use systems and components.
Ground crew in protective gear decontaminate an aircraft as part of NATO’s efforts to prepare first responders to address CBRN incidents, September 15, 2013. NATO

Methodology

The project team adopted two principal research methods for this project: a series of scenario-based workshops and interviews with subject matter experts and officials from the United States, Europe, and NATO. The team also conducted secondary research to develop the workshop methodology and to corroborate information and insights gleaned during the workshops and interviews.

Scenario-based workshops

In January 2025, the project team convened experts and officials to take part in two scenario-based exercises. The first group, which was convened virtually, consisted of subject matter experts and researchers from the United States and Europe, while the second group (convened in hybrid format) consisted of officials from the United States, NATO, and European governments. See Appendixes B and C for more information about the participants and the methodology, respectively.

The project team created a plausible exploratory scenario in which tensions between Russia and the United States and its European allies and partners (primarily Ukraine) had grown over a five-year time frame. The scenario provided a framework for participants to consider the key questions of Russian strategic intent, and implications for allied deterrence and responses to Russian aggression.

The workshops presented two scenarios in the year 2030: one in which Russia carried out a chemical attack against NATO allies based in Ukraine, and one in which Russia carried out targeted biological attacks against allied officials in Europe. These attacks concerned low-level use of chemical and biological agents, rather than major battlefield use of such weapons. Thus, the focus was on how Russia might use these capabilities to test escalatory dynamics, rather than to achieve major military objectives. The workshops divided participants into two groups; each group focused on either the chemical or biological scenario. The workshops primarily asked participants to analyze why Russia might consider the use of chemical or biological weapons strategically advantageous in these scenarios; propose how to deter Russia from further use of chemical and biological weapons; and recommend how the United States and Europe should respond to Russia’s use of such weapons. The two groups reconvened after the exercise to share key findings from their discussions.

Interviews with officials and experts

Informed by the insights from the workshops, the project team conducted interviews with US, European, and NATO officials and experts. The interviews provided direct perspectives on the potential for Russian CBRN escalation over the next five to ten years and how the alliance can deter and respond to possible Russian chemical and biological escalation. The interview stage also enabled the project team to explore the additional question of nuclear escalation following Russia’s potential use of chemical or biological weapons.

The following report presents our analysis of Russia’s intent to use CBRN weapons, possible deterrence considerations to be employed by the United States and its European allies and partners, and response options for the United States and Europe to respond should deterrence fail. The report concludes with our overall findings and recommendations.

Part I: Russian intent

Vladimir Putin described the breakup of the Soviet Union as “the greatest geopolitical catastrophe of the 20th century.”7 NATO’s 2022 Strategic Concept makes clear that Putin’s ambition to reverse the outcome of the Cold War is at the heart of Russia’s efforts to reestablish spheres of influence and direct control over its former Soviet empire, including NATO allies.8 Russia’s hostile actions seek to undermine the rules-based international order that defines the worldview of NATO and its members.9

At the 2007 Munich Security Conference, Putin signaled clearly to the world that he believed undermining the international rules-based system was necessary to carry out his revanchist ambitions.10 Russia has since demonstrated repeatedly that it is willing to use violent and aggressive means to further this ambition. This includes conventional military aggression, as demonstrated by Russia’s 2008 invasion of Georgia, 2014 annexation of Crimea, and 2022 full-scale invasion of Ukraine.11

Russia’s hybrid campaign of aggression

In addition to conventional military aggression, Russia’s campaign has included a well-documented and long-running “shadow war” of hybrid tactics against NATO and its allies.12 This hybrid campaign has included critical infrastructure attacks, acts of violence, weaponized migration, election interference, and information campaigns, which have intensified in volume since Russia’s full-scale invasion of Ukraine in 2022.13

The threat and the use of Russia’s CBRN capabilities has been a feature of Moscow’s hybrid campaign. In spite of the long-standing norms against using CBRN weapons, enshrined in international treaties and conventions, Russia has demonstrated that it is able and willing to deploy these weapons,14 including in NATO territory.15 Russia has also demonstrated a willingness to use chemical weapons during its illegal invasion of Ukraine and long supported the former Assad regime in Syria that used chemical weapons against civilians.16

The psychological value of chemical and biological weapons

For Russia, chemical and biological weapons have many potential uses and bring many advantages. At their most basic level, chemical and biological weapons, either in a battlefield scenario or a civilian context, are agents of terror. Several interviewees noted the Russian state employs these weapons—or threatens to—to instill fear in European populations and among Russian dissidents in exile.17 Russian willingness to use chemical weapons in this manner also sends a clear signal to the domestic Russian population about the Putin regime’s tolerance for any potential threats and challenges. A clear demonstration of this tactic was the 2020 Novichok poisoning of Russian opposition leader Alexei Navalny, which took place in Russia.18 While untested, it can be safely assumed that Putin would resort to extreme measures, including using CBRN weapons as necessary, to ensure the survival of his regime.

Some participants described public awareness in much of Europe about how chemical or biological weapons are used and the effects they can have as generally low. Those participants suggested that Russian use of CBRN weapons would be a means of causing widespread panic and manipulating emotions and public actions. The confusion they could potentially sow could create fertile ground for disinformation campaigns designed to undermine public trust in their governments.19 Such an attack could also expose frailties in broader social resilience in the target community.

Challenging norms–and NATO

Many participants in both the workshops and interviews reflected that a significant incentive for the use of chemical or biological weapons is to further degrade the broadly accepted international norms and standards in place since World War II. Russia’s documented use of chemical weapons sends a signal that it does not consider itself to be constrained by rules, norms, or obligations like other countries. It is an assertion that, as a supposed great power with an extensive and sophisticated CBRN toolbox (a legacy maintained from the Soviet era), and a permanent seat on the United Nations (UN) Security Council, Russia can act with relative impunity to flout and degrade the rules-based system that it opposes. Allies should continue to acknowledge and challenge this behavior, but more public reporting on Russian chemical and biological weapons and how they compare to restrictions outlined in the Chemical Weapons Convention (CWC) and Biological Weapons Convention (BWC) could improve awareness of Russia’s possible intent.

In more general terms, the actions of the Russian regime demonstrate that Russia places lower value on human life than the United States and its allies, whether that is of Ukrainian civilians, unwitting bystanders to Russian crimes, or its own military personnel.20 This cultural disregard for the suffering of even its own people affords Russia the space to conduct more reckless attacks and bear the subsequent consequences that the United States and its European allies and partners would not.

By their nature, different chemical and biological weapons have a broad range of properties, methods of delivery, rates of contagion, and lethality.21 While the CWC includes verification measures, the BWC does not. Participants noted that Russia could calibrate the nature, scale, and target of any chemical or biological weapon attack to create maximum uncertainty, exploit potential differences in threat perceptions and willingness to stand up against Russian aggression, and degrade international conventions. In many senses, the greater utility of chemical or biological weapons is not their lethality, but their impact on the adversary’s thinking. As one participant put it, “the intention isn’t to kill, but to complicate.”

This coercive element confers chemical and biological weapons and the range of effects they can create, with significant strategic value for Russia. Through the use (or threatened use) of different chemical or biological weapons in a range of scenarios, Russia might hope to influence allied decision-making and actions, such as potential Ukrainian integration into Western-oriented institutions. Participants observed that Russian use of chemical and biological weapons in these scenarios could be a means of Russia signaling that it considers the West has crossed its political red lines.

In a hypothetical battlefield context, the threat of chemical weapons use could limit the efficiency of allied military operations by imposing extra precautionary measures and influencing battlefield planning. In Iraq, the fear that Saddam Hussein could use chemical weapons degraded efficiency on the battlefield.22 After decades of underinvestment and neglect in the principles of operating in CBRN contaminated environments, Russia may be tempted to expose shortfalls in allied CBRN readiness on the battlefield.

For Russia, chemical and biological weapons serve an additional military function of making up for potential conventional military shortcomings. Where the Russians might be outmatched by NATO in conventional terms, unencumbered by moral or legal constraints, they might consider it a legitimate part of their doctrine to use asymmetric capabilities that can tilt the scales in their favor.23 Participants in our exercises speculated that the likelihood of Russia resorting to chemical or biological weapons would increase should Russia face imminent conventional defeat on the battlefield, either against Ukraine or NATO. This assumption is supported by the 2024 change in Russian nuclear doctrine, which lowered the threshold for first use of nuclear weapons to a new, lower standard.24

A Dutch Air Force F-35 fighter jet conducts air operations during exercise Steadfast Noon. Thirteen NATO allies participated in NATO’s annual nuclear deterrence exercise in 2024. October 21, 2024. NATO

The escalatory dilemma

Russia’s recent changes to its military doctrine, and the potential use of chemical and biological weapons either in civilian or battlefield contexts, must be considered within the framework of political and military escalation.25 Several interviewees noted that, because these are weapons that NATO allies do not and would not use, Russia’s previous use of chemical weapons and potential willingness to turn to biological weapons give the Kremlin an extra rung on the escalatory ladder.

Unlike nuclear escalation—which is well-studied, more clearly defined, and more widely considered taboo in the case of first-use of nuclear weapons—the escalatory dynamics of chemical and biological weapons use are more ambiguous and less certain. The scale and severity of chemical or biological weapon use could be calibrated to avoid crossing an obvious threshold that demands a military response, while at the same time clearly crossing a normative line that NATO allies would not cross, all the while posing a difficult conundrum about the appropriate and proportionate response.

Additionally, the dual-use nature of many of these chemical or biological agents (which may have legitimate and peaceful origins and uses) makes attribution challenging and presents sufficient deniability. This makes it difficult to establish clear lines of acceptable use and potentially hampers efforts to cohere a forceful and united response. At the same time, it allows Russia to simultaneously send a message of intent to allies and sow further confusion and distrust, while mostly avoiding (or limiting) punishment. In short, per one workshop participant, “it helps Russia to establish escalation dominance without committing to war.”

However, in many discussions throughout the project, there was considerable uncertainty over whether and how escalation to chemical and biological weapons use would increase the subsequent prospects of nuclear escalation. While many participants recognized that Russia’s willingness to disregard norms when it comes to chemical weapons in particular could logically lead to nuclear escalation and that Russia had invoked rhetoric around nuclear weapons use in recent years, participants agreed that taboos around nuclear weapons use exert more of a constraining force on Russia. Several participants noted the reported influence that China and India were able to wield against Russia in October 2022 to help de-escalate Moscow’s nuclear rhetoric at the time.26

Participants noted that where chemical or biological weapons can be deployed in such a way as to sow confusion and inject escalatory ambiguity, the line that nuclear weapons use would cross is much more definitive. No participants envisaged these scenarios escalating to the use of nuclear weapons unless Putin felt it was the last and only option for his personal survival.

Part II: Deterrence

As outlined above, Russia has and could continue to use chemical or biological weapons depending on the state of its conventional capabilities. The United States and its European allies and partners play a crucial role in deterring Russia from using any CBRN weapon. It is therefore critical to consider the scenarios in which Russia might turn to such weapons. Russia might even assume that previous responses to chemical attacks give them scope to escalate to larger-scale strategic weapons.27

For deterrence to be effective, like-minded nations must make clear that they are prepared to impose intolerable costs (economic, geopolitical, or military) on Russia should it use chemical or biological weapons, while also maintaining some ambiguity as to the exact nature of a response. Demonstrations of intelligence sharing among allies to present a unified threat assessment may clarify how the United States observes the Russian threat in the CBRN domain. Given how critical it is for civilian institutions to be integrated in the response to a potential CBRN attack, particularly related to chemical and biological threats, a whole-of-government approach to deterrence is essential for how the United States and its European allies and partners should position themselves vis-à-vis Russia. Outside-the-box thinking around potential partners and nontraditional allies may also aid in strengthening deterrence. The following takeaways emerged from our analysis, including discussions with key stakeholders in the United States and Europe.

Deterrence can yield powerful results

Deterrence by punishment would be harder to inflict if Russia were to use a chemical or biological weapon, given that there would not be a proportional response.28 However, the United States and Europe still have options for precise, measured, and consequential actions. Workshop participants agreed that specific actions or escalation using CBRN threats from Russia would have severe consequences warranting a response, including stringent economic sanctions, diplomatic pressure campaigns, and, in some instances, retaliatory military strikes. With the nuclear deterrent as the foundation for any response from the United States (alongside that of the United Kingdom and France), any threat of retaliation against Russia will be stronger.29 In addition, the United States and European countries could implement measures such as export controls, sanctions, international condemnation, or stationing NATO troops closer to Russia’s borders to deter Russian CBRN use.

Participants reflected that the most likely scenario in which Russia would turn to CBRN threats would include hybrid attacks on the United States and Europe. Deterrence of such threats remains a “riddle” as one interviewee put it, where more degrees of ambiguity are present that do not apply to conventional (or nuclear) escalation. When approaching the more tactical use of chemical or biological weapons, there is more opaqueness given the dual-purpose nature of substances, technologies, and delivery systems. Workshop participants did not come to consensus on how the United States and its European allies should view (or respond to) such threats within the hybrid domain or at the tactical applications of chemical or biological weapons.

The role of attribution in deterring CBRN use

During the workshops and interviews, participants continuously reiterated that attribution is critical to deterring Russian chemical and biological threats and holding Russia accountable for past use of chemical weapons. Intelligence and information sharing play an important role in attribution. One interviewee remarked that Russia may think twice about staging chemical and biological attacks if there is more publicly available information about their chemical and biological capabilities, facilities, and deployment means.

However, timely technical collection and forensic analysis capabilities are lacking among NATO allies, leading to questions about the accuracy and reliability of attributing attacks. Several existing capabilities—including detection, intelligence, and surveillance systems—could prevent escalation with chemical and biological weapons, but these systems are not well resourced across the Alliance. Many NATO member states lack adequate expertise in sample collection, robust laboratory infrastructure, and the requisite instruments to conduct analysis, all of which impede attribution.

Some participants we spoke to, particularly on NATO’s eastern flank, reflected on a need to strengthen intelligence, monitoring, and detection capabilities to improve their overall deterrence and response posture. Investment in capabilities to investigate and attribute attacks could prevent Russian escalation. For attribution to be effective, the United States and European allies and partners must also possess a shared understanding of indicators and warning signals ahead of an attack.

Russian President Vladimir Putin conducts an exercise of Russia’s strategic nuclear deterrence forces in Moscow via video conference. Putin approved Russia’s new nuclear doctrine in 2024. Mikhail Metzel/Reuters

Preparedness and resilience are essential

Participants described the need for the United States and its European allies and partners to limit the consequences of Russian chemical and biological attacks. The notion of “deterrence by resilience” or “deterrence by preparedness” (a subcategory of the broader notion of “deterrence by denial”) is one paradigm for thinking of how the United States could successfully prevent Russia from turning to chemical or biological weapons. The following considerations came up most frequently as areas for investment.

Capability development and deployment

Allied military representatives broadly agreed that CBRN-related equipment—either related to attribution (including detection and surveillance systems) or response (such as decontamination or personal protective equipment [PPE])—is often overlooked in favor of high-caliber defense systems. Counter-CBRN capabilities are frequently considered too niche for broader collective defense.

Investment in CBRN defense capabilities, discussed further in the response section of this report, provides a deterrent signal in addition to preparing allies to fight through a chemical or biological attack. However, nearly everyone we interviewed recognized that these capabilities are often siloed to specialist forces and not broadly integrated within general purpose forces. Ministries of defense across the Alliance should set baselines for CBRN defense-capability targets, including PPE, gas masks, and treatment, across the total force and resource these priorities accordingly.

Exercises and training

Regular and comprehensive exercises that incorporate a variety of US and European military forces would underpin an effective deterrence strategy toward Russia. Some participants described the importance of joint training among special operations forces (SOF) that might be equipped to respond to chemical and biological weapons use. Components of these exercises should be incorporated into broader training, which can enable preparedness in times of crisis. Participants pointed to several preexisting multinational exercises as examples to demonstrate readiness to deter CBRN escalation.30

Other training—including tabletop exercises and war-games—can be deployed to help decision-makers design more effective standards to aid and inform how the United States and its European allies and partners can deter potential Russian use of CBRN threats. Tabletop exercises and war-games leveraged by the Pentagon and DTRA with their European counterparts can be used to strengthen strategic and operational thinking about how to deter Russian escalation by providing opportunities to try new approaches under the guidance of expert facilitators.

Whole-of-society resilience

To be effective, deterrence by resilience must incorporate all facets of society to respond to instances of crisis or threats.31 To deter potential CBRN threats through preparedness, European allies and partners must warn the public, without fear-mongering, of the risk of escalation. Several participants noted the importance of preparing populations to withstand and defy threats from Russia, which includes activating and sustaining civilian institutions such as hospitals that would treat those affected by a chemical or biological attack. As part of a whole-of-society approach, greater awareness of chemical and biological threats is needed; public health personnel, first responders, law enforcement, teachers, and others ought to understand the effects of chemical and biological agents and how to respond appropriately. Similar to the military, civilian agencies should procure and maintain CBRN defense capabilities to protect and treat civilian populations in the event of a chemical or biological attack.

One phrase that is often repeated in expert circles is “raising the IQ” on nuclear threats. This concept applies to chemical and biological threats as well so that more individuals are cognizant of their scale and severity. Mental and emotional preparedness would enable the public to resist Russian efforts and contain the potential consequences associated with a Russian attack. Demonstrating societal resilience, in which wider social and civil functions can withstand CBRN escalation, could deter Russia from employing CBRN weapons.

Wielding the information space

Russia consistently utilizes the information space to instill fear, distrust, and confusion.32 In addition to responding to these types of stories with clear, fact-based information that demonstrates why Russian claims are false, the United States and its European allies and partners can also pre-bunk and dispel any false or misleading claims that Russia produces about CBRN-related threats. Participants pointed to the importance of sharing proactive messages about resistance to such narratives through a variety of means—including traditional media, official government communications, and social media—to dissuade Russian perpetrators from deploying attacks. Eye-catching social media posts and multimedia tools can extend reach to nontraditional communities to help dispel Russian claims. As one participant noted, winning the information war must be combined with the requisite military power and civilian capability to deter Russia.

Be cautious of setting red lines

While US and European officials must be clear about the consequences of escalation, interviewees resisted establishing so-called red lines that are overly specific. Many interviewees pointed to the infamous case of the Obama administration’s supposed red lines regarding Syria’s use of chemical weapons during its civil war in the 2010s. Such thresholds, which may be politically sensitive to apply, would leave the international community in a difficult position with respect to enforcement or punishment, which could undermine the credibility of deterrence.

Participants called instead for political rhetoric to be vague externally, where Russia and its allies would have difficulty determining the threshold for response, while being precise internally about the consequences of Russia’s actions. This distinction would provide space for the United States and its European allies and partners to determine the requisite response to CBRN threats stemming from Russia.

Diplomacy as a deterrent

Russia finds itself somewhat isolated in the current geopolitical environment. However, the Kremlin frequently looks to several nations—including China, Iran, and North Korea—to bolster Russia’s defense. These relationships could provide options to engage non-European nations to deter Russia from CBRN escalation. For example, China reportedly engaged Russia to discourage the use of nuclear weapons in Ukraine and the deployment of nuclear weapons in space.33 Given the degree to which Russia depends on China to prop up its wartime economy, there may be an opportunity to leverage China to dissuade Russia from turning to CBRN escalation, particularly if China upholds international regimes regarding CBRN use.34 India may also be able to influence Russia given its role in supporting Russia’s economic stability amid Western sanctions and may have sway in discouraging CBRN escalation.

A CBRN specialist trains in the Czech Republic as part of the CORONAT MASK 2024 training. More than 800 CBRN specialists from 13 NATO nations participated to exercise collective CBRN capabilities. June 24, 2024. US European Command

Part III: Response

The results of our workshops, interviews, and secondary research illuminated opportunities to enhance US and European responses to a CBRN attack should deterrence fail. Given its role in coordinating allied planning, NATO will be a critical actor in any response effort. Our discussions with NATO and European officials revealed consistent, close cooperation among military elements at NATO, while understanding that support required from civilian entities is a more nascent effort. However, the mandate for responding to a CBRN incident typically falls within the civilian sectors of many European governments, so political-military coordination is essential to ensuring all facets of government are aware of their roles in the event of a CBRN attack. Enhancing cooperation to promote coordinated responses includes the following best practices.

Ensure broad awareness of CBRN threats

Allies we interviewed broadly agreed that awareness of Russian CBRN threats cannot only reside within the specialist communities at NATO or in national militaries. At the political level, there is general agreement at NATO and within European capitals that Russia’s CBRN threats are an immediate concern. However, it is less clear how much allies are willing to invest to counter these threats, both now and in the five-to-ten-year time frame. Those geographically closest to Russia were most acutely aware of the threats and adamant about engaging with NATO allies via training, exercises, and exchanges to ensure active cooperation.

Variations in threat perception also appeared to be generational, according to our discussions. For example, officers who have served since the end of the Cold War described a lack of investment in CBRN defense in the absence of acute Soviet chemical, biological, and nuclear threats. The perception of such threats was lower in the post-Cold War era, which led the United States and Europe to deprioritize investment in preparedness. Given Russia’s continued flouting of international norms against the use of chemical weapons, and the primacy of nuclear warfare in its military doctrine, US, NATO, and European leaders need to uphold what they have recognized in recent strategic guidance as a critical threat emanating from Russia and invest in their forces accordingly.

Expand CBRN training to the total force

Training is an area that appears ripe for further investment. European military leaders we interviewed agreed that expertise cannot reside in the CBRN specialist communities alone. General purpose forces must also be trained on CBRN threats and equipped to fight through contaminated environments. To ensure broader awareness of CBRN threats, NATO and national military exercises should include elements of chemical, biological, or limited nuclear use scenarios. Military and civilian leaders we interviewed recognized the drawbacks of having personnel exercise in restrictive protective gear, given how it can slow maneuver, but it also puts troops at a disadvantage if they need to operate wearing the gear in a real-time scenario without much experience. NATO’s CBRN-focused exercises, described in the previous section, are an important step toward ensuring interoperability among NATO forces, but these lessons can be expanded beyond CBRN defense units to include NATO SOF and other elements of NATO’s deployable forces.

Better integrate military and civilian components

Apart from military preparedness, it is critical for national military and NATO elements to understand the capacity of civilian institutions, as first responders will have the authority for coordinating a response to incidents that occur outside of military operations. During the workshops and the interviews, participants expressed the need for greater integration of civilian and military personnel on topics such as decontamination and training, which necessitates the ability to share information between sectors.

Civilian institutions also play a critical role in responding to chemical and biological incidents, which could include attacks. Preparedness within national, subnational, and local institutions—including, for example, hospitals, research laboratories, public health institutions, law enforcement agencies, manufacturing facilities, and entities managing critical infrastructure—are essential to ensuring readiness for potential chemical and biological attacks. Civilian institutions could be underprepared for the crisis operations that would be required in the event of a chemical or biological attack. Better coordination with military counterparts can bridge these gaps to ensure a whole-of-society response to potential attacks, which also has an important deterrent effect when highlighted via strategic communications campaigns.

The European Union can play a role in fostering greater access to critical resources, such as PPE and laboratory equipment, particularly in times of crisis where traditional processes are too slow. The European External Action Service, which is the EU’s diplomatic service, has long partnered with NATO to ensure mutual understanding of threats and how to best prepare NATO allies and EU member states for possible CBRN attacks with information and tangible assets.35 This relationship is vital to ensure stronger political-military coordination and should be expanded to account for greater CBRN-related cooperation.

Leverage NATO for coordination and capabilities

NATO’s 2022 CBRN defense policy represented a shift from the focus on weapons of mass destruction (WMD) terrorism of the early 2000s to a state-based threat actor that more closely aligns with the modern security environment.36 NATO’s International Staff is overseeing the implementation of this policy, which is critical to ensure guidance flows to capitals so national authorities can promote a consistent approach. A response aligned with NATO demonstrates unity, which in turn demonstrates alliance cohesion in the face of continued Russian threats. Several NATO allies, including the United States, UK, and Finland, have their own national policies, but for those that do not, the NATO policy provides a roadmap for driving national prioritization of CBRN threats and response options for these threats aligned with NATO’s priorities.37

As NATO allies consider greater thresholds for defense spending, more investment is needed in CBRN defense equipment and capabilities. An essential aspect of capability development is deploying and positioning of attribution, detection, and surveillance systems. NATO is well poised to lead collaborative efforts and ensure that states without adequate CBRN defenses learn from leaders in the field. NATO’s High Visibility Projects (HVP) includes three initiatives to improve cooperation around facilities, equipment, and detection.38 CBRN defense projects have also been part of NATO’s Smart Defence Initiative since 2014.39

Consider the information domain

As noted in the deterrence section, proactive communication about military and civilian activities to safeguard the entire population from a CBRN attack serves an important deterrent function while bolstering societal resilience. Effective use of the information domain is equally critical to reassuring the public regarding CBRN responses.

States can disseminate proactive messages to get ahead of any false or misleading information that Russia may seek to inject within open societies. This includes emphasis on strategic communications, fact-checking initiatives, media literacy, and education campaigns for adults and children alike.

The health sector can offer lessons in disseminating information about emotionally sensitive topics in a way that recognizes the severity of a threat without stoking fear. For example, the UK Health Service launched a public health campaign in 2025 to counter fears of taking antibiotics, which has become a top issue among UK residents.40 Similar approaches can be taken to inform the public about chloropicrin or other agents Russia has used. Such communications should focus on facts, and in the realm of CBRN weapons, be clear about the rare and limited nature of exposure to such threats so as not to provoke undue stress or fear.

Integrating deterrence and response

Through the course of our research, we identified two activities that served both deterrent and response functions. First, being clear and unafraid of imposing massive costs to Russia (including economic, geopolitical, or military actions) for its use of chemical weapons could deter it from continuing to deploy chemical weapons or prevent escalation. Accountability is also an important part of response. Since 2014, Russia has acted with impunity in the absence of credible deterrent threats to its use of chemical weapons. Although many countries and international organizations have condemned Russia’s use of chemical weapons and imposed sanctions on Moscow, these actions have not stopped Russia from using chemical agents to achieve geopolitical goals. The consensus during our workshops and interviews is that Russia has a long history of incorporating CBRN weapons into its strategy and planning, which makes them both a near-term threat and a long-term strategic threat. Bringing treaty violations forward has had limited impact on Russia’s behavior, but increasing economic sanctions could reduce Russian access to funding, equipment, facilities, and technologies that could advance their chemical and biological weapons ambitions.

Second, the United States and its European allies and partners should clearly communicate potential consequences to deter future actions and inflict damage on the sectors on which Russia relies on for the development of its chemical and biological capabilities. The apparent threat of what a potential CBRN escalation would entail, including the diplomatic, informational, military, and economic implications, is essential for deterring Russia from turning to these threats, but following through on these actions also serves to punish Russia in response to its illicit activities.

Participants engage in a counter-CBRN defense training as part of a NATO-led exercise. 2025. NATO

Recommendations and key findings

Finding: Russia will likely continue using chemical weapons in Europe in a range of scenarios over the next five to ten years, particularly if doing so undermines Alliance unity and disrupts Ukraine’s integration into the West. Based on its recent behavior, however, Russia appears less likely to use biological weapons. Furthermore, while Russia has threatened nuclear use, a large-scale nuclear attack appears unlikely.

Recommendation: Allies should continuously assess and evaluate Russia’s strategic objectives. To better coordinate threat perceptions across the Alliance, the United States and its European allies and partners should consider opportunities to expand collaboration on joint threat assessments related to Russia’s CBRN capabilities. As the Office of the Director of National Intelligence crafts the annual joint threat assessment report, insights from European allies and partners will be critical to assemble the most comprehensive picture of Russian CBRN threats; integrating perspectives from the Office of the NATO Assistant Secretary General for Intelligence and Security will be paramount in this effort.

Finding: To credibly deter Russia from nuclear escalation, the United States and its European allies and partners must ensure that Russia understands that using—or threatening to use—chemical and biological weapons would both fail to achieve its intended outcome and incur intolerable costs.

Recommendation: Instead of publicizing red lines, the United States should champion the achievement of internal consensus regarding acceptable thresholds of Russian activity based on treaty obligations, while externally preserving ambiguity as a component of deterrence. NATO, the Organisation for the Prohibition of Chemical Weapons (OPCW), and the United Nations are valuable forums for such deliberations and can play roles in imposing costs on Russia for CBRN use. However, internal debates within national governments are required to achieve consensus, which can take time. International investigations, such as those previously led in Syria by the OPCW (an intergovernmental body), are also time-consuming, and Russia politicizes the results to undermine effectiveness. Therefore, this recommendation could take years of sustained effort to carry out.

Recommendation: Within the United States, the Department of Defense (DoD) should work with the relevant authorities within the Treasury and Commerce departments to inflict the requisite economic pain on Russia through, for example, sanctions and export controls, to undermine its ability to sustain its biological and chemical weapons programs. Unified public messaging campaigns from the United States and Europe that condemn Russian CBRN weapons deployment would reinforce activities conducted behind the scenes.

Recommendation: The United States and its European allies and partners should identify methods for cooperation with nontraditional partners to dissuade Russia from leveraging CBRN threats as part of their military doctrine. Through NATO or the UN, the United States should explore opportunities to engage China and India to dissuade Moscow from pursuing further CBRN weapons development and use.

Finding: Since the end of the Cold War, CBRN defense has been deprioritized among NATO allies, including the United States. Amid calls for increased defense spending, CBRN defense capability development is an area primed for greater investment.

Recommendation: As concerns about potential deployment of Russian CBRN weapons grow, the US DoD should emphasize and prioritize efforts to expand counter-CBRN capabilities. Specific needs include sufficient systems to detect, surveil, and attribute CBRN threats. The United States could leverage the OPCW (and vice versa) for its experience in investigations. As the United States and its European allies and partners update guidelines for defense spending, CBRN defense warrants renewed attention and investment. The Office of the Secretary of Defense (OSD) should advocate for European counterparts to place greater emphasis on CBRN defense. The DoD and the relevant subagencies should emphasize these systems when outlining US defense policy and national security strategies as they pertain to CBRN threats. Such systems will aid in deterring Russian CBRN threats while expanding readiness, preparedness, and resilience within the United States and across the transatlantic community. Ministries of defense and crisis response agencies should set baselines for CBRN defense capabilities and stockpile accordingly, including PPE, gas masks, antibiotics, and laboratory equipment.

Recommendation: DTRA and the broader US defense community should expand training on CBRN threats by incorporating elements of chemical, biological, and nuclear warfare scenarios in tabletop exercises and war-games. Inclusion of these scenarios can complement crisis situations posited in Europe to identify deterrence strategies and response options. CBRN considerations are often perceived to be too niche and left to specialist communities to design strategy and crisis responses. However, it is critical for decision-makers within the entire chain of command to possess a broad awareness of CBRN threats and simulate planning. The Joint Staff should ensure that service-level training incorporates these considerations into doctrine and training. Then, DTRA’s liaison officers could support training at US military commands and within multilateral institutions, such as NATO.

Recommendation: The United States and its NATO allies should incorporate the NATO SOF Command more directly into operational planning, particularly when thinking through the requisite deterrence and response implications of Russia deploying a CBRN weapon. NATO’s Supreme Headquarters Allied Powers Europe (SHAPE) could help drive this coordination with support from the United States. Given the hybrid nature of many CBRN threats from Russia, within SHAPE and NATO Allied Command Operations (ACO), the United States and its NATO allies could consider a greater role for responding to hybrid threats alongside preexisting military structures. The US should expand CBRN defense cooperation, particularly on training, exercising, and information sharing. Elsewhere in Europe, allies recognized the leading role the United States plays (as well as the UK) in sharing intelligence with NATO; for allies with limited intelligence capabilities of their own, US information might be the only source of CBRN-related intelligence. Some allies expressed uncertainty over the prioritization of CBRN-related cooperation as a new administration begins its work in Washington, but at the individual level, cooperation remains close. NATO leaders should leverage productive working relationships to ensure sustained, coordinated prioritization for CBRN defense across all echelons of NATO planning.

Recommendation: As the need for additional CBRN defense capabilities and equipment grows, so too does the need to strengthen the private-sector capacity to supply the requisite functionalities. The US government should expand relationships with the defense industry and bolster production capacity to sustain supply chains and replenish depleted stockpiles of PPE. The DoD can also leverage lessons learned for production capacity and procurement protocols from the COVID-19 pandemic, when the Pentagon supported the production of PPE through the Defense Production Act to increase production of critical supplies and equipment. The DoD’s Office of the Under Secretary of Defense for Acquisition and Sustainment and the Defense Logistics Agency can both play an important role in facilitating these relationships while removing unnecessary barriers to procurement processes within the DoD. Similar efforts should be undertaken with European counterparts of these agencies and at NATO, though the implementation of this recommendation could require years of investment.

Finding: The United States should leverage NATO to facilitate greater coordination between civilian and military entities to enhance whole-of-society resilience to CBRN threats.

Recommendation: Demonstrating close cooperation between civilian and military entities can have a deterrent effect if communicated properly, while also ensuring military entities are aware of the resources that reside in civilian institutions. Key areas for investment include interoperability of CBRN defense equipment; standards and procedures for treating exposure to chemical or biological agents; availability of civilian infrastructure for military use; and protocols for military members seeking care in civilian hospitals. NATO is well poised to encourage cooperation between military forces and critical civilian institutions that are often on the front lines of such responses, including public health agencies, local hospitals, and law enforcement. European nations can leverage the examples of their peers to their advantage. In the United States, the DoD is well positioned to support interagency coordination among European allies and partners with respect to emergency preparedness mechanisms, capability development, and training. OSD should consider embedding highly skilled personnel within US military commands, diplomatic missions, and other frameworks to facilitate the exchange of information and expertise.

Recommendation: A whole-of-society approach to resilience—to include health institutions, law enforcement, critical infrastructure, business community, and other sectors—can help strengthen attribution systems for identifying and attributing chemical and biological attacks. The United States should coordinate with its European allies and partners to encourage greater resilience and preparedness within civilian institutions and foster information sharing across national borders.

Finding: Information and intelligence sharing is critical to achieving a common threat perception among NATO allies and partners. Expanded information sharing and effective strategic communications can deter Russian use of chemical or biological weapons and ensure a coordinated response if deterrence fails.

Recommendation: Preemptive and frequent intelligence sharing, in classified and open-source settings, is critical to deterring Russia from using CBRN weapons; this practice presents a unified approach among the United States and its European allies and partners. All allies should aim to more regularly share relevant information. The US national security apparatus should conduct a complete review of potential barriers to information and intelligence sharing to identify areas for streamlined sharing with NATO allies. The Defense Intelligence Agency could lead such an initiative on behalf of the DoD, with a focus on greater use of open-source intelligence to draw further public attention to Russia’s CBRN capabilities, facilities, and development. The United States should encourage similar reviews across NATO member states to improve Alliance-wide access to intelligence and information and ensure that this subject is a standing agenda item for the relevant NATO committees, including the Defense Policy and Planning Committee and the Civilian Intelligence Committee.

Recommendation: To support NATO’s 2022 CBRN Defense Strategy’s effort to improve shared understanding across the Alliance, more consistent and comprehensive messaging is needed within the capitals of NATO allies, particularly around the policy planning process and the integration of civilian entities within a coordinated military response in the event of a CBRN-related contingency. The US Mission to NATO can champion efforts to expand knowledge and understanding of Russian CBRN threats within NATO while sharing lessons learned from European allies and partners throughout the US government.

Finding: The United States and its European allies and partners should take steps to raise the public IQ related to CBRN threats, particularly as it pertains to chemical and biological threats.

Recommendation: The US Defense, State, and Homeland Security departments have produced public messaging campaigns related to Russian CBRN threats and methods to improve media literacy. These efforts should expand to include greater emphasis on debunking false and misleading claims related to CBRN threats. Additionally, the US government should incorporate European allies and partners in messaging efforts to counter Russian malign influence operations around CBRN threats.

Recommendation: The United States should work with European allies to identify best practices in crafting public awareness-raising campaigns for how to respond to suspected CBRN attacks. Public messaging should focus on practical steps individuals can take in an emergency, without prompting undue alarm among the wider population.

Recommendation: US and European governments should explore opportunities to partner with civil society organizations to craft prebunking, media literacy, and fact-checking initiatives that can successfully communicate proactive messaging to broader publics in the Euro-Atlantic area, particularly given the scientific and technical nature of CBRN threats. Proactive messages about resistance to Russian narratives should be disseminated through a combination of means, including traditional media, official government communications, and social media. The United States could also explore joint research initiatives with European institutions. EU member states can leverage the European Defense Fund, which provides research into common defense and security priorities, including in CBRN-related issues. Partnerships between universities, scientific foundations, and think tanks can facilitate greater knowledge and information sharing related to CBRN threats.

Finding: The governance of emerging and applied technologies is difficult within the bounds of existing treaty regimes. Sanctions and export controls can complement treaty organizations to monitor and contain potential CBRN threats from such technologies, including dual-use systems and components.

Recommendation: Technologies such as synthetic biology and additive manufacturing continue to evolve, and their applications will remain difficult to foresee. The international community must remain vigilant to how technologies can be exploited. To that end, the United States must continue and expand its restrictions for known suppliers of potential dual-use technologies to Russia. The DoD should coordinate with the Department of Commerce to expand the use of export controls to address instances where Russia is able to obtain capabilities and equipment, such as pharmaceutical components, biotechnologies, and chemical precursors. Critical to the success of these controls, however, is including like-minded European allies and partners into conversations about technologies of concern. The Department of Defense should work with the Department of Treasury’s Office of Foreign Assets Control to strengthen and expand the list of sanctioned entities that aid and abet Russia’s biological and chemical weapons development programs.

Conclusion

This project demonstrates that Russian chemical and biological threats are a concern now and will continue to pose challenges to European security in the next five to ten years. To enable European allies and partners to counter these threats, the United States can leverage its strong security and defense relationships with European allies and partners to improve capabilities and raise the profile of chemical and biological weapons issues within governments and among populations. The existing chemical and biological defense infrastructure in the United States, NATO, and in some European countries provides lessons for the broader Euro-Atlantic community. With greater investment comes greater confidence that deterring Russia is feasible, but if deterrence fails, attention now can ensure that the United States and Europe are prepared to effectively respond.

Please note that the appendixes are not included in the online version of this publication, but they can be accessed in the attached PDF file. The appendixes contain the following information: Appendix A – Acronym List; Appendix B – Workshop Participants; Appendix C – Exercise Methodology; Appendix D – Interview Participants; Appendix E – Biographies. These appendixes provide additional details and insights on the research methods and findings.


The research team thanks the US Department of Defense for sponsoring this work and for the guidance and support provided throughout the course of the project. Special thanks go to the wide range of experts and stakeholders, inside and outside of the US and European governments, who took part in the scenario-building exercises, contributed their perspectives during the interview process, spoke during roundtable discussions, and participated in other contexts to enrich the analysis.

We would also like to acknowledge Hans Binnendijk and John Watts for their support in conceptualizing the methodology and structure of the scenario workshop exercises. Hans and Katarzyna Zysk provided useful peer reviews to improve the quality of the report. In addition, we would like to thank Torrey Taussig and Matthew Kroenig, who offered strategic direction, peer review, and key perspectives throughout the project. Within the Atlantic Council’s Transatlantic Security Initiative team, we recognize our current and recent colleagues Inga Samoškaitė, Zak Schneider, Kristen Taylor, Kimberly Talley, and Luka Ignac for their project management and research support. We would also like to thank the Atlantic Council’s Gretchen Ehle, Nicholas O’Connell, and Caroline Simpson, whose support for this project was invaluable.

This report is intended to live up to General Brent Scowcroft’s standard for rigorous, relevant, and nonpartisan analysis on national security issues. The Atlantic Council’s Scowcroft Center for Strategy and Security works to continue his nonpartisan commitment to the cause of security, support for US leadership in cooperation with allies and partners, and dedication to the mentorship of the next generation of leaders.

The views expressed herein are those of the authors and do not necessarily reflect the official policy or position of the US Department of Defense or the United States Government.

About the authors

Related content

Explore the program

The Transatlantic Security Initiative aims to reinforce the strong and resilient transatlantic relationship that is prepared to deter and defend, succeed in strategic competition, and harness emerging capabilities to address future threats and opportunities.

1    Eugene Rumer and Richard Sokolsky, “Etched in Stone: Russian Strategic Culture and the Future of Transatlantic Security,” Carnegie Endowment for International Peace, September 2020, https://carnegieendowment.org/research/2020/09/etched-in-stone-russian-strategic-culture-and-the-future-of-transatlantic-security?lang=en
2    Robert Person and Michael McFaul, “What Putin Fears Most,” Journal of Democracy 33, no. 2 (2022): 18–27, https://www.journalofdemocracy.org/articles/what-putinfears-most/
3    Russia conceptualizes hybrid warfare—particularly in how it is deployed to subvert and undermine politics and security—much differently than the United States and Europe. See Seth G. Jones, “Russia’s Shadow War with the West,” Center for Strategic and International Studies, March 18, 2025, https://www.csis.org/analysis/russiasshadow-war-against-west
4    Russia has carried out attacks in London (2006), Sofia (2015), and Salisbury, United Kingdom (2018). See Mina Rozei, “US Accuses Russia of Chemical Weapons Use in Ukraine,” Arms Control Association, June 2024, https://www.armscontrol.org/act/2024-06/news/us-accuses-russia-chemical-weapons-use-ukraine; and “Novichok Nerve Agent Use in Salisbury: UK Government Response, March to April 2018,” UK Foreign & Commonwealth Office, Prime Minister’s Office, 10 Downing Street, Home Office, and Ministry of Defence, March 14, 2018, https://www.gov.uk/government/news/novichok-nerve-agent-use-in-salisbury-uk-government-response
5    “2023 Strategy for Countering Weapons of Mass Destruction,” US Department of Defense, Press Release, September 2023, https://www.defense.gov/News/Releases/Release/Article/3541619/dod-announces-release-of-2023-strategy-for-countering-weapons-of-mass-destructi/
6    See 2022 National Defense Strategy of the United States of America, US Department of Defense, 2022, https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.pdf; and US National Security Strategy, White House, October 2022, https://bidenwhitehouse.archives.gov/wpcontent/uploads/2022/10/Biden-Harris-Administrations-National-Security-Strategy-10.2022.pdf
7    Andrew Osborn and Andrey Ostroukh, “Putin Rues Soviet Collapse as Demise of Humanity,” Reuters, December 12, 2021, https://www.reuters.com/world/europe/putin-rues-soviet-collapse-demise-historical-russia-2021-12-12/
8    NATO’s 2022 Strategic Concept specifically mentions Russia will seek to exert power and control “through coercion, subversion, aggression and annexation” via conventional, cyber, and hybrid means. See “NATO 2022 Strategic Concept,” NATO, June 2022, https://www.nato.int/strategic-concept/
9    “NATO 2022 Strategic Concept,” NATO, June 2022, https://www.nato.int/strategic-concept/
10    Thom Shanker and Mark Landler, “Putin Says US Is Undermining Global Stability,” New York Times, February 11, 2007, https://www.nytimes.com/2007/02/11/world/europe/11munich.html
11    Ketevan Chincharadze and Larry P. Goodson, “The Enduring Impact of the 2008 Russia-Georgian War,” War Room, US Army War College, December 19, 2024, https://warroom.armywarcollege.edu/articles/enduring-impact/
12    “Hearing–Russia’s Shadow War on NATO,” US Commission on Security and Cooperation in Europe, September 24, 2024, https://www.csce.gov/press-releases/hearing-russias-shadow-war-on-nato/
13    For more, see “Spotlight on the Shadow War: Inside Russia’s Attacks on NATO Territory,” Commission on Security and Cooperation in Europe, US Helsinki Commission, December 12, 2024, https://www.csce.gov/publications/spotlight-on-the-shadow-war-inside-russias-attacks-on-nato-territory/; and Seth G. Jones, “Russia’s Shadow War with the West,” Center for Strategic and International Studies, March 18, 2025, https://www.csis.org/analysis/russias-shadow-war-against-west
14    For more information, see “Treaty on the Non-Proliferation of Nuclear Weapons (NPT),” United Nations, https://disarmament.unoda.org/wmd/nuclear/npt/; “Convention on the Prohibition of the Development, Production, and Stockpiling of Bacteriological (Biological) and Toxin Weapons and Their Destruction,” United Nations, https://treaties.unoda.org/t/bwc; “Chemical Weapons Convention,” Organization for the Prohibition of Chemical Weapons, https://www.opcw.org/chemical-weapons-convention; and Mathias Hammer, “The Collapse of Global Arms Control,” Time, November 13, 2023, https://time.com/6334258/putin-nuclear-arms-control/
15    Russia carried out CBRN-based attempted assassinations in the UK in 2006 and 2018 and is suspected of the 2015 assassination attempt against a Bulgarian arms dealer, Emilian Gebrev. See “Russia Behind Litvinenko Murder, Rules European Rights Court,” BBC, September 21, 2021, https://www.bbc.com/news/world-58637572; “Statement by the North Atlantic Council on the Use of a Nerve Agent in Salisbury,” NATO, March 14, 2018, https://www.nato.int/cps/en/natohq/news_152787.htm; and Krassen Nikolov, “Bulgaria Seeks Extradition of Three Spies from Russia in Novichok Case,” Euractiv, November 21, 2023, https://www.euractiv.com/section/politics/news/bulgaria-seeks-extradition-of-three-spies-from-russia-in-novichok-case/
16    See “OPCW Finds Toxic Chemical Use in Ukraine,” Arms Control Association, December 2024, https://www.armscontrol.org/act/2024-12/news-briefs/opcw-findstoxic-chemical-use-ukraine; and Kenneth D. Ward, “Syria, Russia, and the Global Chemical Weapons Crisis,” Arms Control Association, September 2021, https://www.armscontrol.org/act/2021-09/features/syria-russia-and-global-chemical-weapons-crisis
17    One subject matter expert interviewed for the project noted that “some of [Russia’s strategic motivation] is about showing reach into Western Europe and that they can get to us. Some of it is a fear element for dissident populations, and to show that we have a range of stuff that you might not know about and we’re not afraid to use it.”
18    “Putin’s Poisons: 2020 Attack on Aleksey Navalny,” US Embassy in Georgia, April 18, 2022, https://ge.usembassy.gov/putins-poisons-2020-attack-on-aleksey-navalny/
19    Michael J. Kelley, “Understanding Russian Disinformation and How the Joint Force Can Address It,” US Army War College, May 29, 2024, https://publications.armywarcollege.edu/News/Display/Article/3789933/understanding-russian-disinformation-and-how-the-joint-force-can-address-it/
20    For more, see Olha Polishchuk and Nichita Gurcov, “Bombing into Submission: Russian Targeting of Civilians and Infrastructure in Ukraine,” Armed Conflict Location and Event Data, February 21, 2025, https://acleddata.com/2025/02/21/bombing-into-submission-russian-targeting-of-civilians-and-infrastructure-in-ukraine/; “Litvinenko: Images of Radiation Trail Revealed,” SkyNews, January 27, 2015, https://news.sky.com/story/litvinenko-images-of-radiation-trail-revealed-10373703; and Alexey Kovalev, “Putin Is Throwing Human Waves at Ukraine but Can’t Do It Forever,” Foreign Policy, November 25, 2024, https://foreignpolicy.com/2024/11/25/russia-ukrainewar-casualties-deaths-losses-soldiers-killed-meatgrinder-attacks/
21    Gert G. Harigel, “Chemical and Biological Weapons: Use in Warfare, Impact on Society and Environment,” Carnegie Endowment for International Peace, January 18, 2001, https://carnegieendowment.org/research/2001/01/introduction-to-chemical-and-biological-weapons
22    Major General Robert D. Orton and Major Robert C. Neumann, “The Impact of Weapons of Mass Destruction on Battlefield Operations,” Army University Press: Military Review, December 1993, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/January-February-2022/Orton-Impact-WMD-1993/
23    From the Russian doctrine: “The Russian Federation reserves the right to use nuclear weapons in response to the use of nuclear and other types of weapons of mass destruction against it and (or) its allies, as well as in response to large-scale aggression utilizing conventional weapons in situations critical to the national security of the Russian Federation.” (italics added for emphasis). See George Allison, “NATO Outmatches Russia in ‘Every Domain Except Nuclear,’” UK Defense Journal, December 6, 2024, https://ukdefencejournal.org.uk/nato-outmatches-russia-in-every-domain-except-nuclear/
24    Escalation can be defined as “an increase in the intensity or scope of conflict that crosses threshold(s) considered significant by one or more of the participants. For more, see “Russia’s Military Doctrine,” Arms Control Association, May 2005, https://www.armscontrol.org/act/2000-05/russias-military-doctrine
25    Forrest E. Morgan et al., “The Nature of Escalation,” in Dangerous Thresholds: Managing Escalation in the 21st Century (Santa Monica, CA: RAND Corporation, 2008), 7–46, https://www.jstor.org/stable/10.7249/mg614af.9
26    Jim Sciutto, “Exclusive: US Prepared ‘Rigorously’ for Potential Russian Nuclear Strike in Ukraine in Late 2022, Officials Say,” CNN, March 9, 2024, https://www.cnn.com/2024/03/09/politics/us-prepared-rigorously-potential-russian-nuclear-strike-ukraine/index.html
27    Natasha Hall and Doreen Horschig, “Reviving Chemical Weapons Accountability in a Multipolar World,” Center for Strategic and International Studies, November 21, 2024, https://www.csis.org/analysis/reviving-chemical-weapons-accountability-multipolar-world
28    There is wide body of literature on deterrence, including varying definitions of types of deterrence. We use Michael J. Mazarr’s definitions of deterrence by punishment. Deterrence by punishment involves the threat of “severe penalties, such as nuclear escalation or severe economic sanctions if an attack occurs.” For more, see Michael J. Mazarr, “Understanding Deterrence,” RAND Corporation, 2018, https://www.rand.org/pubs/perspectives/PE295.html
29    Similarly, the concept of extended deterrence includes the discouragement of the use of nuclear weapons against an ally or partner nation of the United States from an adversary in which the threat of retaliation from the United States extends protection. The United States and the United Kingdom provide extended deterrence for NATO allies. It is important to note that France, another NATO ally and nuclear-capable state, does not contribute to NATO’s nuclear defense. See Mazarr, “Understanding Deterrence.”
30    Such exercises include the 2022 Toxic Valley training led by Slovakia and the 2024 Coronat Mask training led by the Czech Republic. See “International Exercise of Chemical Units CORONAT MASK 2024 Will Take Place Again After Years,” CZ Defence, May 18, 2024, https://www.czdefence.com/article/international-exercise-of-chemical-units-coronat-mask-2024-will-take-place-again-after-years
31    A whole-of-society approach includes integrating the “full range of military and civilian capabilities” with cooperation from government, civil society, and private sector stakeholders. For more, see “Resilience, Civil Preparedness, and Article 3,” NATO, November 13, 2024, https://www.nato.int/cps/en/natohq/topics_132722.htm
32    The Kremlin has a long history of accusing the United States and European nations of biological weapons development and nuclear expansion as cover for its own activities. See Sarah Jacobs Gamberini and Justin Anderson, “Russian and Other (Dis)Information Undermining WMD Arms Control: Considerations for NATO,” NATO Committee on Proliferation, Speech presented to the NATO Committee on Proliferation, July 12, 2022, https://wmdcenter.ndu.edu/Publications/Article/3768119/presentation-russian-and-other-disinformation-undermining-wmd-arms-control-cons/
33    Demetri Sevastopulo, “Antony Blinken: ‘China has Been Trying to Have It Both Ways,’” Financial Times, January 3, 2025, https://www.ft.com/content/25798b9f-1ad9-4f7f-ab9e-d6f36bbe3edf
34    Patricia M. Kim et al., “China and Russia’s Strategic Relationship amid a Shifting Geopolitical Landscape,” Brookings Institution, March 6, 2025, https://www.brookings.edu/articles/china-and-russias-strategic-relationship-amid-a-shifting-geopolitical-landscape/
35    “EU-NATO Cooperation,” European External Action Service, March 26, 2022, https://www.eeas.europa.eu/eeas/eu-nato-cooperation-0_en
36    For more, see NATO’s CBRN defense policy: “NATO’s Chemical, Biological, Radiological and Nuclear (CBRN) Defence Policy,” NATO, last updated July 5, 2022, https://www.nato.int/cps/en/natohq/official_texts_197768.htm
37    For more, see “CBRNE Strategy 2024,” Ministry of Defense of the Republic of Finland, December 11, 2024, https://julkaisut.valtioneuvosto.fi/handle/10024/165973; “2023 Strategy for Countering Weapons of Mass Destruction,” US Department of Defense, September 2023, https://www.defense.gov/News/Releases/Release/Article/3541619/dod-announces-release-of-2023-strategy-for-countering-weapons-of-mass-destructi/; “Allied Joint Doctrine for Countering Weapons of Mass Destruction in Military Operations (AJP-3.23),” Ministry of Defense of the United Kingdom, September 28, 2023, https://www.gov.uk/government/publications/allied-joint-doctrine-for-countering-weapons-of-mass-destruction-in-military-operations-ajp-323; and “NATO’s Chemical, Biological, Radiological and Nuclear (CBRN) Defence Policy,” NATO.
38    “Multinational Capability Cooperation,” NATO, March 3, 2025, https://www.nato.int/cps/en/natohq/topics_163289.htm
40    “UKHSA Launches Campaign to Tackle Misconceptions on Antibiotics,” UK Health Security Agency, April 7, 2025, https://www.gov.uk/government/news/ukhsa-launches-campaign-to-tackle-misconceptions-on-antibiotics

The post How the US and Europe can deter and respond to Russia’s chemical, biological, and nuclear threats appeared first on Atlantic Council.

]]>
Responsible stewardship models can transform Africa’s mineral wealth into prosperity https://www.atlanticcouncil.org/in-depth-research-reports/report/responsible-stewardship-models-can-transform-africas-mineral-wealth-into-prosperity/ Tue, 14 Oct 2025 15:00:00 +0000 https://www.atlanticcouncil.org/?p=880720 As investors race to secure access to Africa’s supplies of critical minerals, African nations should invest some of the proceeds in sovereign wealth funds that can manage mineral revenue transparently, protect African economies from price volatility, and secure the benefits of finite resources in a sustainable way.

The post Responsible stewardship models can transform Africa’s mineral wealth into prosperity appeared first on Atlantic Council.

]]>

Bottom lines up front

  • As the global race for minerals critical to green energy tech heats up, African nations should manage their mineral revenues with sovereign wealth funds applying best practices from funds like Norway’s and Saudi Arabia’s.
  • Well-structured, credible sovereign wealth funds would lower risk, attract liquid capital markets, and facilitate strategic alliances for African nations.
  • By aligning resource wealth management with domestic industrial policy, African countries can move beyond extraction and play a greater role in global supply chains.

Current production of critical minerals is largely insufficient to keep up with rapidly growing global demand for cobalt, nickel, manganese, and other minerals that are essential for new green technologies.

Africa has a significant opportunity to capitalize on the large-scale investments currently unfolding in the global mining sector: Roughly one-third of the world’s metal reserves including copper, cobalt, lithium, and manganese are found there. If the continent can move beyond extraction to maximize value through refining, it has the potential to become a major global hub for the mining industry.

However, the extreme volatility of natural resource revenues leaves African economies vulnerable to external shocks from fluctuating commodity prices, which can lead to substantial economic downturns. Additionally, the capacity limitations and operational bottlenecks within African governments often hinder the effective conversion of resource revenues into productive investments and long-term benefits. Given that minerals are inherently finite resources, there is a risk of declining trade balances as the surge in mineral earnings may be offset by increased imports of goods and services. Concurrently, other sectors of the economy may experience a decline in exports, particularly those disrupted by the rapid expansion of the critical minerals sector, potentially leading to the phenomenon known as “Dutch disease.”

To mitigate these risks, many mineral-rich nations have established sovereign wealth funds as tools for fiscal and financial planning, supporting both short- and long-term policy objectives. The primary purpose of these funds is to manage mineral revenues transparently and sustainably, protecting domestic economies from the volatility of strategic mineral and petroleum revenues while promoting long-term economic stability. Industrialized and developing nations alike have adopted sovereign wealth funds as a mechanism to stabilize government spending, shield against inflationary shocks, and serve as an intergenerational savings tool for finite resources.

In the African context, effective management of natural resource revenues presents a unique opportunity to drive long-term economic development. By adopting best practices, these revenues can be leveraged to invest in human and physical capital, build economic buffers to weather external shocks, and create lasting financial reserves. Transforming mineral resources into financial or physical assets can benefit citizens and foster broad-based economic and social development.

Read the full report

About the author

Mamadou Fall Kane is a nonresident senior fellow at the Atlantic Council’s Africa Center. He also is the deputy secretary of Senegal’s Strategic Orientation Committee for Oil and Gas, a committee created by the president to strengthen the management of natural resources following Senegal’s accession to the Extractive Industries Transparency Initiatives. He was energy advisor to the Senegalese president from 2016 to 2024. He graduated from Sciences Po Paris before completing his education at the Ecole Polytechnique of Paris in economics and public policy. He also holds an executive master’s degree in management and finance in innovation from the University of California, Berkeley.

Related content

Explore the program

The Africa Center works to promote dynamic geopolitical partnerships with African states and to redirect US and European policy priorities toward strengthening security and bolstering economic growth and prosperity on the continent.

The post Responsible stewardship models can transform Africa’s mineral wealth into prosperity appeared first on Atlantic Council.

]]>
The imperative for hypersonic strike weapons and counterhypersonic defenses https://www.atlanticcouncil.org/in-depth-research-reports/report/the-imperative-for-hypersonic-strike-weapons/ Thu, 09 Oct 2025 18:15:00 +0000 https://www.atlanticcouncil.org/?p=879422 A new report based on dozens of discussions with defense policymakers and industry representatives takes stock of how the United States military should handle the challenge posed by missiles capable of flying more than five times the speed of sound.

The post The imperative for hypersonic strike weapons and counterhypersonic defenses appeared first on Atlantic Council.

]]>

Table of contents

Final report of the Hypersonic Capabilities Task Force

Lead author: Michael E. White

Co-chairs: Deborah Lee James and Ryan McCarthy

Task force director: Stephen Rodriguez
Program director: Clementine G. Starling-Daniels*
Task force staff: Mark J. Massa and Jonathan Rosenstein



* Starling-Daniels’s contributions were completed prior to her departure from a fulltime role at the Atlantic Council in September 2025.

Task force members

Deborah Lee James, board director, Atlantic Council; twenty-third secretary of the Air Force; co-chair of the Hypersonic Capabilities Task Force, Atlantic Council

Ryan McCarthy, twenty-fourth secretary of the Army; co-chair of the Hypersonic Capabilities Task Force, Atlantic Council

Jim Cooper, former US representative (D-TN-05); former chairman, Strategic Forces Subcommittee, House Armed Services Committee

Madelyn Creedon, former assistant secretary of defense for global strategic affairs, US Department of Defense

Doug Lamborn, former US representative (R-CO-05); former chairman, Strategic Forces Subcommittee, House Armed Services Committee

James McConville, general (ret.), US Army; fortieth chief of staff, US Army

Whitney McNamara, senior vice president, Beacon Global Strategies; nonresident senior fellow, Forward Defense, Scowcroft Center for Strategy and Security, Atlantic Council

Industry task force members

Felipe Gomez del Campo, CEO, Specter Aerospace

Mick Maher, chief strategy and commercial officer, Amaero

Katrina “Kat” Hornstein, director, vehicle systems, Ursa Major

Michael Johns, senior vice president, Kratos

Mike Manazir, vice president, federal, Hadrian

Mark Rettig, vice president and general manager, Edison Works, GE Aerospace

Ralph Sandfry, director, advanced capabilities, Lockheed Martin

Zach Shore, chief revenue officer, Hermeus

Brian Zimmerman, senior vice president, global defense, Booz Allen Hamilton

Advisors

Reginald Brothers, former under secretary for science and technology, US Department of Homeland Security

Justin Johnson, former senior official performing the duties of the assistant secretary of defense for space policy


Lead author and methodology

Michael E. White was the inaugural principal director for hypersonics in the Office of the Under Secretary of Defense for Research and Engineering, serving from October 2018 to June 2023. In that capacity, White was responsible for leading the Pentagon’s vision and strategy for developing offensive and defensive warfighting capability enabled by hypersonic systems. White previously served as the head of the air and missile defense sector at the Johns Hopkins University Applied Physics Laboratory (JHU/APL). White is a board director of North Wind USA Inc., which provides research, development, test, and evaluation products and services in aerospace and defense, and of Textum, which produces advanced textiles and aerospace composites. As managing member of WhiteAero, LLC, he is a senior defense consultant for hypersonic, air, and missile defense systems and tactical and strategic strike systems. WhiteAero’s clients include Lockheed Martin and GE Aerospace, which are both supporters of the Hypersonic Capabilities Task Force and producers of hypersonic capabilities, as well as Stratolaunch, X-Bow Systems, Cerberus Capital Management, Karman Space and Defense, Textum, MIT Lincoln Laboratory, JHU/APL, ACMI, and Riverside Research, all of which are involved in hypersonic capabilities.

As part of the research process for this report, the lead author conducted several dozen interviews and consultations with members of the Atlantic Council’s Hypersonic Capabilities Task Force, current and former officials in the US Department of Defense, congressional staff members, and industry representatives. The full task force convened several times over the course of the project to develop the findings reflected in this report, but the report’s analysis and recommendations do not necessarily reflect the views of all individuals consulted. This effort was conducted under the leadership of task force director Stephen Rodriguez, former Forward Defense director Clementine G. Starling-Daniels, deputy director Mark J. Massa, and program assistant Jonathan Rosenstein.

This effort has been made possible through the support of Amaero, Booz Allen Hamilton, GE Aerospace, Hadrian, Hermeus, Kratos, Lockheed Martin, Nominal, RTX, Specter Aerospace, and Ursa Major.

The Atlantic Council maintains strict intellectual independence for all of its projects and publications. The Council requires all donors to agree to the Council maintaining independent control of the content and conclusions of any products resulting from sponsored projects.


Foreword

The United States stands at a critical juncture. The strategic environment is defined by the return of great power competition and the rapid proliferation of advanced military technologies that challenge long-held US advantages. China and Russia have invested heavily in systems designed to deny US forces access to key theaters and to strike their forward-deployed assets and allies with unprecedented speed.

The fielding of hundreds of hypersonic weapons by US adversaries represents a paradigm shift in modern warfare, creating a battlefield asymmetry that the United States cannot afford to ignore. This challenge demands more than incremental improvements to the existing force; it requires a fundamental rethinking of the US strategy for deterrence and defense. During our time leading the US Air Force and US Army, we saw good progress against these objectives, but there is much more to be done.

That is why we have served as co-chairs of the Atlantic Council’s Hypersonic Capabilities Task Force. In its final report, the task force puts forth a clear-eyed assessment of this challenge and offers a comprehensive road map for action. The concept of integrated comprehensive layered defeat provides the strategic framework, and the imperative to field offensive hypersonic capabilities provides the critical tool. The recommendations outlined herein are actionable, urgent, and essential to ensuring the United States can meet the demands of this new era. Now is the time to act decisively to close the hypersonic gap and defend the nation’s interests for the future.

The Hon. Deborah Lee James
Twenty-third secretary of the US Air Force;
Co-chair,
Hypersonic Capabilities Task Force

The Hon. Ryan McCarthy
Twenty-fourth secretary of the US Army;
Co-chair, Hypersonic Capabilities Task Force


Executive summary

Potential US adversaries such as China and Russia are creating an increasingly contested anti-access/area-denial (A2/AD) environment, posing a severe challenge to US battlefield dominance on land, at sea, in the air, and in space. It is imperative that the United States develop and field hypersonic strike weapons, in substantial numbers, as part of an integrated comprehensive layered defeat strategy that delivers left- and right-of-launch defeat of each adversary A2/AD capability through integrated kinetic and nonkinetic effects to defeat vulnerable kill-chain elements of the adversary’s warfighting capability. Hypersonic strike systems enable delivery of timely, survivable, lethal effects from outside of an adversary’s defensive perimeter in a timescale of relevance and are essential to ensuring future US warfighting preeminence on a highly contested battlefield. It is also imperative that the United States aggressively pursue defense against adversary hypersonic strike systems to combat the growing number of such systems being fielded.

To address these hypersonic imperatives, it is essential that the US Department of Defense pursue and Congress fund: robust acquisition of the current generation of hypersonic weapons and counter-hypersonic interceptors; block upgrades to these systems to field advanced capability and significantly improve affordability; accelerated development of next-generation systems to achieve affordable capacity; technology maturation to increase capability and affordability for hypersonic strike weapons, hypersonic interceptors, and future reusable hypersonic aircraft; critical workforce initiatives; expansion of the nation’s test infrastructure and modeling and simulation capabilities to accelerate advanced concept development; robust long-range kill webs to allow for effective employment of hypersonic capabilities; and cooperation with allies and partners to coproduce these weapons and interceptors and integrate them into whole-of-alliance defense strategies and plans.

Beyond closing the immediate missile gap, this report also recommends a dedicated effort to mature reusable hypersonic aircraft. These systems offer a transformational capability for persistent intelligence, surveillance, and reconnaissance (ISR) and responsive strike missions in highly contested environments, ensuring enduring US leadership in the next generation of warfare.

The hypersonic imperative

Any future US battle against a great power rival, and particularly against the People’s Republic of China (PRC) in the Indo-Pacific theater and the Russian Federation in the European theater, will be fought in a highly contested environment where US battlefield dominance will be challenged in each of the warfighting domains: land, air, sea, and space. This challenge will come in the form of the A2/AD warfighting-capability areas described below:

  1. Large numbers of high-speed strike systems, such as ballistic missiles, supersonic missiles, and hypersonic missiles, along with many more conventional subsonic uncrewed aerial vehicles and cruise missiles. These threats will place at risk US, allied, and partner forward land bases and carrier-based sea bases.
  2. Increasingly sophisticated air and missile defense systems designed to prohibit penetration of US strike aircraft and defeat traditional strike weapons.
  3. Terrestrial and spaced-based antisatellite systems that will challenge the space-based elements of US and allied ISR capabilities and the space portions of US kill chains.
  4. Fifth-generation fighters armed with air-to-air missiles with very long ranges that will challenge US air superiority.
  5. Land, maritime, and air-launched antiship and antisubmarine capabilities that will challenge US maritime dominance.
  6. Nonkinetic disrupters, including laser and high-powered microwave systems, cyberattack capabilities, and electromagnetic (EM) spectrum jamming and spoofing, which will challenge all elements of the US offensive and defensive capability suite.1

These systems create what is oftentimes referred to as an anti-access/area-denial (A2/AD) strategy that proliferates and integrates these high-end systems, at extended range, in a way that is designed to defeat traditional US warfighting capability, including traditional strike weapon systems. (See figures 1 and 2.)

Figure 1: Notional depiction of Russian A2/AD strategy in the European theater
Figure 2: Notional depiction of Chinese A2/AD strategy in the Pacific theater

Defining the challenge

The combination of adversary offensive and defensive capabilities described above create a highly contested environment that has the potential to severely degrade the US ability to maintain battlefield dominance. Addressing these challenges requires an integrated comprehensive layered defeat (ICLD) strategy. (See figure 3.)

Figure 3: Example system elements for ICLD capability to fight within a timescale of relevance

ICLD involves breaking the needed US capability space into four quadrants that include left- and right-of-launch defeat (i.e., before and after launch) of each adversary A2/AD capability, and aggressive use of kinetic and nonkinetic defeat mechanisms (in both phases) to attack and disable vulnerable elements of each respective kill chain. Effective integration of the ICLD warfighting capability requires a dedicated battle management system working to optimize employment across all four capability elements. High-priority targets should be identified based on the specific strategy and mission plan being employed. This strategy should be applied to each element of the adversary’s A2/AD environment.

Take, for example, the mission to defeat the adversary’s strike missile capability described in the A2/AD capability area above. The missile defense modality that gets the most attention is kinetic intercept of an incoming missile by a missile defense system, such as the Terminal High-Altitude Area Defense (THAAD), Patriot, and Aegis ballistic missile defense (BMD) for theater defense, or the Ground-based Midcourse Defense (GMD) system, with the Ground-Based Interceptor (GBI) or eventually the Next-Generation Interceptor (NGI), for defeating nuclear-armed intercontinental ballistic missiles.2 These systems consist of an integrated network of sensors, command-and-control elements, and interceptors required to perform the detect, control, and engage functions necessary to defeat incoming missiles. While US kinetic, postlaunch missile defeat capability is significant and necessary, it is not sufficient, due to challenges associated with overwhelming numbers, sophisticated tactics, and advanced threats such as hypersonic missiles. These challenges can reduce the effectiveness of each element of the defensive fire-control loop and make defense against a capable adversary very challenging, at best. It therefore becomes essential that the other three elements of the ICLD construct, namely, right-of-launch nonkinetic defeat mechanisms and left-of-launch kinetic and nonkinetic defeat mechanisms, be brought to the fight and integrated to ensure maximum probability of an effective defense. This necessity applies across all six of the A2/AD target areas described above.

While integrated employment of kinetic and nonkinetic options will maximize the effectiveness of postlaunch missile defense systems, a capable and determined adversary can overwhelm a defensive system with numbers and tactics. Therefore, maximum effort must be applied to defeating adversary capability before launch. In other words, an effective defense requires a good offense to deny and degrade the adversary’s ability to employ its A2/AD-enabling systems.

For left-of-launch nonkinetic attack, the objectives are to degrade and/or disable foundational elements of the adversary’s prelaunch kill chain. These include degrading the adversary’s ability to detect and geolocate US targets and to communicate that targeting information to its respective launch assets to help prevent launch. Additionally, attacks on the adversary command-and-control infrastructure would also be an effective means of prelaunch nonkinetic attack.

Even with the other three elements of the ICLD construct, left-of-launch kinetic strike remains an essential component of an effective ICLD construct by enabling the prelaunch physical destruction of required system elements, thereby limiting the number of threats that must be defeated after launch. While the United States has traditionally used subsonic strike capabilities on a battlefield where the timescale of relevance is measured in hours and days, the effectiveness of these systems is severely degraded by today’s peer adversaries that can deploy both high-speed systems to dramatically compress the battlefield timescale and high-end defensive systems to create a highly contested airspace out to an increasingly long range. On such a battlefield, traditional US long-range strike capabilities are simply insufficient to adequately perform the kinetic strike element of ICLD to achieve left-of-launch defeat of time-critical elements of adversary A2/AD capabilities, due to insufficient speed of action at meaningful range and poor survivability. This deficiency greatly jeopardizes the US ability to achieve and maintain battlefield dominance, creating the imperative to field hypersonic strike weapons in meaningful numbers. Once fielded, hypersonic weapons will better enable and then complement more traditional strike capabilities, providing a significant force multiplier.

To fully appreciate the growing asymmetry and the imperative to accelerate the fielding of US hypersonic systems, it is important to understand some of the key challenges and assess the relative status of US hypersonic capability versus China and Russia.

Addressing the challenge

Hypersonic strike systems provide a unique combination of range, speed, survivability, and maneuverability to deliver lethal kinetic effects to defeat a wide range of critical targets in a highly contested environment and within a battlefield timescale of relevance. An aggressive transition to, and fielding of, hypersonic strike capabilities in meaningful numbers is essential to enable US forces to fight in the increasingly compressed timescale being dictated by adversaries’ fielding of high-speed strike systems. The importance of being able to eliminate such an asymmetry between the United States and China was highlighted by then-nominee for Secretary of Defense Pete Hegseth when he stated that the Chinese People’s Liberation Army Rocket Forces can launch a strike from the Chinese mainland on US carriers located in the Pacific theater within twenty minutes.3 This statement reflects the fact that China has fielded a large number of medium- and intermediate-range ballistic and hypersonic glide weapons designed to carry out high-speed attacks of US and allied forward land and sea bases in the first and second island chain. In both China and Russia, traditional intercontinental nuclear ballistic missiles are being augmented by hypersonic systems being developed, and in some cases fielded, that place the US homeland more at risk. The adversary’s fielding of these weapons dramatically compresses the timescale of any future battle and creates uncertainty that may affect US decision calculus. Without the US fielding of similarly capable systems, a dangerous asymmetry will persist that will dramatically affect the United States’ deterrence posture. This battlefield asymmetry must be addressed with a dedicated and accelerated effort to field US hypersonic strike capabilities to enable success on the tactical battlefield, enhance the effectiveness of the US nuclear deterrent, and provide another rung on the escalation ladder prior to the use of nuclear weapons.

The target sets that define the needed hypersonic strike capabilities for this essential capability include key terrestrial elements of the adversary A2/AD capability areas (described above) such as: the long-range, high-speed strike systems that threaten US forward land, sea, and air bases; integrated air and missile defense launch complexes; terrestrial sites that support adversary kill chains (specifically, command, control, communications, cyber, intelligence, surveillance, reconnaissance, and targeting [C4ISR&T] nodes); terrestrial components of adversary anti-space capabilities; and other high-value, time-critical, and heavily defended targets. The number of targets that will require hypersonic strike missile allocation early in a war is significant, making it imperative to not only develop survivable, long-range hypersonic strike capabilities, but also to field that capability in significant numbers. This translates into the need to create and fund a family of affordable hypersonic systems supported by a robust and properly incentivized industrial base to deliver affordable hypersonic capacity.

Adversary hypersonic strike capability

The current gap in high-speed and hypersonic capability is significant and growing rapidly. Russia and China have both aggressively developed and fielded hypersonic strike capabilities. Russia has fielded the Kinzhal air-launched ballistic missile that has been used against Ukraine. Moscow also has fielded the Tsirkon ship-launched hypersonic strike missile and a new intermediate-range, multiple independent reentry vehicle-equipped ballistic missile with a conventional warhead, also used in Ukraine. Perhaps most notably, Russia has fielded the Avangard intercontinental missile with a hypersonic glide vehicle carrying a nuclear warhead that threatens the US homeland.4

The 3M22 Tsirkon missile. (Russian Ministry of Defense)
The Avangard. (Russian Ministry of Defense)
The Kh-47M2 Kinzhal. (kremlin.ru)

China has fielded numerous short-, medium-, and intermediate-range high-speed strike systems including ballistic missiles, ballistic missiles with maneuvering reentry vehicles, and hypersonic glide vehicles that can target US and allied land bases in the first and second island chains as well as US aircraft carrier sea bases at extended range. These systems include, among others, the DF-17, the DF-21 family of missiles, and the DF-26 family of missiles. The recent PRC military parade displayed supersonic and hypersonic cruise missiles. Additionally, Beijing has demonstrated and is on the path to fielding global-range strike systems, as shown by the PRC’s nuclear modernization efforts coupled with a fractional orbital system that was flight tested in 2021.5

The DF-26. (Wikimedia)
The DF-21D anti-ship ballistic missile. (Wikimedia)
The DF-17 Intermediate Range Hypersonic Glide Weapon. (Wikimedia)

Russia and China have fielded many hundreds of high-speed strike systems that today pose a dramatic threat to forward land and sea bases as well as to the US homeland. Beyond Russia and China, there have also been numerous media reports that indicate the likely development and deployment of hypersonic systems in North Korea and Iran, among others.6 The asymmetry created by the tactical employment of these systems by nonpeer adversaries is likely not as much of a critical issue given their lack of other key capabilities across the battlefield landscape, but they still pose a clear and present threat to US forward presence and to US allies—and the potential for future nuclear versions could be catastrophic.

US hypersonic capability

The United States, which for years had a lead in research related to hypersonic technologies, has been late in recognizing and embracing the military significance of hypersonic systems, which coupled with rapid advancements by US adversaries has created an asymmetry that is growing and that has the potential to jeopardize future US and allied deterrence and battlefield dominance. With an eye toward addressing that asymmetry, there has been good progress in the United States over the past seven years or so relative to developing a family of first-generation hypersonic strike systems for air, land, and sea launch.7 However, it is important to note that these systems are just now getting to the point of being ready for fielding.

The AGM-183A Air-launched Rapid Response Weapon Instrumented Measurement Vehicle 2. (Giancarlo Casem for the US Air Force)
Long Range Hypersonic Weapon Transporter Erector Launchers. (Ryan DeBooy/David Kim for the US Army)
A Hypersonic Attack Cruise Missile. (Lindsey Iniguez for the US Air Force)

The Army and Navy have worked to develop a common hypersonic missile that can deliver a hypersonic glide body with a conventional warhead that will be able to strike critical targets that are on the order of 1,700 miles downrange in a matter of minutes. That capability is now ready for fielding by the Army as the Long-Range Hypersonic Weapon (LRHW), aka Dark Eagle. The plan is for that same missile to be fielded as the Navy’s Conventional Prompt Strike (CPS) weapon on Zumwalt-class destroyers and then on Virginia-class submarines.8

The Air Force developed a long-range strike system called the Air-Launched Rapid Response Weapon (ARRW), based on the joint Defense Advanced Research Projects Agency and Air Force Tactical Boost Glide program. The integrated ARRW weapon system capability was demonstrated in a successful flight demonstration program that culminated in 2024.9 That system delivers survivable, lethal effects many hundreds of miles downrange in minutes. The Air Force completed development of ARRW in 2024 but decided not to field ARRW when it was ready. The new administration has included funding for ARRW procurement and fielding in President Donald Trump’s Fiscal Year 2026 budget request.

The Air Force has continued to allocate funding to develop an air-launched Hypersonic Attack Cruise Missile (HACM) capability.10 Air-launched, lower-cost hypersonic cruise missiles are an important element of the hypersonic strike portfolio because they are more affordable, smaller, and can be fielded in significant numbers on a wide variety of aircraft.

In addition to the significant progress being made in US development efforts for this family of first-generation strike weapons, there are numerous other key efforts of note. There has been significant additional funding allocated to the Test Resources Management Center (TRMC) in the Office of the Secretary of Defense (OSD) to bolster and energize the nation’s hypersonic test and evaluation enterprise and enhance capability and throughput for ground and flight test.11 There also has been additional OSD funding allocated to bolster the hypersonic industrial base, with presidential determinations signed for munitions, high-temperature materials, propulsion, and guidance and navigation.12 The Joint Hypersonic Transition Office (JHTO) is making investments in the University Consortium for Applied Hypersonics to help prepare the next-generation workforce and is accelerating the transition of advanced technologies.13 There has also been significant private capital funding allocated to establish a cadre of small companies to augment the traditional defense industrial base addressing some of the key hypersonic challenges, such as enabling a much more rapid flight test cadence to accelerate learning and development.

With all that said, the United States continues to face a growing battlefield asymmetry in hypersonic and high-speed weapon systems that jeopardizes US deterrence effectiveness and threatens to degrade or eliminate US battlefield dominance in all warfighting domains. The United States must move more aggressively to close the gap in fielding hypersonic weapon capabilities to ensure that such an asymmetry does not stand.

Meeting the imperative

The gap in high-speed and hypersonic systems has resulted in major implications for the US ability to deter and, if necessary, prevail on the battlefield. The capability gap is magnified by the aggressive deployment of the broader A2/AD strategy discussed earlier and the highly contested warfighting environment being established by US adversaries across all warfighting domains. It is imperative that the gap between the hypersonic capability needed to defeat critical adversary A2/AD capability and the current US trajectory for fielding offensive and defensive systems be aggressively closed. Addressing this imperative is essential to ensuring that the United States can operate in a battlefield timescale of relevancewhile also addressing the highly contested environment that has been created across all battlefield domains. Fielding hypersonic strike systems in significant numbers is essential to enabling defeat of the rapidly increasing set of heavily defended, time-critical targets that simply cannot be addressed with the US military’s legacy set of subsonic strike weapons.

It is important to appreciate that the imperative to field hypersonic strike capability does not replace the need for more traditional US weapons. Quite to the contrary, hypersonic weapons are essential to enabling the United States and its allies to fully leverage their traditional capabilities by defeating high-end adversary systems early in a conflict and “decontesting” the battlefield environment. Therefore, the near-term gap that exists and continues to grow is in the ability to field the number and types of weapons necessary to defeat the heavily defended, time-critical target set that the adversary has employed to challenge US battlefield dominance on land, at sea, in the air, and in space. Looking beyond this immediate need, reusable hypersonic aircraft present an opportunity to achieve this decontesting effect with greater persistence and flexibility. A reusable platform can conduct ISR missions to locate and track mobile targets, a critical enabler for the entire strike complex, and then execute or coordinate a strike itself, providing a rapid sensor-to-shooter capability that expendable missiles alone cannot.

Remaining challenges

While there has been good progress on developing the first generation of US hypersonic systems, there are still significant challenges that remain to accelerate fielding of US capability in the numbers necessary to address adversary A2/AD capabilities. Most important among those challenges is affordability. Current systems being fielded by the United States are based on accelerated prototype designs transitioned to a production environment. The system designs were not optimized for affordability and high-rate production and, as such, initial units are more expensive than traditional strike weapons that have been in production for years or decades. The cost will come down as the production rate increases, but the services must prioritize production at cost-efficient rates and institute cost-reduction initiatives to ensure the United States can affordably field the necessary capacity in the near term.

The United States must ensure that the warfighter is equipped to fully leverage the fielding of the hypersonic strike capabilities. As they are fielded, there must also be a high-priority effort to integrate hypersonic strike capability into US deterrence strategies and war plans for future conflicts. In so doing, DOD planners must include a focus on diverse platform integration, production in meaningful numbers, war plan utilization strategies, and, perhaps most importantly, development and implementation of a robust and effective long-range kill web.14

A critical challenge that must be overcome to close the capability gap is the inherent bias by the services, and some in OSD, toward next-generation air, land, and sea platforms at the expense of weapon quantity and capability. Each service has historically prioritized funding for development of next-generation platforms that have grown increasingly more complex and expensive due to the need to operate in an ever more contested environment, and they are almost always years late and billions of dollars over budget. As a result, weapons programs have consistently been bill-payers for platform priorities and overruns.

Nothing will be possible without an energized and expanded industrial base that embraces speed of development, affordability, and innovation across the portfolio. The current industrial base is simply not equipped or incentivized to innovate, design, and build hypersonic weapons to achieve affordable capacity. There must be a dramatic shift in perspective to embrace a model that is much more like the automobile, commercial aerospace, and commercial space-access industries than the traditional defense contractor business model. New and innovative contracting incentives should be created through collaboration between the government and industry to motivate the industry behavior essential to national success (i.e., rapid, on-time delivery of highly capable systems at or below clearly defined cost objectives). Investments in the hypersonic industrial base necessary to address this deficiency can come in the form of Defense Production Act Title III investments, Innovation Capability and Modernization (ICAM) program and Industrial Base Analysis and Sustainment (IBAS) program investments, and Manufacturing Technology (ManTech) program investments.15 However, these investments should be targeted to new and innovative ways of achieving affordable capacity for hypersonic systems and should not be used to simply build up traditional industry to do more of the same.

A call for action

The DOD and Congress can, and should, take numerous additional actions to rapidly and efficiently field warfighting capability based on hypersonic strike systems, and to bolster capabilities for defense against rapidly proliferating adversary hypersonic strike and, more broadly, growing A2/AD capabilities. Recommended actions include the following.

1. Create a munitions czar to oversee weapons development and procurement

Problem statement

The US military services are platform-centric, with weapon programs often having lower priority than development and procurement of current and next-generation platforms. These platforms are notoriously expensive, with delays measured in years and consistent cost overruns totaling billions of dollars. Services historically defund weapons programs to pay for these overruns, while also slow-rolling advanced weapons activities that might in any way compete politically with the advanced platform budget allocations.

Recommendation

The DOD should create a direct reporting program manager (DRPM) for weapons, a “weapons czar,” reporting directly to the deputy secretary of defense, and elevate the principal director for hypersonics to be a direct report to that DRPM, with responsibility and authority for defining the vision, strategy, and execution plans for all high-speed weapons programs, including defense against adversary high-speed weapons, in close coordination with the DRPM handling the proposed “Golden Dome” missile shield. The weapons czar should have authority over advanced weapon budget allocations and be held accountable for program execution.

2. Aggressively field and evolve first-generation hypersonic weapons

Problem statement

The United States has made good progress developing its first generation of hypersonic strike weapons. However, fielding has been delayed by technical challenges, budget battles, and shifting priorities, while adversaries continue to expand their arsenals. These initial systems, designed as accelerated prototypes, are also not yet optimized for affordability or high-rate production.

Recommendation

The DOD and Congress should ensure stable funding and priority to aggressively field first-generation hypersonic weapons across air, land, and sea launch platforms at the earliest possible dates, and fully equip units at levels consistent with the DOD’s analysis of warfighting needs. The DOD must work with industry to drive down costs as production rates increase. A block-upgrade strategy should be implemented for each system to rapidly insert advanced capabilities and enhance affordability, allowing them to service a broader set of targets and be procured and fielded in the necessary numbers.

3. Prioritize next-generation hypersonic systems designed for affordable capacity

Problem statement

While first-generation systems are critical for closing the immediate capability gap that adversaries have opened regarding expendable hypersonic missiles, the initial cost of first-generation US systems will limit the capacity that the United States can affordably field. To counter the sheer number of targets presented by the A2/AD strategies of peer adversaries, the United States requires a next-generation family of long-range, high-speed strike systems designed from the outset for affordable, high-rate production and broad launch-platform compatibility. The current industrial base is not structured or incentivized for this kind of rapid, cost-effective innovation.

At the same time, focusing solely on mirroring adversaries’ approach surrenders the strategic initiative. An opportunity remains to lead in the next transformational capability: reusable hypersonic aircraft for responsive ISR and strike missions. As space becomes increasingly contested, hypersonic aircraft could decisively counter adversary A2/AD strategies by enabling persistent, survivable operations from within contested zones.

Recommendation

The DOD should robustly fund two distinct but complementary lines of effort for affordable capacity:

  • (a) Next-generation expendable missiles: Pursue a family of lower-cost, high-capacity missiles for affordable capacity designed to service a broad set of A2/AD targets. This should be done through competitive programs that incentivize traditional companies to deliver affordable capacity, and inspire new and innovative companies, including nontraditional commercial firms, to compete against the traditional defense industrial base. These programs should set firm cost requirements and a trade space of performance objectives, with the goal of achieving optimal affordability. High-capacity designs must be integrated with air, land, and sea launch platforms that allow for delivery of high-capacity effects on a highly contested battlefield.
  • (b) Foundational reusable aircraft programs: Aggressively fund technology maturation and demonstrator programs for reusable hypersonic aircraft. While the initial investment is higher, these platforms offer the prospect of significantly lower cost per sortie for persistent ISR and strike missions over their lifecycle, representing the most viable path to truly affordable and sustainable capacity. Affordability must be a key driver to the design process at the earliest stages of this effort.

4. Mandate and resource an ICLD strategy

Problem statement

Fielding offensive hypersonic weapons is only one part of the solution to defeating complex A2/AD environments created by adversaries. Battlefield dominance will require both an architecture and approach that is holistic. Relying solely on postlaunch kinetic interceptors (like Patriot or THAAD) is insufficient due to challenges of overwhelming numbers, sophisticated tactics, and the unique flight characteristics of adversary cruise, ballistic, and hypersonic missile threats.

Recommendation

The DOD must formally integrate the fielding of offensive and defensive hypersonic systems into an integrated comprehensive layered defeat architecture. This framework should be adopted and must be resourced to include robust pre- and post-launch kinetic and nonkinetic capabilities. It should be an underpinning of both homeland defense (such as the proposed “Golden Dome” missile shield) and theater warfighting strategies, leveraging hypersonic strike as a critical left-of-launch enabler to disrupt and destroy adversary systems before they can be used while defeating every other element of the adversary kill chain through the integration of kinetic and nonkinetic capabilities.

5. Accelerate learning through an integrated national test enterprise

Problem statement

The pace of developing and fielding hypersonic systems is directly tied to the ability to test them early and often in a development cycle. The nation’s once-robust hypersonic ground- and flight-test infrastructure, while improving, continues to be a bottleneck, slowing down the development cycle for next-generation hypersonic systems.

Recommendation

The United States must continue to enhance its hypersonic ground and flight tests and its modeling and simulation (M&S) capabilities to enable accelerated learning and development. This enterprise must be resourced to support both rapid iteration of expendable missile designs and the more complex, sustained flight test campaigns required for reusable air-breathing aircraft. The progress made by the TRMC in ground testing, flight testing, and enhanced test-range telemetry should be embraced and robustly funded. The HyperCorr program, emphasizing ground and flight test efforts tightly coupled to high-fidelity M&S, should be accelerated. Greater emphasis should be placed on tightly coupling these TRMC investments to the overarching objectives of the DOD hypersonics program portfolio, with emphasis on accelerated development of affordable capacity for future hypersonic capability.

6. Energize allied codevelopment and coproduction

Problem statement

The United States will likely not face an adversary alone in any future major conflict. Collaboration with allies on the development and deployment of advanced high-speed systems has been limited by information-sharing challenges, missing key opportunities to share costs, leverage innovation, and together build a more integrated and capable coalition force.

Recommendation

The United States must work diligently with allies to cooperatively develop, produce, and deploy advanced and affordable hypersonic strike capabilities. Cooperative programs, such as AUKUS Pillar 2, which focuses on developing and delivering emerging technology, should be nurtured and expanded to advance alliances, foster innovation, and field capabilities in more meaningful numbers.16 Collaboration should be enhanced with all allies pursuing advanced high-speed systems, and with the removal of barriers to information and technology sharing, wherever it is possible.

7. Modernize theater and strategic nuclear delivery options

Problem statement

Adversary integrated air defenses and nuclear-modernization efforts are challenging the survivability of legacy nuclear delivery systems. For example, the F-35A dual-capable aircraft, central to NATO’s nuclear mission, is not likely to remain sufficiently survivable in the 2030s against peer defenses in all relevant scenarios.17

Recommendation

The DOD should pursue hypersonic delivery options for future strategic and tactical nuclear weapons to ensure enduring deterrence. A high-speed, air-delivered standoff weapon should be considered to augment and then replace B61 gravity bombs for the NATO mission. The United States should consider new nuclear capabilities that would be delivered by highly responsive systems, like hypersonic weapons, capable of penetrating advanced defenses with high reliability.

8. Bolster layered defenses against hypersonic threats

Problem statement

Defending against adversary hypersonic strike weapons is exceptionally difficult. These threats challenge all aspects of the defensive fire-control loop, from detection to engagement, due to their speed, range, altitude, and highly maneuverable and unpredictable trajectories.

Recommendation

The DOD must pursue a defense-in-depth, layered strategy for counter-hypersonic defense. Crucially, this kinetic shield must be integrated with nonkinetic defensive layers, such as capabilities that degrade or deny satellite navigation, communication, and terminal missile seekers, to maximize the probability of defeat. This postlaunch capability is a necessary, but not sufficient, element of the ICLD architecture.

9. Develop robust long-range kill webs for hypersonic strike capability

Problem statement

Current kill webs for effective employment of long-range strike missiles require considerable time and effort and can be brittle. This vulnerability limits the ability to deliver meaningful warfighting capability in a highly contested A2/AD environment. Warfighting effectiveness for long-range strike systems can be significantly enhanced relative to traditional weapon employment by the integration of hypersonic strike weapons. Hypersonic weapons are inherently survivable due to their ability to maneuver unpredictably and fly high-altitude, high-speed trajectories. This characteristic dramatically reduces both mission planning time prior to weapon employment and target custody duration for relocatable and moving targets.

Recommendation

The DOD should significantly enhance the development and fielding of robust long-range strike kill-web capabilities, fully leveraging the advantages of hypersonic strike weapons. An integrated and specific initiative should be funded to enhance time-critical targeting capabilities that would leverage the full spectrum of US and allied ISR and targeting systems.

10. Rapidly transition advanced technology and enhance the workforce to support future hypersonic capability development and production

Problem statement

The JHTO has responsibility for this area of the national strategy. JHTO has, so far, done a good job in creating the University Consortium for Applied Hypersonics. However, JHTO budgets have been limited beyond that. Workforce challenges and resulting technology maturation timelines are bottlenecks to further scaling the development and production of hypersonic capabilities.

Recommendation

The DOD should champion a whole-of-nation effort to address workforce initiatives and science and technology advancements to quicken the pace for future development, production, and fielding. The department and Congress should robustly fund the JHTO to identify and aggressively develop new technology for rapid transition to next-generation systems and to accelerate upgrades for existing systems. Initiatives should include the maturation of concepts and technology driven by the need to deliver affordable capacity and advanced capabilities, including future reusable hypersonic aircraft. Finally, the JHTO should more tightly couple its workforce and technology development strategies to the needs of traditional and nontraditional industry to enable accelerated development of future affordable hypersonic systems.

Conclusion

Potential adversaries, particularly China and Russia, are creating an increasingly contested environment that severely challenges US battlefield dominance. A central element of this challenge is their fielding of a variety of high-speed and hypersonic strike systems designed to attack US and allied forces at long range and with overwhelming speed.

To ensure US battlefield preeminence, the Pentagon must develop and field capabilities to enable execution of an integrated comprehensive layered defeat strategy that leverages kinetic and nonkinetic means to defeat adversary capabilities. As part of this strategy, it is imperative for the United States to develop and field its own hypersonic strike weapons in substantial numbers to enable US forces to operate effectively and survive on the modern battlefield by defeating adversary high-end capabilities in a battlefield timescale of relevance.

To that end, the Department of Defense and Congress should aggressively move forward to field first-generation air-, land-, and sea-launched hypersonic strike weapons; develop and field a next-generation family of affordable hypersonic strike systems in meaningful numbers; mature and demonstrate future hypersonic aircraft technologies; and energize the foundational enablers of the industrial base, test infrastructure, technology, and workforce. Simultaneously, the United States must bolster its defenses against adversary air and missile threats through implementation of the full spectrum of ICLD capabilities. The time to act is now to close the growing gap in offensive and defensive hypersonic capability and ensure the United States’ ability to deter and, if necessary, win in any future conflict.

List of acronyms

AcronymDefinition
A2/ADAnti-access/area-denial
ARRWAir-launched Rapid Response Weapon system
BMDBallistic missile defense
C4ISRCommand, control, communications, cyber, intelligence, surveillance, and reconnaissance
CPSConventional Prompt Strike (weapon system)
DODUS Department of Defense
DRPMDirect reporting program manager
EMElectromagnetic
GBIGround-Based Interceptor
HACMHypersonic Attack Cruise Missile
IBASIndustrial Base Analysis and Sustainment (program)
ICAMInnovation Capability and Modernization (program)
ICLDIntegrated comprehensive layered defeat strategy
ISRIntelligence, surveillance, and reconnaissance
JHTOJoint Hypersonic Transition Office
LRHWLong-Range Hypersonic Weapon, or the “Dark Eagle”
M&SModeling and simulation
ManTechManufacturing technology
NGINext-Generation Interceptor
OSDOffice of the US Secretary of Defense
PRCPeople’s Republic of China
THAADTerminal High-Altitude Area Defense
TRMCTest Resources Management Center
UCAHUniversity Consortium for Applied Hypersonics

Biographies

Co-chairs

Deborah Lee James is an Atlantic Council board director and served as the twenty-third secretary of the US Air Force from 2013 to 2017. In this capacity, she was responsible for organizing, training, equipping, and providing for the welfare of the Department of the Air Force’s nearly 660,000 active-duty, Guard, Reserve, and civilian airmen and their families. She also oversaw the Air Force’s annual budget of more than $139 billion.

James has extensive homeland and national security experience in the federal government and the private sector. In the private sector, she served as president of Science Applications International Corporation’s Technical and Engineering Sector, as executive vice president and chief operating officer at Business Executives for National Security, and as vice president at United Technologies.

In earlier government positions, James served as assistant secretary of defense for reserve affairs, in the office of the assistant secretary of defense for legislative affairs, and as a professional staff member of the House Armed Services Committee.

James earned a bachelor of arts degree in comparative area studies from Duke University and a master’s degree in international affairs from Columbia University School of International and Public Affairs. She served as co-chair of the Atlantic Council’s Commission on Defense Innovation Adoption.

Ryan D. McCarthy served as the twenty-fourth secretary of the US Army from 2019 to 2021. In this capacity, he was responsible for the recruitment, organization, training, equipping, and care of 1.4 million active-duty, National Guard, and Reserve soldiers, Department of the Army civilians, and their families. Prior to this role, he served as the thirty-third under secretary of the Army from 2017 to 2019.

McCarthy has extensive national security experience in government and the private sector. Prior to his confirmation as the under secretary of the Army, McCarthy worked for Lockheed Martin Corporation in vice president roles responsible for the F-35 Joint Strike Fighter program and the company’s global security policy. Earlier in his career, he was a vice president for HSBC.

In earlier government positions, he served as special assistant to then-Secretary of Defense Robert Gates, as the special assistant to the under secretary of defense for acquisition, technology, and logistics, and as a professional staff member of the US House of Representatives Committee on International Relations. McCarthy proudly served in the US Army from 1997 to 2002 and was involved in combat operations in Afghanistan in support of Operation Enduring Freedom with the 75th Ranger Regiment. He holds a bachelor of arts in history from Virginia Military Institute and a master of business administration from the University of Maryland’s School of Business.

Lead author

Michael E. White was the inaugural principal director for hypersonics in the Office of the Under Secretary of Defense for Research and Engineering, serving from October 2018 to June 2023. In that capacity, White was responsible for leading the Pentagon’s vision and strategy for developing offensive and defensive warfighting capability enabled by hypersonic systems. White previously served as the head of the air and missile defense sector at the Johns Hopkins University Applied Physics Laboratory (JHU/APL). White is a board director of North Wind USA Inc., which provides research, development, test, and evaluation products and services in aerospace and defense, and of Textum, which produces advanced textiles and aerospace composites. As managing member of WhiteAero, LLC, he is a senior defense consultant for hypersonic, air, and missile defense systems and tactical and strategic strike systems. WhiteAero’s clients include Lockheed Martin and GE Aerospace, which are both supporters of the Hypersonic Capabilities Task Force and producers of hypersonic capabilities, as well as Stratolaunch, X-Bow Systems, Cerberus Capital Management, Karman Space and Defense, Textum, MIT Lincoln Laboratory, JHU/APL, ACMI, and Riverside Research, all of which are involved in hypersonic capabilities.

Task force director

Stephen Rodriguez is the founder of One Defense, a technology-enabled consulting firm that identifies advanced commercial capabilities and accelerates their transition into the defense industrial base. He was a senior leader at an artificial intelligence growth-stage company and a global defense corporation. He has also been in and out of the US government throughout his career, including operational service in Colombia, Armenia, Azerbaijan, and Afghanistan. Rodriguez serves on the boards of fourteen venture-backed companies, including Applied Intuition, Chariot Defense, Firestorm, Kela Systems, Smack Technologies, Ursa Major Technologies, and ZeroMark. He is also a commission director at the Atlantic Council, chairman of Blue Forge Alliance, and a life member at the Council on Foreign Relations. Rodriguez received a bachelor of business administration from Texas A&M University and a master’s degree from Georgetown University’s School of Foreign Service. He has been published in the Wall Street Journal, Foreign Policy, War on the Rocks, and National Review.

Program director

Clementine G. Starling-Daniels is the former director of the Atlantic Council’s Forward Defense program and is now a nonresident senior fellow with Forward Defense. Her contributions to this task force concluded before she departed her fulltime role at the Council in September 2025. In her role, she shaped the center’s US defense research agenda and produced thought leadership on US security strategies and the evolving character of warfare. Her research focuses on long-term US thinking on issues like China’s and Russia’s defense strategies, space security, defense industry, and emerging technology. Prior to launching Forward Defense, Starling-Daniels served as deputy director of the Atlantic Council’s Transatlantic Security team, specializing in US security policy toward Europe and NATO. During her time at the Atlantic Council, Starling-Daniels authored numerous reports and commentaries on US space strategy, deterrence, operational concepts, coalition warfare, and US-Europe relations. Outlets that have featured her analysis include Bloomberg, Defense One, Defense News, RealClearDefense, the National Interest, SpaceNews, NATO’s Joint Air and Space Power Conference, the BBC, National Public Radio, and ABC News, among others. Starling-Daniels previously worked in the UK Parliament focusing on technology, defense, and Ukraine. She graduated with honors from the London School of Economics with a bachelor’s degree in international relations and history, and she received her master of arts in security studies from Georgetown University’s School of Foreign Service.

Task force staff

Mark J. Massa is the deputy director of the Forward Defense program of the Scowcroft Center for Strategy and Security at the Atlantic Council. He leads Forward Defense’s work on strategic forces policy. He holds a master’s in security studies and a BSFS in science, technology, and international affairs from Georgetown University.

Jonathan Rosenstein is a program assistant in Forward Defense. He supports the program’s strategic forces body of work. He holds a master of security policy studies from The George Washington University and a bachelor’s degree from Tulane University.

Sponsors

Explore the programs

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

1    For more on these and other military capabilities in the context of the Chinese People’s Liberation Army, see: “Military and Security Developments Involving the People’s Republic of China,” US Department of Defense (DOD),2024, 80100, https://media.defense.gov/2024/Dec/18/2003615520/-1/-1/0/MILITARY-AND-SECURITY-DEVELOPMENTS-INVOLVING-THE-PEOPLES-REPUBLIC-OF-CHINA-2024.PDF.
2    Lockheed Martin, a sponsor of this task force and a client of the lead author’s consultancy, produces THAAD, the Aegis Combat System, and the NGI. RTX, a sponsor of this task force, produces the Patriot system.
3    Shawn Ryan, host, Shawn Ryan Show, podcast, episode 143, “Pete Hegseth-Secretary of Defense Nominee,” November 7, 2024, https://podcasts.apple.com/us/podcast/143-pete-hegseth-secretary-of-defense-nominee/id1492492083?i=1000676048381.
4    “Nuclear Challenges: The Growing Capabilities of Strategic Competitors and Regional Rivals,” US Defense Intelligence Agency, Advanced Capabilities series, 2024, 10–16, https://www.dia.mil/Portals/110/Images/News/Military_Powers_Publications/Nuclear_Challenges_2024.pdf.
5    “Military and Security Developments,” US DOD.
6    “Ballistic and Cruise Missile Threat,” Defense Intelligence Ballistic Missile Analysis Committee and National Air and Space Intelligence Center, 2020, 14–30, https://media.defense.gov/2021/Jan/11/2002563190/-1/-1/1/2020%20BALLISTIC%20AND%20CRUISE%20MISSILE%20THREAT_FINAL_2OCT_REDUCEDFILE.PDF.
7    Michael E. White, “The Hypersonic Imperative,” Atlantic Council, March 2025, https://www.atlanticcouncil.org/content-series/strategic-insights-memos/the-hypersonic-imperative/.
8    Lockheed Martin, a sponsor of this task force and a client of the lead author’s consultancy, is the prime systems integrator for the LRHW and CPS. Andrew Feickert, “The US Army’s Long-Range Hypersonic Weapon (LRHW): Dark Eagle,” Congressional Research Service, April 24, 2025, https://www.congress.gov/crs_external_products/IF/PDF/IF11991/IF11991.33.pdf.
9    Lockheed Martin, a sponsor of this task force and a client of the lead author’s consultancy, is the prime contractor for the ARRW. “AGM-183A Air-Launched Rapid Response Weapon (ARRW),” Office of the Director of Operational Test and Evaluation,2024, 295–297, https://www.dote.osd.mil/Portals/97/pub/reports/FY2024/af/2024arrw.pdf?ver=3fXxXiEv-GcV0EYPvwE6qQ%3d%3d.
10    RTX, a sponsor of this task force, is the prime contractor for HACM.
11    “Department of Defense Demonstrates Reusability of Hypersonic Test Vehicle,” US Department of Defense Test Resource Management Center,May 5, 2025, https://www.defense.gov/News/Releases/Release/Article/4174167/department-of-defense-demonstrates-reusability-of-hypersonic-test-vehicle/.
12    Presidential determinations “resolve that certain provisions of law are or are not in the national interest,” according to the law library research guide of The George Washington University’s Jacob Burns Law Library, accessed September 16, 2025. “DOD Strengthens Supply Chains for Hypersonic and Strategic Systems,” Office of the Assistant Secretary of Defense for Industrial Base Policy,April 28, 2023, https://www.defense.gov/News/Releases/Release/Article/3377605/DOD-strengthens-supply-chains-for-hypersonic-and-strategic-systems/.
13    The University Consortium for Applied Hypersonics has hundreds of universities, research centers, and industry partners as members, listed here: https://hypersonics.tamu.edu/affiliate-members/, including some sponsors of this task force and clients of the lead author’s consultancy. “Annual Hypersonics Consortium Offers University Partnerships and Student Networking Opportunities,” US Department of Defense Under Secretary of Research and Engineering, April 19, 2024, https://www.cto.mil/news/annual-hypersonics-consortium/.
14    While a “kill chain” refers to a linear progression of systems from sensing to effecting a target, the more contemporary “kill web” approach builds in redundancy by linking together many nodes to achieve the desired effect.
15    For recent Atlantic Council work on accelerating the adoption of defense innovation and software-defined capabilities, see: Whitney M. McNamara et al., Commission on Defense Innovation Adoption: Final Report,Atlantic Council, January 16, 2024, https://www.atlanticcouncil.org/in-depth-research-reports/report/atlantic-council-commission-on-defense-innovation-adoption/; and Whitney M. McNamara, Peter Modigliani, and Tate Nurkin, Commission on Software-Defined Warfare: Final Report, Atlantic Council, March 27, 2025, https://www.atlanticcouncil.org/in-depth-research-reports/report/atlantic-council-commission-on-software-defined-warfare/.
16    “Defense Official Statement on AUKUS Pillar 2 and Exercise Maritime Big Play,” news release, US Department of Defense, October 24, 2024.
17    Lockheed Martin, the prime contractor for the F-35A, is among the sponsors of this report and is a client of the lead author’s consultancy.

The post The imperative for hypersonic strike weapons and counterhypersonic defenses appeared first on Atlantic Council.

]]>
Critical minerals in crisis: Stress testing US supply chains against shocks https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/critical-minerals-in-crisis-stress-testing-us-supply-chains-against-shocks/ Thu, 09 Oct 2025 13:00:00 +0000 https://www.atlanticcouncil.org/?p=878559 How can policymakers prepare for shocks to critical mineral supply chains and create mineral security amid a wide range of threats and challenges?

The post Critical minerals in crisis: Stress testing US supply chains against shocks appeared first on Atlantic Council.

]]>
This issue brief was updated on November 19, 2025.

Introduction

Critical minerals are foundational to the modern economy and state power via their centrality to advanced technologies across energy, military, and commercial applications. From permanent magnets in fighter jets and submarines to the batteries in electric vehicles and grid-scale storage, these inputs underpin the defense, energy, and technology bases of the United States and its partners. Yet critical mineral supply chains have become increasingly brittle: concentrated in a handful of countries, overwhelmingly refined in China, and increasingly exposed to extreme weather disruption.

China has demonstrated its willingness to weaponize its dominance over mineral markets, tightening export restrictions on graphite, antimony, and certain rare earths in retaliation for US trade and technology controls. Meanwhile, extreme droughts and heat waves are already disrupting mining and processing in regions the United States hopes to rely on for diversification. Policymakers are thus confronted with a stark question: How prepared is the United States to withstand a sudden, sustained disruption in access to critical minerals?

Policymakers in Washington are increasingly focused on mapping US critical mineral needs and boosting domestic production capacity to manage dependency risks. Given the long lead times for the development of critical mineral mining, processing, and manufacturing assets, even aggressive expansion of new, derisked supply chain activity may not yet bear fruit in time to protect the United States from a severe supply chain disruption.

To explore this challenge, the Atlantic Council, in partnership with TMP Public, convened a scenario workshop in July 2025, bringing together experts from government, industry, and academia.1 Through two stress tests—one geopolitical, one extreme weather-driven—participants mapped the likely impacts of severe mineral disruptions, the limits of the current US response tool kit, and the role that allies, markets, and industry could play in bridging vulnerabilities.

This paper distills the insights of that exercise. It first outlines the scenarios presented, then explores the policy toolbox available to the US government and companies, before concluding with the key lessons and policy recommendations that emerged. This report’s focus is not on providing comprehensive policy recommendations to fix the structural challenges facing minerals development but rather on the US ability to respond to a major supply chain disruption.

All of this analysis is framed against a risk framework for critical mineral supply chains crafted by the Atlantic Council Scowcroft Center and Global Energy Center in June 2025. The findings highlight a concerning challenge: While the United States government and industry have some tools to manage a mineral crisis in the short term, their abilities to sustain resilience in the face of protracted disruption remain dangerously underdeveloped.

Workshop: A two-stage scenario exploring supply chain disruptions

Given widespread industry and policymaker concerns about China’s market dominance across a wide variety of critical mineral markets, the workshop covered a two-stage scenario. The first stage, Scenario A1, centers geopolitics when a de facto ban on Chinese export licenses sets off severe supply constraints. The second stage, Scenario A2, adds an extreme weather-driven crisis that compounds the challenge arising in Scenario A1. This two-stage workshop model was designed to map the public- and private-sector tool kits that could be employed as supply becomes increasingly constrained. In both stages, participants underscored that the United States would need to rapidly activate emergency tools (e.g., Defense Production Act, stockpiles, allied sourcing) while confronting the reality that scaling alternative production or processing capacity would take years.

Table 1: Scenarios A1 and A2 overview

Scenario A1: China imposes an effective ban on certain mineral exports

Context: US-China tensions escalate amid trade wars and technology rivalry.

Challenge: China implements an effective export ban on three strategically vital minerals: neodymium (Nd), dysprosium (Dy), and refined manganese (Mn). In this scenario, China chooses these three minerals because of the severe impacts of their shortages across energy, defense, and other spaces on the United States and its allies and partners. China instructs firms not to issue export licenses for Nd, Dy, and Mn to US companies. Negotiations between the United States and China on this issue have stalled. China’s deep dissatisfaction with the talks suggests that the export ban is a strategic, long-term move by the Chinese rather than a short-term negotiation tactic. The licensing regime takes full effect one month from the start date of the exercise.

Rationale:
– Dual-use applications provide diplomatic cover.
– Aimed at undercutting the US defense sector, in addition to US competitiveness – in AI, semiconductors, electric vehicles (EVs), and clean energy.
– Relatively low cost to China; high strategic impact on US security, economy, and politics. A one-year disruption of Nd, Dy, and Mn (sulfate and dioxide) supply would result in a $154 million, $1.6 billion, and $96 million reduction in US gross domestic product, respectively.

Immediate consequences:
– US public and private stockpiles will be depleted within weeks to months.
– Defense and civilian industries face hard trade-offs over allocation.
– Prices spike globally as markets scramble for alternative suppliers.

Scenario A2: Extreme weather-induced supply shock across source countries

Context: As the United States turns increasingly to other partners to mitigate the effects of Scenario A1’s export restrictions, the world faces severe drought and extreme heat over several years in a number of critical mineral-producing regions, including China, Southeast Asia, Australia, and southern Africa. These weather-driven impacts are compound shocks that worsen the Chinese export restrictions that remain in effect in Scenario A1, impacting Chinese processing facilities, as well as mining operations in Australia, South Africa, and Burma.

Challenge: Extreme weather reduces mining output, limits hydropower for processing, increases equipment failure and operational downtime, and intensifies competition for water with local communities. Supply chain interruptions ripple across production timelines for rare earths and Mn.

Rationale:
– Extreme weather-induced hazards exacerbate the strategic vulnerabilities already highlighted in Scenario A1.
– Extreme weather is increasingly frequent and unpredictable, creating a chronic risk to mineral supply chains.
– Even without Chinese export restrictions, these natural events could critically constrain global supply.

Immediate consequences:
– Production delays in affected areas reduce potential alternative supply and increase prices, leaving the United States and allies with limited options.
– Options for diplomatic work-arounds narrow as each country protects their domestic supply.

Table 2: Impact timelines

While the impact timelines in Table 2 show how disruption unfolds, the toolbox in Table 3 reveals what tools the United States can use to respond. These assessments reflect the authors’ analysis of how each tool would function in practice across both short-term crisis management and longer-term resilience building. Here, “short-term impact” refers to how effectively a tool can buffer immediate disruption and ease pressures within months, while “long-term impact” captures a tool’s ability to reshape market structures or expand supply over years.

Table 3: US response tool kit

Discussion: Scenario A1: US response to Chinese mineral export curtailment

Rapid curtailments of Chinese exports of Nd, Dy, and Mn would have immediate and cascading consequences across United States supply chains.

Both US manufacturers and government agencies have limited stockpiles to buffer disruption. The main US mineral stockpile, the National Defense Stockpile, is intentionally small as it is designed to meet critical defense needs in crisis situations, not sustain broader industry during shortages. Public data on mineral stockpiles have been limited since 2022, but data on potential acquisitions show that supplies of Nd, Dy, and, even more importantly, their derivative products that are closer to end use (like neodymium-praseodymium [NdPr] oxide and neodymium magnets, most commonly NdFeB magnets) likely have vanishingly small reserves. Many manufacturers keep small working inventories, but these generally last only a few months before shutdowns begin. In their current form, rare earths stockpiles can keep defense and manufacturing afloat for a brief disruption but offer little resilience overall.

For Mn, the National Defense Stockpile had 291,000 metric tons (t) and 114,000 t of metallurgical-grade Mn ore and high-carbon ferromanganese, respectively, as of 2021, numbers that have likely held steady. Both are helpful for keeping steel production for perhaps a year; neither has any impact on the industries affected by the Chinese ban on Mn sulfate and dioxide, such as the battery industry.

Within weeks, firms would be forced to draw down private inventories for all targeted minerals. Smaller tier 2 and tier 3 suppliers, especially those in the defense supply chains, would feel the pinch first, with production delays compounding up to OEMs and defense prime contractors within three months. At the same time, speculative buying and transshipment through third countries would drive market volatility and rapid price escalation, making it even harder for firms to secure stable supply.

During the workshop discussion regarding Scenario A1, the policy interventions to limit the damage of the first three months after China’s ban vary in reach and effectiveness. The Defense Production Act (DPA) Title I, which authorizes the government to require US companies to prioritize contracts and allocate materials for national defense, can be used as an immediate bridge to reallocate existing supplies toward defense and other security priorities, but it cannot expand supply in the near term. Ultimately, the DPA is useful for emergency coordination, but obviously cannot conjure a resource that is not there.

DPA Title III, which provides financial incentives to expand domestic industrial capacity, could accelerate investment in alternative mining or refining, but actual production would take months or years to materialize. Moreover, its impact differs across the three minerals in our scenario. Domestic Mn and Nd production could grow, but Dy is challenging to source outside of China; the DPA also can do nothing to address which minerals are or are not in the ground in the United States. As a result, while the DPA can ensure the embargo’s effects are delayed for critical national security needs, its effectiveness as a short-term tool is constrained by what materials are currently stockpiled and available on the market.

The Export Administration Regulations (EAR) provide tools to ensure there is no leakage of minerals already in the United States, but with only sparse US production, impacts are limited. For example, the United States could invoke short-supply controls (EAR Part 754) to restrict exports of Mn, Nd, and Dy already in the US market, preserving availability for domestic industry. Export controls on key US exports, like semiconductors, could also serve as leverage in negotiations with China, signaling reciprocal action or broader retaliation.

Beyond regulatory measures, financial tools are critical across the near-, medium-, and long-term under Scenario A1. Loans, guarantees, and tax credits could derisk new refining and magnet production projects outside China, while underwriting short-term diversification of Mn processing. Other key interventions with longer time horizons include permitting reform, which could accelerate approval for domestic refining, processing, and recycling projects, though the benefits would be realized only after several years.

In parallel, diplomacy would be an indispensable tool under Scenario A1. Stockpiles could temporarily cushion defense-critical uses, but consumer industries would remain highly exposed. Coordination with allies—such as Japan and South Korea, which have notably robust stockpiles—could help mitigate impacts. This is based on two assumptions: first, that allies would be willing to expose themselves to Chinese retaliation; and second, that allies would not be protective of their stock even as prices surge. Trust and coordination do not tend to surge during commodity crises.

Even if allies are still willing to proceed, the United States would have to prove itself to be the best buyer in a globally constrained market. To prepare, the US could organize prenegotiated crisis-coordination agreements to harmonize stockpile releases and reallocate scarce supplies. This would not counter a global shortage since countries would prioritize their own supply security, but it could help undermine targeted adversarial actions or localized shortages, such as the one outlined in our scenario.

The US could also turn to emergency procurement and contracting, pursuing direct arrangements, for example, with suppliers in Australia and Vietnam for rare earths or Japan and Belgium for Mn. However, volumes outside China are extremely limited, and the risk of fragmented, inflationary bidding wars is high. To counter this, the government could encourage OEMs and defense prime contractors to form purchasing consortia, consolidating buying power and reducing competition among US firms.

Even with these stopgaps, in the first year the United States would likely only recover a fraction of lost supply. Optimistically, alternative sources might replace only about 10 percent of US demand—even less for Dy—that was previously fulfilled by China for each embargoed mineral. The disruption would thus remain severe, shaping both production capacity and market dynamics for years to come.

Key lessons under Scenario A1

The United States has a severely limited tool kit to manage the immediate consequences of a Chinese embargo on Nd, Dy, and Mn. The discussion of this scenario reinforced some of these limitations, while highlighting several key lessons.

  1. The US government needs a clearer cross-agency map for crisis management

    Contrary to other national emergencies, significant institutional gaps challenge the speed and effectiveness of the US response in this scenario. This includes a dangerously limited awareness of the United States’ own true exposure, particularly in the private sector where mineral and precursor inventories are largely unknown, clouding any assessment of where vulnerabilities lie or how significant they may be.

    This is further complicated by the lack of an interagency response playbook. Though interagency participation in addressing US dependency on these minerals has increased in recent years, these efforts remain highly siloed, limiting the United States’ ability to mitigate the immediate consequences of the embargo. One such example is the Department of Defense: Though it is currently the most capable of distributing stockpiles and leveraging the DPA, its mandate requires it to prioritize disbursements toward national security-related customers. Without clear signals or a policy change to develop more robust support for the commercial sector or alleviate price pressure, exposed sectors could face severe shortages while relying on slower, longer-term supply chain interventions like asset development.
  2. Stockpiling is necessary but insufficient

    Available US stockpiles sit almost entirely within the National Defense Stockpile (NDS), which by statute is narrowly designed to support defense needs and lacks the flexibility and scale to buffer the wider civilian economy. Even with rapid acquisitions in the thirty days remaining before a full embargo (as outlined in the scenario), the US government and private sector would only be able to build a partial inventory.

    Stockpiling is also uniquely difficult in the mineral sector. Many existing stockpiles are ore heavy, meaning they cannot directly support manufacturing without parallel investments in refining and magnet-making capacity. Even a “sufficient” stockpile of raw inputs may be ineffective if midstream bottlenecks persist, limiting the buffer that stockpiles can offer. In practice, stockpiles are often more useful for derisking new mineral projects by countering price manipulation than for filling market gaps during a crisis.
  3. Engaging allies is critical—and challenging

    Given domestic limitations, US crisis response would require engagement with trusted partners on several fronts. First, purchasing existing stockpiled resources from partners and allies such as Japan and South Korea, which possess much healthier stockpiling programs than the United States, could provide some relief. Second, the use of partner groupings could help US firms navigate market volatility, either through the establishment of buying consortia or trade tools to establish US firms in a more competitive position.

    This, however, is complicated on several fronts. Not only might allies not have sufficient supplies to buffer US supply, but many potential partners are also themselves highly dependent on Chinese flows in one way or another, potentially constraining their willingness to participate. Past supply crises, from the 1973 oil embargo to the scramble for COVID-19 vaccines, show that even close allies often default to self-preservation when critical resources are scarce.
  4. Longer-term resilience requires whole-of-supply-chain investment

    Tools like DPA resource allocation, export controls, or emergency procurement help cushion national security needs, but none fundamentally resolve shortages and dependency. Diversifying sources and expanding domestic processing capabilities are multiyear or even multidecade endeavors. Without sustained, coordinated investments across mining, refining, and manufacturing, the United States remains highly exposed to prolonged embargoes and similar disruptions in critical mineral supply chains.

Discussion: Scenario A2: Extreme weather disruptions in key-producer countries deepen the crisis

Scenario A2 builds directly on the conditions of Scenario A1. Chinese export restrictions remain in place, but the challenge deepens as extreme weather events—in this case, drought and heat—further disrupt neodymium, dysprosium, and manganese processing and refining. In Scenario A2, drought and heat halt operations in mineral-producing countries such as China, South Africa, and Australia, cutting off access to raw materials that underlie global energy and defense supply chains. This scenario was designed to highlight how natural disasters can trigger acute critical mineral shortfalls and drive chronic instability.

Number of annual hours at or above the strong heat stress threshold under the Universal Thermal Climate Index (UTCI), a measurement that assesses the human body’s reaction to environmental conditions, as projected for a mine and processing facility in Australia in 2027. Source: TMP Public

Natural disasters, including extreme drought, heat, and flooding, are most acute in the upstream segment of the value chain, where operations are tied to physical geography, water availability, and energy infrastructure. For example, extreme heat may restrict workforce availability due to safety concerns and damage power systems. Midstream and downstream industries feel the effects later, but shortages in refined inputs ripple outward to global manufacturers of batteries, magnets, and other critical technologies. Unlike Scenario A1, where lost Chinese volumes might be partially offset by alternative sources, underlying production capacity itself is constrained in this scenario, removing physical capacity from global supply chains and making substitution far more limited.

The timeline of disruption under Scenario A2 differs from the rapid cascade modeled in A1. In the immediate term, extreme weather may halt operations at specific mines or smelters, causing localized shortages but not necessarily triggering a global supply crunch. Within one to six months, if alternative sources are unavailable, these outages compound into tightness in global markets, with prices spiking and downstream consumers forced to draw down inventories. Over six months to two years, repeated or prolonged shocks reduce confidence in the reliability of specific supply regions, deterring investors locally while accelerating efforts to diversify sources.

Governments and firms retain access to the same emergency tool kit—DPA authorities, stockpiles, export controls, and financial incentives—but in this scenario those levers are even less effective. Unlike an export ban where supply still exists somewhere in the system, extreme weather-driven production losses reduce the global pie. Stockpiles, already modest and dwindling, would offer little comfort and may be completely depleted. The DPA could still reallocate minerals for defense needs, but new production contracts would still take years to bear fruit. Financial support and permitting reform likewise remain slow-burn solutions.

Two features distinguish this scenario from a geopolitical shock. First, the cumulative nature of disaster risk elevates the role of adaptation and resilience. Forward-looking firms are already beginning to price such disruption into their business models, investing in diversified water sources, backup power systems, and more flexible logistics. However, these practices remain uneven and underdeveloped, with only a select few of the larger players having the capital to consider absorbing higher upfront costs. Without a stronger policy framework to incentivize and scale climate adaptation, smaller firms and entire supply chains will remain vulnerable, unable to respond beyond cutting production.

Second, diplomacy takes on a new shape. In this scenario, the United States would have less ability to rely on allies for stockpiled minerals or backdoor access to Chinese materials. Allied producers may themselves face shortfalls related to extreme weather and are even more likely to prioritize domestic demand. Instead, engagement would focus on negotiating with producers like Australia and South Africa to prioritize US flows and investing jointly in natural disaster-resilient infrastructure around mine sites. These steps could not eliminate the shortfall, but they would help build a foundation for future resilience.

Key lessons under Scenario A2

As under Scenario A1, the United States has a limited tool kit to manage the consequences of extreme weather-driven limitations of global production of Nd, Dy, and Mn. The workshop discussion revealed several insights that both US government and allied policymakers should take more fully into account.

  1. Diversification must account for shocks driven by extreme weather and natural disasters, not just geopolitics. Unlike a politically motivated embargo where trade can be rerouted, extreme weather events can temporarily or permanently remove production capacity from even trusted foreign or domestic sources. Therefore, resilience cannot just focus on nearshoring or friendshoring supply chains but rather must be redundant and geographically distributed so they can absorb shocks from natural disasters as well as geopolitical action. Furthermore, uneven exposure to extreme weather means that while resource quality and cost remain paramount, sourcing decisions may increasingly prioritize regions with lower disaster risk, even if the resources are otherwise less attractive. Recycling and circularity also offer parallel sources of supply that are more insulated from disaster-driven shocks. Expanded magnet recycling, for example, could help stabilize Nd and Dy availability, providing a buffer against both short-term shocks and chronic scarcity.
  2. Adaptation is inseparable from mineral security. Disaster risks are not a distant concern but a material, immediate factor shaping global mineral flows. Larger companies increasingly recognize this and are investing accordingly by integrating weather-related risk into their operations and financing. For example, for Mn producers in water-scarce regions, ignoring drought or heat is not an option. While some leading firms are working to internalize these risks, many others are completely unprepared. Companies can pursue comprehensive, system-level shifts, such as market-based approaches that price in such disruption risk and help incentivize resilience and resource allocation. Smaller firms, however, often lack the capital to invest in adaptation at scale, leaving them disproportionately exposed. Zooming in to site-level adaptation, many companies already have localized measures in place, such as water management, community partnerships, and diversification of energy supply, but these are rarely sufficient as disasters increase in frequency and intensity. Meanwhile, governments have largely failed to plan, often treating a mineral strategy as divorced from disaster resilience. Without a policy framework that incentivizes and supports adaptation across the whole supply chain, national security and industrial priorities remain at the mercy of disaster-driven shocks.
  3. Institutional readiness for nonadversarial supply shocks is underdeveloped. The scenario underscored the absence of clear government processes for responding to disruptions caused by extreme weather events rather than hostile actions. Agencies could struggle to decide whether trade, energy, or defense authorities were in the lead, obfuscating agencies’ sense of ownership and slowing response. The United States needs a coherent interagency framework that treats climate-linked disruptions as a strategic risk category, complete with predefined authorities and operational playbooks, rather than assuming only adversarial actions will threaten supply.
  4. Short-term emergency tools cannot replace preemptive resilience. Emergency tools offer short-term relief but cannot substitute for supply chains resilient to multiyear disruptions such as long-term drought. This scenario underscores the importance of preemptive investment in resilience, be it diversifying the energy inputs that power mining and refining or embedding redundancy through alternative suppliers and recycling. Such shocks will not wait for permitting reform or procurement contracts; resilience must be in place before the disruption arrives.

Conclusion: Preparing for crisis

Whether triggered by deliberate policy in Beijing or extreme weather around the world, the United States and its allies are just one disruption away from insecure supply chains for the minerals most critical for defense readiness and energy build-out.

Across both scenarios, a core set of emergency policy tools recurred: the DPA, the National Defense Stockpile and private stockpiles, emergency procurement authorities, and diplomacy. These instruments can help soften the immediate blow and reallocate scarce resources to mission-critical sectors. However, the exercise revealed that their effectiveness is uneven in crisis scenarios. Some tools, such as stockpiles and DPA prioritization, can only redistribute or smooth supply; they cannot generate new production and, by design, remain poorly calibrated to the scale and duration of potential crises. Other tools, such as permitting reform and financial incentives, are inherently long-term plays, essential for resilience, but irrelevant to short-term crisis management. Diplomacy’s ability to counter emergency shortages, meanwhile, is contingent on circumstances: Scenario A1 creates conditions where third-country suppliers can still channel volumes toward allies, but in Scenario A2, partners face similar supply constraints, limiting diplomacy’s utility as a stopgap. In the longer term, coordination on diversification remains a particularly powerful tool, though robust multilateralism has been slow to manifest in practice.

Diversification emerged as the single most important theme, but the scenarios showed that not all diversification strategies are created equal. In a geopolitical shock like Scenario A1, diversification is about reducing reliance on China by cultivating alternative partners and trade routes. In an extreme weather shock like Scenario A2, diversification must be about physical redundancy: ensuring supply chains are geographically distributed enough that a drought, flood, or cyclone cannot take out a large share of global capacity in one stroke. Recycling and circularity take on greater weight here, offering supply streams that are less vulnerable to both political and physical disruption.

When both scenarios are layered on top of each other, it becomes clear that US and allied supply chains would be hard-pressed to absorb just one of the above shocks, let alone both compounded. Existing mitigation and diversification strategies fall far short of what would be needed to maintain supply under these conditions. A key question for policymakers is whether current strategies are robust across both pathways or whether they remain overly skewed to geopolitical contingencies at the expense of disaster resilience.

The lesson of the scenarios is clear: Mineral security must be approached as a continuum of risks, where short-term tools and long-term strategies are designed in tandem and where geopolitical and disaster-related contingencies are addressed with equal seriousness.

About the authors

Acknowledgements

The Atlantic Council would like to thank TMP for its support of this project.

This report is written and published in accordance with the Atlantic Council’s policy on intellectual independence. The authors are solely responsible for its analysis and recommendations. The Atlantic Council and its donors do not determine, nor do they necessarily endorse or advocate for, any of this report’s conclusions.

Related content

Explore the programs

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

The Global Energy Center develops and promotes pragmatic and nonpartisan policy solutions designed to advance global energy security, enhance economic opportunity, and accelerate pathways to net-zero emissions.

1    This workshop was held under the Chatham House Rule. The contents of this paper and its conclusions, though built from the workshop discussion and complemented by additional research from the Atlantic Council, are not endorsed by and do not necessarily reflect the views of the workshop participants.

The post Critical minerals in crisis: Stress testing US supply chains against shocks appeared first on Atlantic Council.

]]>
Chinese mining in West Africa: Responding to the environmental and social impacts https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/chinese-mining-in-west-africa/ Mon, 06 Oct 2025 12:30:00 +0000 https://www.atlanticcouncil.org/?p=878732 Chinese entities are expanding legal and illegal mining for minerals in West Africa.

The post Chinese mining in West Africa: Responding to the environmental and social impacts appeared first on Atlantic Council.

]]>

Editors’ introduction

In May 2025, the China Global South Initiative (CGSi), a collaboration between the Keough School of Global Affairs and the Atlantic Council Global China Hub, convened a group of twenty-two African environmental experts at the Peduase Valley Resort in Ghana for a three-day workshop on China’s environmental impact in West Africa. This policy workshop, hosted with the support of the Ford Foundation, included representatives from eleven West African countries—Benin, Burkina Faso, Cameroon, Cote d’Ivoire, Ghana, Liberia, Mali, Nigeria, Senegal, Sierra Leone, and Togo—and South Africa. Amid three days of comradery and collaboration, these experts worked together to draft policy memorandums on China’s environmental impact across the region. In the months following the workshop, we worked closely with the authors to curate three briefs—on mining and resource extraction, timber and wildlife, and fisheries and water resources—that identify the challenges and offer actionable policy solutions. We would like to recognize the excellent work of the co-authors who contributed their time and expertise to creating these briefs. In particular we would like to thank the group leaders Abosede Omowumi Babatunde, Ebagnerin Jérôme Tondoh, and Ebimboere Seiyafa and Awa Niang Fall, respectively, for their diligent work.

First and foremost, we would like to thank Caroline Costello, assistant director of the Atlantic Council’s Global China Hub, for her essential contributions to the workshop in Ghana and this collection of issue briefs. Her tireless efforts were truly essential to the success of the project. Ashley Bennett, events strategy program director of the University of Notre Dame’s Keough School of Global Affairs, provided critical logistical support across a dozen countries. Alexandra Towns at the Keough School and Cate Hansberry, Beverly Larson, and Jeff Fleischer at the Atlantic Council provided expert editorial support. Guidance from Notre Dame’s Pamoja Africa Initiative helped us identify contributors, and the Kellogg Institute helped support their participation. We would also like to thank the excellent staff of the Peduase Valley Resort for their hospitality during the May 2025 workshop. Last, but not least, we would like to thank our partner, the Ford Foundation, whose support made the workshop and these policy briefs possible. Ford is not responsible for the content of these policy briefs.


Bottom lines up front

  • Chinese individuals, corporations, and state actors are increasingly involved in both legal and illegal mineral mining operations across West Africa.
  • The negative impacts of these operations on water resources, forests and biodiversity, livelihoods, health, and food security across West Africa have been profound.
  • This brief proposes national and regional policy recommendations for addressing the detrimental social and environmental impacts of Chinese mining in West Africa.

Executive summary

Driven by growing global demand for minerals, West Africa has become a major hub for mining. Chinese entities—including individuals and private actors and corporations, some of them backed by state financing—are expanding legal and illegal mining for gold, diamonds, iron ore, bauxite, lead, zinc, stones, and critical minerals such as lithium, cobalt, and copper. These activities, which range from large-scale commercial ventures to small-scale artisanal mining, often cause serious environmental degradation. In many West African countries, Chinese nationals involved in illegal artisanal mining collaborate with local and transnational criminal actors. While some Chinese operations have created jobs and infrastructure in mining communities, their negative impacts on water resources, forests and biodiversity, livelihoods, health, and food security across West Africa have been profound. National or regional policies and enforcement mechanisms have failed to adequately address the social and environmental impacts of mining in the region. This brief proposes policy recommendations responding to the detrimental social and environmental impacts of Chinese mining in West Africa.

Background

There is growing concern about the detrimental environmental effects of Chinese mining operations in West Africa. Chinese companies exploit policy gaps, weak institutions, and the lack of regulatory enforcement
across mineral-rich West African countries. Their involvement in legal and illegal large-scale corporate mining, as well as the small-scale artisanal mining intended for locals, demands policy responses that strengthen governance and enforcement across the region.

The environmental impacts of Chinese mining activities in the region are complex, evolving, and difficult to fully identify due to the blurred lines between formal and informal mining operations. While industrial-scale mining tends to be confined to specific areas and is somewhat better regulated, illegal small-scale mining operations are poorly monitored despite their environmental and social harms. Chinese actors’ deployment of heavy-duty machinery in small-scale mining has significantly damaged ecosystems, especially forests and watersheds. Ultimately, both large- and small-scale mining have become major sources of environmental degradation, enabled by noncompliance with mining regulations, weak regulatory enforcement, and a lack of accountability and prosecutions for legal violations in the mining sector.

The impacts of these activities are not only ecological but also social. The scale of Chinese mining operations with heavy machinery drive land dispossessions and displacement across the region.1 Chinese operators in illegal mining often convert farmland, forest, and rivers into mining sites—sometimes forcibly or through collusion with government, traditional leaders, and private landowners—eroding long-standing livelihoods rooted in agriculture and fishing.2 The loss of land for farming bananas, rice, potatoes, and other traditional crops undermines food security, fuels social tension, and stokes conflicts between local communities and Chinese miners.3

Weak regulatory enforcement in the mining sector stems from both systemic and political failures. Monitoring and evaluation mechanisms are underdeveloped, and existing legal frameworks fail to address the complex challenges posed by the involvement of Chinese nationals throughout the formal and informal mining sectors. Critically, there is a lack of political will to enforce existing laws—due in large part to the complicity of state and local authorities. High-level government officials, security personnel, and local leaders often benefit from illegal mining operations through bribery schemes, unlawful permits and licensing, and even ownership of mining equipment and operations.4 These activities undermine law enforcement, shielding both local and Chinese violators from prosecution. Compounding the problem is the widespread failure of Chinese mining companies to honor their corporate social responsibility (CSR) agreements. Although mining laws in many West African countries require community engagement and CSR implementation, Chinese company compliance is often absent or minimal, leading to public resentment and straining diplomatic relations between China and countries such as Ghana, Sierra Leone, Mali, and Nigeria.5 These problems, detailed in the following section, underscore the urgent need for national and regional policy responses that address regulatory gaps, strengthen enforcement mechanisms, and promote transparency and accountability in the mining sector.

Evidence

The environmental impacts of Chinese mining activities are broad and far reaching, encompassing land degradation, ecosystem destruction, landslides, pollution deforestation, biodiversity loss, desertification, and exacerbating climate change. Chinese miners’ consistent flouting of environmental standards and safety measures has severely damaged forest reserves, farmlands, and water resources. Chinese mining in West Africa is commonly tied to illegal small-scale artisanal operations carried out in collusion with local and transnational actors, including criminal gangs.6 These activities have profound consequences across the region.

Deforestation and soil erosion are commonplace across West African mining sites, and pollution of marine and freshwater bodies occurs at multiple stages of mining exploration. Small-scale gold mining causes extensive land degradation and harms water quality.7 In Nigeria, Liberia, Mali, and Ghana, Chinese financing has enabled local miners to excavate deeper with bulldozers and use harmful chemicals more extensively.8 Local mining workers and artisanal miners are exposed to hazardous mercury, cyanide, arsenic, and fluoride, often due to the lack of proper protective gear.9 Wastewater from mining containing these and other toxic heavy metals pollutes soil, groundwater, and rivers in Ghana, Burkina Faso, Nigeria, and Mali, where landslides at abandoned Chinese-owned artisanal mines have resulted in fatalities.10 In Nigeria, lead poisoning in mining sites in Zamfara State in 2010 resulted in about four hundred children falling ill or dying.11 Wastewater discharge onto farmlands from mining reduces crop yields and introduces toxins into the food chain, affecting human and animal health.12 Many mining communities have reported disproportionate cases of cancer, respiratory infections, waterborne diseases, reproductive disorders, skin disorders, asthma, spontaneous abortions, and birth defects.13

In coastal communities where mining is widespread, dredging boats discharge oil, fuel, and chemicals, obstruct riverbeds, cause erosion, and deform watercourses. Chinese mining operations have also released ballast water containing invasive species and toxic waste into marine ecosystems.14 Harmful runoff in mining sites poisons fish and reduces the size and quality of local stocks. Meanwhile, loss of farmland worsens poverty and undermines food security. In Ghana, the majority of small-scale “galamsey” gold mining sites are run by Chinese nationals, with more than fifty thousand Chinese nationals entering the country between 2008 and 2013 to engage in illegal gold mining. According to the Mankurom Cocoa Cooperative Farmers Association, small-scale gold mining has destroyed more than 100,000 acres of cocoa farmland.15 In Nigeria, mining-related disruptions have intensified farmer-herder conflicts due to declining access to water and grazing land.16

Chinese artisanal and illegal mining has also accelerated deforestation.17 In Ghana, bauxite mining in the Atewa Forest has devastated 5,000 hectares.18 In Nigeria, mining in forest zones has resulted in significant habitat loss. From 1975 to 2005, Bukuru, Plateau state, lost 63 percent of its forested area due to mining.19 These forests filter pollution and ensure a steady supply of water to important inland rivers such as the Falémé River (Senegal and Mali), Bagoé River (Côte d’Ivoire and Mali), Tano-Bia Basin (Ghana and Côte d’Ivoire), and the Volta Basin (Benin, Burkina Faso, Côte d’Ivoire, Ghana, Mali, and Togo).20

Chinese involvement in mining across West Africa is linked to organized crime and the proliferation of weapons.21 Transnational criminal networks linked to Chinese mining have destabilized mining regions and eroded trust in both local and national governance.22 Illegal mining has also become a funding source for armed groups and terrorists, such as Boko Haram and bandits in the Nigerian state of Zamfara.23 Illicit gold mining in the Central Sahel countries—Burkina Faso, Mali, and Niger—has been linked to transnational organized crime and instability. The illicit trade in Sierra Leonean diamonds and Malian gold has been tied to criminal syndicates and terrorism.24

While Chinese involvement in mining has supported some job creation, infrastructure development, and technology transfer in mining communities, these benefits are typically accompanied by poor working conditions, low wages, environmental hazards, and labor-rights violations.25 Even when communities negotiate infrastructure projects, the benefits rarely offset the environmental and social damage.26 Numerous cases of inadequate compensation, unpaid royalties, and poor infrastructure have fueled community tensions and intracommunity disputes.27 In Niger, for example, top Chinese oil executives were expelled for failing to adhere to the mining code requiring them to use local subcontractors and laborers
for extraction.

Governance weaknesses exacerbate these challenges. Environmental and natural resource agencies across West Africa are underfunded, lack the independence needed to enforce regulations, and are plagued with corruption.28 Overlapping mandates and poor interagency communication hinder enforcement, while lax licensing systems allow illegal Chinese operations to flourish. Weak coordination between federal, provincial, and local authorities further enables illegal mining to thrive.29 Many countries also lack clear procedures governing the entire process from mineral exploration to mine decommissioning.30 In Nigeria, Mali, Côte d’Ivoire, and Liberia, small-scale mining licenses are often misused for large-scale operations and many Chinese firms operate without proper registration or licenses.31 In Ghana, where artisanal mining is restricted to nationals, Chinese actors are heavily involved through local intermediaries.32 Governments frequently issue licenses without consulting or compensating local landowners.33 In Nigeria and Ghana, vague and controversial land laws allow governments to appropriate land regardless of prior ownership, often keeping marginalized communities from receiving the economic benefits of mineral extraction.34

Even in countries that have environmental impact assessment (EIA) laws—such as Ghana, Nigeria, Benin, and Côte d’Ivoire—implementation is politicized and inconsistent and rarely results in severe penalties for violators. Officials often exploit the EIA process for personal gain, circumventing pollution-mitigation and land-restoration requirements. In Ghana, EIAs are mandatory for small-scale mining, but enforcement is weak.35 In Nigeria, the process remains opaque, and officials have misled local communities, particularly in areas with high illiteracy.36

This evidence underscores the urgent need for national and regional policies to close regulatory gaps and strengthen enforcement to curb the socioenvironmental consequences of Chinese mining in West Africa.

Policy recommendations

Improve oversight and compliance

  • Establish a digital reporting system. To empower reform-minded actors as a counterweight to corrupt elites, civil society organizations should develop a secure, accessible, and digitalized reporting system that includes strong whistleblower protections. Under the banner “See something, say something,” the system should allow for various channels—such as phone calls, WhatsApp, Telegram platforms, encrypted messaging, and dedicated call lines—to report violations and upload images. It should include a robust mechanism for data protection to ensure the safety of whistleblowers and the integrity of reports. Simplicity, reliability, and accessibility should guide its design, and the system should be created in partnership with credible civil-society organizations and community groups that could help provide capacity to investigate the veracity of each report and guard against manipulation by corrupt actors. To demonstrate its effectiveness and have immediate impact, the system should be piloted in select mining regions in which civil society groups and community organizations have existing local relationships. The system could be expanded gradually, region-by-region, with the ultimate aim being the creation of an integrated reporting network throughout West Africa.
  • Update and enforce visa regulations for Chinese nationals and strengthen immigration and border controls. To address the poorly regulated licensing regimes and the involvement of Chinese entities in illegal mining, visa requirements and regulations should be reviewed, strengthened, and strictly enforced for Chinese visitors entering the region. Extradition treaties must be updated and enforced to hold foreign violators, including Chinese citizens and entities, accountable for environmental crimes. Locals who help foreign mining firms violate visa laws should be strictly prosecuted under the law.
  • Clarify and improve mining license regimes and land tenure laws. Clear, equitable land policies are essential to protect communities from dispossession and ensure fair access to the profits of mining. Governments should review their existing licensing structures to close loopholes and clearly distinguish between different categories of mining operations—both formal and informal. Land tenure laws should be updated and reformed to eliminate ambiguities—particularly around the ownership and use of mineral-rich lands. This will ensure transparency, streamline oversight, and reduce regulatory loopholes for illegal mining.
  • Create a regional mining compliance database to monitor implementation of EIA and CSR and identify bad actors. West African countries should establish an online monitoring and evaluation mechanism for all international mining companies operating in the region. The system would be overseen by a multinational committee comprising state and local stakeholders and civil-society organizations, which would conduct random biannual checks to verify compliance and enforcement. The Economic Community of West African States (ECOWAS) could develop the database in collaboration with member states.
  • Establish mining escrow accounts. This mechanism would ensure that mining companies have set aside sufficient funds for land reclamation and environmental remediation. Firms would pay into an escrow account before they begin mining. If they clean up the environmental destruction associated with their activities, the funds would be returned to them with interest. But if mining companies fail to carry out proper land remediation, then the money in the escrow account would be used to support the cleanup and/or as compensation.

Raising public awareness

  • Strengthen public education. Governments and civil society should establish national and sub-national level educational programs to inform the public—especially grassroots actors and traditional leaders—about the health risks and environmental impacts of illegal and artisanal mining. These efforts should include targeted publicity campaigns using radio broadcasts pamphlet distribution, and social media platforms with language-accessible slogans. Mining communities should also be educated about the environmental, social, and health consequences of mining through community meetings and gatherings designed to raise public awareness. These educational initiatives can leverage regular community gatherings and forums, and should be conducted in local languages to reach a broader audience. They could be led by nonprofit and civil-society organizations in close partnership with local health authorities and relevant stakeholders. This collaborative approach would help to effectively communicate medical and environmental risks while fostering greater community awareness and engagement.
  • Train and protect journalists. Journalists should receive specialized training by professionals from local and international media and other international community organizations to build capacity for professional and investigative reporting on mining issues involving Chinese actors.

Empower communities

  • Form community monitoring committees. Local community groups should be formed and should work in collaboration with security agencies, government bodies, local and international nonprofit organizations, civil-society groups, and the press to distinguish between legitimate (i.e., properly registered and escrow backed) and illegal mining activities. These groups would expose collusion between Chinese entities, local actors, and transnational criminal networks. To prevent corrupt actors from co-opting them, these committees should prioritize transparency and undergo regular reviews and oversight checks by a committee of experts from neighboring countries.
  • Register local miners and support cooperatives. Begin a campaign to register local small-scale miners to enhance transparency. Registration could come with access to credit facilities to disincentivize them from relying on Chinese financing. Establish mining cooperatives, or support existing ones, that encourage small-scale artisanal miners to move from illegal to formal mining by helping them apply for appropriate licenses and explaining the harm caused by heavy metals.

International engagement

  • Engage the Chinese government. West African governments should establish regular channels for both formal and informal discussions between state institutions (e.g., environmental protection agencies, ministries of environment and natural resources, ministries of mines and energy, minerals commissions, and other such institutions with oversight over minerals and mining), the local Chinese embassy, and their counterparts in Beijing. West African leaders and officials should raise the issue of environmental degradation in discussions with senior Chinese leaders, and it should be placed on the agenda and prioritized at the Forum on China Africa Cooperation (FOCAC) and other multilateral meetings with Chinese counterparts.
  • Engagement among West African governments. West African governments should establish regular channels for information sharing among their relevant ministries. These mechanisms can be formal or informal, bilateral or multilateral, but their objective should be to exchange timely information—for example, about cross-border bad actors and mining-induced environmental pollution—as well as to coordinate collective action among likeminded officials.

About the authors

Richard Asante is an Associate Professor of Comparative Politics, Development and African Studies at the University of Ghana, Legon. His research focuses on the intersection between politics and development, with particular focus on Africa-China relations, Ghana-U.S security cooperation, natural resource governance, environmental security and communal conflicts, and impact of peacekeeping on domestic and regional security. Asante has been a visiting professor at the Department of Politics and International Relations, Pomona College, Claremont, California, USA, where he taught comparative politics of Africa and peace and security in Africa (2016/2017). He also served as a Mellon Postdoctoral Fellow, at the Program of African Studies (PAS), Northwestern University; he taught comparative politics and development in Africa (2012/2013). Asante holds a B.A and M. Phil degrees in Political Science from the University of Ghana, and a PhD degree in Political Science under the Harvard University (Boston, USA)-University of Ghana split-PhD program. He was a special student in the Department of Government at Harvard University, Boston, USA (2008/2009). He is the Regional Manager, West Africa for the Varieties of Democracy.

Joseph Asunka is the CEO at Afrobarometer, a pan- African survey research organization that conducts public attitude surveys on democracy, governance, the economy, and social issues across Africa. Joseph’s research interests are broadly in governance and democracy in Africa, with specific interests in elections and electoral processes and public service delivery. Joseph holds first and second degrees in Statistics & Computer Science and Economics from the University of Ghana and a Ph.D. in political science from the University of California at Los Angeles.

Abosede Omowumi Babatunde is a professor of Peace and Conflict Studies at the Centre for Peace and Strategic Studies, University of Ilorin, Nigeria. Prof. Babatunde has been awarded several distinguished academic fellowships including the 2024 Afox Visiting Research Fellow (Africa-Oxford Initiative) in the Merton College and African Studies Centre, University of Oxford, United Kingdom. Her work has been supported by research grants from CODESRIA; APN/SSRC, APSA Centennial Foundation and IPRA Foundation. Her research interests include conflict resolution, natural resources governance, human rights and security, peacebuilding and gender studies. She recently co-authored the book “Managing Violent Religious Extremism in Fragile States: Building Institutional Capacity in Nigeria and Kenya,” Routledge African Governance Series” (recommended by CHOICE and selected for the Institute for Peace and Security Studies (IPSS), Ethiopia Tana High Level Forum Book Launch, 2023).

Joshua Eisenman is a professor of politics at the Keough School of Global Affairs, University of Notre Dame. His research focuses on the political economy of China’s development and foreign relations with the United States and the Global South — particularly Africa. His latest book, China’s Relations with Africa: A New Era of Strategic Engagement (Columbia University Press, 2023), explains the tactics and methods that China uses to build relations with African countries and contextualizes and interprets them within Beijing’s larger geostrategy.

Francis Egu Lansana is a forward-thinking development enthusiast with technical knowledge in natural resource governance, gender inclusion and leadership. He is an experienced public and private sector manager. He has a strong foundation in current methodologies paired with an understanding of trends and a desire to innovate. His research examines open governance and citizens’ participation in mining concession decision-making. He holds a master’s degree in development studies from Erasmus University, The Netherlands.

Sanusha Naidu is a senior research associate with the Institute for Global Dialogue. Her areas of analysis include democracy, development and the political economy of Africa’s international relations and South Africa’s Foreign Policy. She has also focused her interests on South-South Cooperation and the footprint of emerging powers in Africa. She previously worked at the Centre for Conflict Resolution based in Cape Town and managed the South African Foreign Policy Initiative (SAFPI) at the Open Society Foundation for South Africa.

Ogbonnaya Igwe is the chairperson of the Environmental Monitoring and Assessment Research Group, and the Lead of Engineering Geology/Geotechnical Engineering Unit, University of Nigeria, Nsukka. He is an environmental expat specializing in sustainable environmental protection and disaster prevention/management. He is the coordinator of the ICL-UNESCO Centre of Excellence and Tuning Africa Project in Applied Geology University of Nigeria, Nsukka
and consults for the oil and gas industry in environmental and social impact assessment and environmental evaluation studies projects.

Youmanli Ouoba is a professor of economics at the University of Thomas SANKARA. His research interests are in natural resources management, agricultural development and environmental economics. He is the current director of the Center for Economic and Social Studies, Documentation and Research (CEDRES) of Thomas SANKARA University, Burkina Faso.

Boukary Sangaré is a Malian anthropologist and independent consultant and has conducted several studies for international NGOs working in Mali and the Sahel. He joined the Institute for Security Studies in 2019 as a research consultant. Before joining ISS, he was a program officer for the Peaceful Coexistence, Peacebuilding and Reconciliation Program at the Danish Embassy in Bamako. Boukary has worked in the Sahel for the past decade on conflict, violent extremism, radicalization, governance, social mobility and social media.

Related content

Explore the program

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

1    Sheridan Prasso, “China’s Quest for Iron,” Bloomberg, June 23, 2022, https://www.bloomberg.com/features/2022-china-africa-iron-mining-simandou-mountains/.
2    Gabriel Botchwey and Gordon Crawford, “Resource Politics and the Impact of Chinese Involvement in Small-Scale Mining in Ghana,” Africa 88, 4 (2018), 867–870, https://www.cambridge.org/core/journals/africa/article/resource-politics-and-the-impact-ofchinese-involvement-in-smallscale-mining-in-ghana/82FE8F2115A8D553132B868EFE803241.
3    Prasso, “China’s Quest for Iron.”
4    Eromo Egbejule, “Polluted Rivers, Uprooted Farmland and Lost Taxes: Ghana Counts Cost of Illegal Gold Mining Boom,” Guardian, November 25, 2024, https://www.theguardian.com/world/2024/nov/25/polluted-rivers-taxes-ghana-illegal-gold-mining-boom.
5    Smruthi Nadig, “Arrests and Attacks: Tracking China’s Illegal Mining in African Countries,” Mining Technology, December 6, 2023, https://www.mining-technology.com/features/arrests-and-attacks-tracking-chinas-illegal-mining-in-african-countries/?cf-view.
6    James Boafo, Sebastian Angzoorokuu Paalo, and Senyo Dotsey, “Illicit Chinese Small-Scale Mining in Ghana: Beyond Institutional Weakness?” Sustainability 11, 21 (2019), https://www.mdpi.com/2071-1050/11/21/5943; Nicholas Loubere, et al., “Unequal Extractions: Reconceptualizing the Chinese Miner in Ghana,” Labour, Capital and Society 49, 2 (2019), 2–29, https://lucris.lub.lu.se/ws/portalfiles/portal/82696451/49_2_Loubere_Lu_Crawford_Botchwey.pdf; Martin Arboleda, Planetary Mine: Territories of Extraction under Late Capitalism (London: Verso, 2020); Maria-Therese Gustafsson, Almut Schilling-Vacaflor, and Andrea Lenschow, “The Politics of Supply Chain Regulations: Towards Foreign Corporate Accountability in the Area of Human Rights and the Environment?” Regulation & Governance 17 (2023): 853–869, https://onlinelibrary.wiley.com/doi/full/10.1111/rego.12526; Dirk Kohnert, “Prospects and Challenges for the Export of Rare Earths from Sub-Saharan Africa to the EU,” Social Science Research Network, 2024, https://ssrn.com/abstract=4687731.
7    Jean de Dieu Izerimana and Lakube Sokowonci Godwin, “Opportunity and Side Effects of Artisanal and Small-Scale Mining in Nigeria,” Modern Economy 15, 3 (2024), 233–250, https://www.scirp.org/journal/paperinformation?paperid=131810.
8    Samuel T. K. Wilson, et al., “The Mining Sector of Liberia: Current Practices and Environmental Challenges,” Environmental Science and Pollution Research 24 (2017), 18711–18720, https://link.springer.com/article/10.1007/s11356-017-9647-4; and Itohan Otoijamun, et al., “Fostering the Sustainability of Artisanal and Small-Scale Mining (ASM) of Barite in Nasarawa State, Nigeria,” Sustainability 13, 11 (2021), https://www.mdpi.com/2071-1050/13/11/5917.
9    Tawanda Zvarivadza, “Artisanal and Small-Scale Mining as a Challenge and Possible Contributor to Sustainable Development,” Resources Policy 56 (2018), 49–58, https://www.sciencedirect.com/science/article/abs/pii/S0301420717303471; Clement Kwakyewah, “Doing Just Business: An Empirical Analysis of Mining Multinationals, Human Rights and Sustainable Community Development in Western Ghana,” master’s thesis, York University, 2018; F. C. Emetumah, “Modelling Miners’ Consciousness and Experiences for Environmental and Safety Regulatory Compliance during Mining Activities in Ebonyi State, Nigeria,” PhD dissertation, Nnamdi Azikiwe University, 2021; Alyson Warhurst, ed., Environmental Policy in Mining: Corporate Strategy and Planning (London: Routledge, 2024).
10    Baba Ahmed, “Landslide Kills Several Artisanal Gold Miners in Southern Mali,” Associated Press, January 30, 2025, https://apnews.com/article/mali-gold-miner-accident-4d83bba17a9076f703470f5bc0db7443.
11    Dauda Garuba, et al., “Impact of Mining on Women, Youth and Others in Selected Communities in Nigeria,” Nigerian Extractive Industries Transparency Initiative, 2020, https://neiti.gov.ng/cms/wp-content/uploads/2021/08/NEITI-OPS7-Impact-of-Mining-on-Women-Youth-Others-in-Nigeria-051020.pdf.
12    Ali Nouri, et al., “Introducing Sustainable Development and Reviewing Environmental Sustainability in the Mining Industry,” Rudarsko-geološko-naftni zbornik 37, 4 (2022), 91–108, https://ojs.srce.hr/index.php/rgn/article/view/21711.
13    Kouame Joseph Arthur Kouamé, Fuxing Jiang, and Zhu Sitao, “Artisanal Gold Mining’s Impact on Local Livelihoods and the Mining Industry in Ivory Coast,” World Journal of Science, Technology and Sustainable Development 14, 1 (2017), 18–28, https://www.emerald.com/wjstsd/article-abstract/14/1/18/383310/Artisanal-gold-mining-s-impact-on-local?redirectedFrom=fulltext; Nwankpa and Alexander Chinyere, “Gamma Radiation Associated with Gold Mining in Rrinmo, Osun State, Nigeria,” Environmental Research Journal 13, 3 (2019), 79–82, https://makhillpublications.co/files/published-files/mak-erj/2019/3-79-82.pdf; Garuba, et al., “Impact of Mining on Women, Youth and Others in Selected Communities in Nigeria”; Nuraddeen Nasiru Garba, et al., “Investigation of Potential Environmental Radiation Risks Associated with Artisanal Gold Mining in Zamfara State, Nigeria,” Environmental Earth Sciences 80, 3 (2021), 1–9, https://link.springer.com/article/10.1007/s12665-021-09367-2; Andrea Leuenberger, et al., “Health Impacts of Industrial Mining on Surrounding Communities: Local Perspectives from Three Sub-Saharan African Countries,” PLOS One (2021), 1–23, https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0252433; Gianna S. Himmelsbach, et al., “Exploring the Impact of Mining on Community Health and Health Service Delivery: Perceptions of Key Informants Involved in Gold Mining Communities in Burkina Faso,” International Journal of Environmental Research and Public Health 20, 24 (2023), 1–23, https://www.mdpi.com/1660-4601/20/24/7167; Kodwo Amoa-Abban, “Ghana’s Gold Gamble: How Illegal Mining Threatens Our Future and Global Relations,” Joy Online, September 6, 2024, https://www.myjoyonline.com/ghanas-gold-gamble-how-illegal-mining-threatens-ourfuture-and-global-relations/; Kenneth Awotwe Darko, “Impose Ban on Small-Scale Mining in Ghana—Health Workers to Akufo-Addo,” Joy Online, September 6, 2024, https://www.myjoyonline.com/impose-ban-on-small-scale-mining-in-ghana-health-workersto-akufo-addo/#google_vignette.
14    Edmund C. Merem, et al., “Assessing the Ecological Effects of Mining in West Africa: The Case of Nigeria,” International Journal of Mining Engineering and Mineral Processing 6, 1 (2017), 1–19, https://www.researchgate.net/publication/314121473_Assessing_the_Ecological_Effects_of_Mining_in_West_Africa_The_Case_of_Nigeria; Wilson, et al., “The Mining Sector of Liberia,” 18711–18720.
15    Ebenezer Aikins, “Ghana Must Stop Galamsey before It Sinks the Country,” Institute for Security Studies, September 24, 2024, https://issafrica.org/iss-today/ghana-must-stop-galamsey-before-it-sinks-the-country; Theodore Abiwu and Justice Baidoo, “The Winners and Losers of Ghana’s Gold Rush,” Institute for War & Peace Reporting, December 10, 2024, https://iwpr.net/global-voices/winners-and-losers-ghanas-gold-rush; “More than 100,000 Acres of Cocoa Farms Destroyed by Galamsey—Farmers Association,” GhanaWeb, September 6, 2024, https://www.ghanaweb.com/GhanaHomePage/business/More-than-100-000-acres-of-cocoafarms-destroyed-by-galamsey-Farmers-Association-1949476.
16    Leif Brottem and Andrew McDonnell, “Pastoralism and Conflict in Sudano-Sahel: A Review of the Literature,” Search for Common Ground, July 2020, https://documents.sfcg.org/wp-content/uploads/2020/08/Pastoralism_and_Conflict_in_the_Sudano-Sahel_Jul_2020.pdf; Abosede Omowumi Babatunde and Fatma Osman Ibnouf, “The Dynamics of Herder-Farmer Conflicts in Plateau State, Nigeria, and Central Darfur State, Sudan,” African Studies Review 67, 2 (2024), 321–350, https://www.cambridge.org/core/journals/african-studies-review/article/dynamics-of-herderfarmer-conflicts-in-plateau-state-nigeria-and-central-darfur-state-sudan/7E7D1919E669ED01BD164B7D13F2639C.
17    Kouame, K.J.A., Jiang, F. and Sitao, Z. (2017), “Artisanal gold mining’s impact on local livelihoods and the mining industry in Ivory Coast”, World Journal of Science, Technology and Sustainable Development, Vol. 14 No. 1, pp. 18-28. https://doi.org/10.1108/WJSTSD-09-2016-0056.
18    Emmanuel Armah-Kofi Buah, “The State of Ghana’s Forest Reserve and Water Bodies,” Parliament of Ghana, February 19, 2025, https://www.parliament.gh/floor?dis=50.
19    Merem, et al., “Assessing the Ecological Effects of Mining in West Africa.”
20    Samuel Nunoo, et al., “Impact of Artisanal Small-scale (Gold and Diamond) Mining Activities on the Offin, Oda and Pra Rivers in Southern Ghana, West Africa: A Scientific Response to Public Concern,” Heliyon 8, 12 (2022), 1–12, https://www.sciencedirect.com/science/article/pii/S2405844022036118; Divine Dodzi Gbedzi, et al., “Impact of Mining on Land Use Land Cover Change and Water Quality in the Asutifi North District of Ghana, West Africa,” Environmental Challenges 6 (2022), 1–15, https://www.sciencedirect.com/science/article/pii/S2667010022000014; Oreoluwa Ola and Emmanuel Benjamin, “Preserving Biodiversity and Ecosystem Services in West African Forest, Watersheds, and Wetlands: A Review of Incentives,” Forests 10, 6 (2019), 479, https://www.mdpi.com/1999-4907/10/6/479.
21    Richard Asante, “China’s Security and Economic Engagement in West Africa: Constructive or Destructive?” China Quarterly of International Strategic Studies 3, 4 (2017), 575–596, https://www.worldscientific.com/doi/abs/10.1142/S2377740017500257.
22    H. A. Ahmed, “Overview of Nigeria’s Solid Mineral Potentials, Challenges and Prospects,” FUTY Journal of the Environment 16, 1 (2022), 76–91, https://www.ajol.info/index.php/fje/article/view/256334; K. N. Yakubu, “Governance and Security in Africa: Beyond the State: Non-State Actors and Security in Nigeria: A Case of Yen Kato Da Gora in Kaduna Urban Area,” PhD dissertation, SOAS University of London, 2024; Amoa-Abban, “Ghana’s Gold Gamble”; Manuel Bustillo Revuelta, Mineral Resources: From Exploration to Sustainability Assessment (New York: Springer, 2017), 653; Anura Widana, “The Impacts of Mining Industry: A Review of Socio-Economics and Political Impacts,” Journal of Insurance and Financial Management 4, 4 (2021), 1–30, https://www.researchgate.net/publication/334794541_The_Impacts_of_Mining_Industry_Socio-Economics_and_Political_Impacts.
23    Cyril Olumuyiwa Amosu and T. A. Adeosun, “Curtailing Illegal Mining Operation in Nigeria,” International Journal of Physical and Human Geography 9, 1 (2021), 13–24, https://eajournals.org/ijphg/vol-9-issue-1-2021/curtailing-illegal-mining-operation-in-nigeria/; Abosede Omowumi Babatunde, et al., Managing Violent Religious Extremism in Fragile States: Building Institutional Capacity in Nigeria and Kenya (London: Routledge, 2022), https://www.routledge.com/Managing-Violent-Religious-Extremism-in-Fragile-States-Building-Institutional-Capacity-in-Nigeria-and-Kenya/Babatunde-Adedimeji-Raji-Maweu-MwangiGithigaro/p/book/9781032111124; Alex Olanrewaju Adekanmbi and Drew Wolf, “Solid Mineral Resources Extraction and Processing Using Innovative Technology in Nigeria,” ATBU Journal of Science, Technology and Education 12, 1 (2024), 1–16, https://www.researchgate.net/publication/378108458_Solid_Mineral_Resources_Extraction_and_Processing_Using_Innovative_Technology_in_Nigeria.
24    John Sunday Ojo and Oluwole Ojewale, “Gold Mining and Instability in the Central Sahel” in Governing Natural Resources for Sustainable Peace in Africa (London: Routledge, 2023), 38–59; Åse Gilje Østensen and Mats Stridsman, “Shadow Value Chains: Tracing the Link between Corruption, Illicit Activity and Lootable Natural Resources from West Africa,” U4 Anti-Corruption Resource Centre’s U4 Issue 7 (2017), https://www.researchgate.net/publication/326893824_Shadow_Value_Chains_Tracing_the_link_between_corruption_illicit_activity_and_lootable_natural_resources_from_West_Africa.
25    Benno Pokorny, et al., “All the Gold for Nothing? Impacts of Mining on Rural Livelihoods in Northern Burkina Faso,” World Development 119 (2019), 23–39, https://doi.org/10.1016/j.worlddev.2019.03.003. https://www.sciencedirect.com/science/article/abs/pii/S0305750X19300476; Bonnie Campbell, “Revisiting the Interconnections between Research Strategies and Policy Proposals: Reflections from the Artisanal and Small-Scale Mining Sector in Africa” in Property Rights and Governance in Artisanal and Small-Scale Mining (London: Routledge, 2020), 15–33, https://www.tandfonline.com/doi/abs/10.1080/23802014.2016.1226145; Abdul-Wadood Moomen, et al., “Inadequate Adaptation of Geospatial Information for Sustainable Mining towards Agenda 2030 Sustainable Development Goals,” Journal of Cleaner Production 238 (2019), https://www.sciencedirect.com/science/article/abs/pii/S0959652619328240; E. Akyeampong and L. Xu, “Chinese Technology and the Transformation of the Rural Economy in Ghana: Evidence from Galamsey in the Ashanti and Savannah Regions,” African Affairs 122, no. 488 (2023): 329–351, https://academic.oup.com/afraf/article-abstract/122/488/329/7264167; Amir Lebdioui and William Davis, “Multidimensional Indicator of Extractives Based Development: Country Profiles,” MINDEX, November 2023, https://resourcegovernance.org/sites/default/files/2023-11/Multidimensional_Indicator_of_Extractives-Based_Development_Country_Profiles.pdf; J. F. Akinbami, S. O. Oyedepo, and A. O. Adedeji, “Mining and Its Socio-Economic Impacts on Rural Communities in Nigeria,” Resources Policy 69, 4 (2020), 36–48; T. Dougherty, “Environmental Impacts of Mining: A Review of the Nigerian Experience,” Journal of Environmental Management 30, 2 (2020), 112–126; Oksana Marinina, Natalia Kirsanova, and Marina Nevskaya, “Circular Economy Models in Industry: Developing a Conceptual Framework,” Energies 15, 24 (2022), https://www.mdpi.com/1996-1073/15/24/9376.
26    Deanna Kemp and John R. Owen, “Community Relations and Mining: Core to Business but Not ‘Core Business,’” Resources Policy 38 (2013), 523–553, https://www.sciencedirect.com/science/article/pii/S030142071300069X; Campbell, “Revisiting the Interconnections between Research Strategies and Policy Proposals”; Moomen, et al., “Inadequate Adaptation of Geospatial Information for Sustainable Mining towards Agenda 2030 Sustainable Development Goals.”
27    Le Billon, “Crisis Conservation and Green Extraction”; Andreas Johansson, “Managing Intractable Natural Resource Conflicts: Exploring Possibilities and Conditions for Reframing in a Mine Establishment Conflict in Northern Sweden,” Environmental Management 72 (2023), 818–837, https://link.springer.com/article/10.1007/s00267-023-01838-5.
28    Ahmed, “Overview of Nigeria’s Solid Mineral Potentials, Challenges and Prospects”; Edmund C. Merem, et al., “The Assessment of China’s Scramble for Natural Resources Extraction in Africa,” World Environment 11, 1 (2021), 9–25, https://scispace.com/papers/the-assessment-of-china-s-scramble-for-natural-resources-29tzuultf0.
29    Adekanmbi and Wolf, “Solid Mineral Resources Extraction and Processing Using Innovative Technology in Nigeria.”
30    Angela Oyilieze Akanwa and Ngozi N. Joe-Ikechebelu, “Sustainable Natural Resources Exploitation: Clay/Sand Mining on Diminishing Greener Security and Increased Climate Risks in Nigeria” in Natural Resources Conservation and Advances for Sustainability (Amsterdam: Elsevier, 2022), 545–562, https://www.sciencedirect.com/science/article/abs/pii/B9780128229767000181.
31    Nandom Abu, Suleiman Abba Tahir, and H. D. Ibrahim, “Minerals and Mining Policies in Nigeria: Implications on Sustainable Growth and National Development,” International Journal of Research in Engineering and Science 8, 9 (2020), 60–72, https://www.ijres.org/papers/Volume-8/Issue-9/J08096072.pdf; “Nigerian Mining–Progress, but Still a Long Way to Go,” PricewaterhouseCoopers, July 2023, https://www.pwc.com/ng/en/publications/nigerian-mining-progress-but-still-a-long-way-to-go.html; “Mining in Nigeria: Opportunities, Challenges, and Prospects,” Mining Review Africa, September 20, 2023, https://www.miningreview.com/gold/mining-in-nigeria-challenges-opportunities-and-prospects/.
32    Emmanuel Debrah and Raphael Asante, “Sino-Ghana Bilateral Relations and Chinese Migrants’ Illegal Gold Mining in Ghana,” Asian Journal of Political Science 27, 3 (2019), 286–307, https://www.tandfonline.com/doi/full/10.1080/02185377.2019.1669473.
33    Akinbami, et al., “Mining and Its Socio-Economic Impacts on Rural Communities in Nigeria.”
34    Adekanmbi and Wolf, “Solid Mineral Resources Extraction and Processing Using Innovative Technology in Nigeria”; and Kohnert, “Prospects and Challenges for the Export of Rare Earths from Sub-Saharan Africa to the EU.”
35    Boafo, et al., “Illicit Chinese Small-Scale Mining in Ghana”; Albert K. Mensah, et al., “Environmental Impacts of Mining: A Study of Mining Communities in Ghana,” Applied Ecology and Environmental Sciences 3, 3 (2015), 81–94, https://pubs.sciepub.com/aees/3/3/3/.
36    Olayinka, et al., “Mining and Environmental Impact Assessment in Sub-Saharan Africa.”

The post Chinese mining in West Africa: Responding to the environmental and social impacts appeared first on Atlantic Council.

]]>
Chinese demand for timber and wildlife in West Africa: Responding to the environmental and social impacts https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/chinese-demand-for-timber-and-wildlife-in-west-africa/ Mon, 06 Oct 2025 12:30:00 +0000 https://www.atlanticcouncil.org/?p=877958 West Africa’s forests are vital for climate regulation, biodiversity conservation, poverty alleviation, and economic growth.

The post Chinese demand for timber and wildlife in West Africa: Responding to the environmental and social impacts appeared first on Atlantic Council.

]]>

Editors’ introduction

In May 2025, the China Global South Initiative (CGSi), a collaboration between the Keough School of Global Affairs and the Atlantic Council Global China Hub, convened a group of twenty-two African environmental experts at the Peduase Valley Resort in Ghana for a three-day workshop on China’s environmental impact in West Africa. This policy workshop, hosted with the support of the Ford Foundation, included representatives from eleven West African countries—Benin, Burkina Faso, Cameroon, Cote d’Ivoire, Ghana, Liberia, Mali, Nigeria, Senegal, Sierra Leone, and Togo—and South Africa. Amid three days of comradery and collaboration, these experts worked together to draft policy memorandums on China’s environmental impact across the region. In the months following the workshop, we worked closely with the authors to curate three briefs—on mining and resource extraction, timber and wildlife, and fisheries and water resources—that identify the challenges and offer actionable policy solutions. We would like to recognize the excellent work of the co-authors who contributed their time and expertise to creating these briefs. In particular we would like to thank the group leaders Abosede Omowumi Babatunde, Ebagnerin Jérôme Tondoh, and Ebimboere Seiyafa and Awa Niang Fall, respectively, for their diligent work.

First and foremost, we would like to thank Caroline Costello, assistant director of the Atlantic Council’s Global China Hub, for her essential contributions to the workshop in Ghana and this collection of issue briefs. Her tireless efforts were truly essential to the success of the project. Ashley Bennett, events strategy program director of the University of Notre Dame’s Keough School of Global Affairs, provided critical logistical support across a dozen countries. Alexandra Towns at the Keough School and Cate Hansberry, Beverly Larson, and Jeff Fleischerat the Atlantic Council provided expert editorial support. Guidance from Notre Dame’s Pamoja Africa Initiative helped us identify contributors, and the Kellogg Institute helped support their participation. We would also like to thank the excellent staff of the Peduase Valley Resort for their hospitality during the May 2025 workshop. Last, but not least, we would like to thank our partner, the Ford Foundation, whose support made the workshop and these policy briefs possible. Ford is not responsible for the content of these policy briefs.


Bottom lines up front

  • China’s demand for timber and illegal wildlife products contributes significantly to deforestation and biodiversity loss in West Africa.
  • Despite existing legal and voluntary frameworks, many West African countries struggle with enforcement due to weak institutional capacity, underfunded regulatory agencies, corruption, limited monitoring, and political interference.
  • This brief offers recommendations to strengthen enforcement and promote accountability to address the environmental and social impacts of Chinese demand for timber and wildlife in the region.

Executive summary

West Africa’s forests are vital for climate regulation, biodiversity conservation, poverty alleviation, and economic growth. They store carbon, protect watersheds, and sustain millions of rural livelihoods. However, accelerating deforestation, habitat loss, illegal wildlife trade, and unsustainable resource extraction—often linked to Chinese actors—threaten these critical functions. Chinese timber companies, agribusinesses, infrastructure developers, and wildlife traders have increasingly contributed to forest degradation across the region. Illegal logging— particularly of rosewood and other valuable timber in Nigeria, Ghana, Gambia, Mali, Côte d’Ivoire, Sierra Leone, and Liberia— has fueled widespread forest loss, including in protected areas. Driven almost entirely by Chinese demand, rosewood is now the world’s most trafficked illegal wildlife product in terms of both value and volume, surpassing ivory and rhinoceros horn combined. Though Chinese investments in the region’s timber industry have brought some economic benefits, the environmental costs far outweigh the local gains. Largescale land acquisitions and infrastructure projects frequently lead to forest conversion, erode community land rights, and put endangered species at risk of extinction. This policy brief examines the environmental and social impacts of Chinese exploitation of forests and wildlife in West Africa and offers recommendations to strengthen enforcement, promote accountability, and engage Beijing to address these challenges.

Background

West Africa contains some of the continent’s most intact tropical forests, which support more than nine hundred bird species and nearly four hundred species of terrestrial mammals.1 The region is recognized as a global biodiversity hotspot and hosts 113 key biodiversity areas across countries such as Guinea, Sierra Leone, Liberia, Côte d’Ivoire, Ghana, Togo, Benin, Nigeria, and Cameroon.2 However, these ecologically important regions are under increasing threat, with more than 265,000 hectares of forest lost in the past decade.3

A significant driver of this forest loss is the growing footprint of Chinese economic activity in the region. China’s involvement in timber extraction, agribusiness, infrastructure development, and wildlife trade has been linked to deforestation, biodiversity loss, and the breakdown of essential ecosystem services such as climate regulation, water provision, and carbon storage.4 The demand for valuable hardwoods, especially rosewood—driven almost entirely by the Chinese market—has led to widespread illegal and unsustainable logging, often in protected areas and forest reserves.5

Over the past two decades, Chinese investments in West Africa—estimated at more than $200 billion as of 2021—have expanded rapidly across various sectors.6 While these investments have spurred infrastructure development and trade, they have also caused serious environmental damage. In countries such as Ghana, Liberia, Nigeria, Côte d’Ivoire, and Sierra Leone, Chinese firms are frequently associated with both legal and illicit timber operations. In addition, Chinese-backed agribusiness ventures, particularly in rubber and palm oil, have led to extensive land acquisitions and deforestation, undermining traditional land tenure systems and disrupting local livelihoods.7

Chinese infrastructure and mining projects have opened previously undisturbed forest and conservation areas, fragmented habitats and weakened the ecological integrity of critical landscapes. These developments often erode community-based forest management practices and contribute to the marginalization of local populations.8

Despite existing legal and voluntary frameworks—including forest codes, environmental impact assessment laws, and international commitments such as Reducing Emissions from Deforestation and Forest Degradation (REDD+, developed by the United Nations Framework Convention on Climate Change) and the African Forest Landscape Restoration Initiative—many West African countries struggle with enforcement due to weak institutional capacity, underfunded regulatory agencies, corruption, limited monitoring, and political interference.9 In many cases, Chinese firms bribe local officials to push forward opaque timber and land deals.10 The co-optation of local elites further shields environmental offenders from accountability.11

There is an urgent need for coordinated national and regional responses to address these challenges. Key policy priorities should include strengthening environmental governance, enhancing transparency in investment and land deals, securing community land rights, and holding Chinese firms accountable for environmental damage. Without these measures, the region’s forests—and the critical ecological and social benefits they provide—will remain at risk from unchecked Chinese firms’ exploitation.12

Evidence

The evidence of China’s role in accelerating deforestation and biodiversity loss in West Africa is substantial and alarming. Driven by surging demand for valuable timber and wildlife products Chinese firms have emerged as the dominant foreign actors in the trade. Even when there are existing protections for threatened tree species (e.g., the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES), these logging activities, which are often conducted illegally or through weak regulatory channels, have far-reaching consequences for ecosystems and rural livelihoods.13

At the heart of the crisis lies demand for rosewood, a valuable tropical hardwood used in traditional Chinese furniture. According to the Environmental Investigation Agency, rosewood is now the most trafficked illegal wildlife product globally—by both value and volume—surpassing ivory, rhinoceros horn, and big cats combined.14 The value of rosewood exports from West Africa to China was estimated to have surpassed $2 billion between 2017 and 2022, with logs fetching on average more than $20,000 per metric ton in 2021.15 China’s domestic market demand drives rampant logging in West Africa, with an estimated 70 percent of logging in Ghana, 65 percent in Cameroon, and 56 percent in Nigeria classified as illegal.16 Despite an export ban, Ghana sent 540,000 metric tons of rosewood to China between 2012 and 2019—equal to six million trees or about 2,000 acres of forest loss.17

The financial losses attributed to illegal timber harvesting are staggering. The World Bank estimates that illegal logging deprives source governments worldwide of between $7 billion and $12 billion annually.18 In 2018, illegal deforestation cost countries approximately $4,000 per hectare in lost tax revenue, ecosystem degradation, and social conflict.19 Each year Nigeria loses $191 million to $383 million in tax revenues; Cameroon loses $51 million to $103 million; Côte d’Ivoire loses $38 million to $76 million; and The Gambia loses $4 million to $9 million.20 The illegal rosewood trade—driven by corruption, the misuse of licenses to recover trees downed by storms or construction, and weak oversight – has been particularly profitable.

Criminal and extremist networks use profits from this illicit trade to fund their operations. As of 2020, more than 1 million trees were illegally harvested and sent to China from Senegal’s Casamance region, helping to fund separatist groups such as the Movement of Democratic Forces of Casamance.21 In Mozambique, the rosewood trade fuels al-Shabab militants linked to the Islamic State of Iraq and al-Sham (ISIS).22 Chinese smugglers source rosewood from Nigerian regions controlled by Boko Haram, allowing the group to profit.23 In Mali, despite a 2020 national export ban, nearly 150,000 tons of rosewood—equivalent to 220,000 trees—were exported to China.24 In Mali, al-Qaeda-linked Jama’a Nusrat ul-Islam wa al-Muslimin militants profit by controlling access to rosewood forests.25

Corruption plays a central role in sustaining the illegal timber trade. Chinese companies often operate through shell firms or local agents to obscure accountability.26 Regulatory enforcement remains underfunded and inconsistent, while laws requiring environmental impact assessments for logging are frequently bypassed or ignored. Forestry agencies and customs offices are often compromised by corruption.27 One of the most egregious cases happened in Nigeria in 2017, when Chinese customs authorities intercepted 1.4 million illegal rosewood logs valued at $300 million, facilitated by nearly $1 million in bribes to Nigerian officials.28 Chinese-funded infrastructure also contributes to deforestation.

Chinese-funded infrastructure also contributes to desforestation. Chinese-financed roads, ports, and dams often cut through protected areas, offering loggers access to previously unreachable forests. Operating through local intermediaries, Chinese timber companies extract high-value hardwoods such as rosewood, teak, and ebony either illegally or through legal loopholes. Based on geospatial analysis, approximately 10 percent of Ghana’s critical forest reserves and 11 percent of Côte d’Ivoire’s over-lap with Chinese-sponsored infrastructure.29 One of the most contested cases is Ghana’s Atewa Forest Reserve, a biodiversity hot spot threatened by Chinese bauxite mining.30 Despite strong civil-society opposition, the government proceeded with road construction in anticipation of mining operations, causing significant environmental degradation including forest fragmentation, incursions into conservation zones, and habitat destruction. Deforestation disrupts rainfall patterns, accelerates erosion, and increases the frequency of droughts and floods, undermining agricultural productivity in a region where 70–80 percent of rural livelihoods depend on farming.

Large-scale agricultural ventures compound these impacts. In Liberia, Côte d’Ivoire, Nigeria, and Cameroon, Chinese agribusinesses have cleared vast tracts of forest for rubber, palm oil, and rice cultivation. Free, prior, and informed consent policies are on the books in all of these nations, requiring consultations with indigenous peoples and local communities.31 But agribusinesses routinely ignore such requirements. In
Cameroon, Sudcam (a subsidiary of China Hainan Rubber Group) cleared more than 10,000 hectares between 2011 and 2018 and contributed to 45,000 hectares of deforestation.32 These enterprises displace communities without proper compensation.

In addition to timber, China’s demand for exotic wildlife has turned West Africa into a hub for global wildlife trafficking. Since 2015, Nigeria has been China’s primary source for ivory and pangolin scales. Between 2018 and 2023, seizures in Nigeria included more than 30 metric tons of ivory and 167 metric tons of pangolin scales, equivalent to at least 4,400 elephants and hundreds of thousands of pangolins, respectively.33 While West African countries are signatories to relevant international frameworks like CITES, which monitors the trade in endangered wild animals and plants, in many West African countries sales continue due to weak enforcement, corruption, poor monitoring, and lack of effective local regulatory mechanisms.34

China has responded to criticism of its global development and infrastructure initiatives by releasing voluntary environmental sustainability guidelines, including the 2017 Guidance on Promoting a Green Belt and Road and the 2021 Green Development Guidelines for Overseas Investment.35These guidelines encourage Chinese firms to abide by host country laws, but they lack enforcement mechanisms. Similarly, China’s 2019 Forest Law discourages illegal timber imports but lacks provisions for supply chain oversight. Firms can evade prosecution by claiming ignorance of illegality.36 A 2022 draft regulation aims to apply aspects of China’s domestic Forest Law to its international practices, but it lacks the enforcement mechanisms necessary to make the international supply chain traceable.37

In short, China’s timber harvesting, infrastructure construction, agriculture investments, and wildlife trade have contributed significantly to deforestation and biodiversity loss in West Africa. The convergence of high domestic Chinese market demand, weak governance across West Africa, lapse enforcement within China, and corruption has created a perfect storm of environmental degradation. Addressing this behavior requires a strong political commitment to combat criminal activity and shift the incentives that drive the market for illegally traded wildlife products. To address the problem, African countries must coordinate policy responses across the local, regional, and international levels. For its part, China should adopt and strictly enforce mechanisms that ensure responsible practices toward West African forests and wildlife.

Policy recommendations

Improve oversight and compliance

  • Disclose environmental and social impact assessments. To enhance transparency and facilitate oversight. West African governments should require all foreign investments in logging, agribusiness, and infrastructure to conduct and publicly disclose their environmental impact assessments. These results must be made available to relevant local authorities prior to project approval.
  • Improve legal transparency. Publish a national land and concession registry that includes all foreign allocations and permits. Ensure contracts are clearly defined, legally binding, and aligned with national conservation laws. Update land tenure legislation to protect customary rights and require public registration of all foreign land concessions. Strengthen customs enforcement in African countries, shared border points, and Chinese ports to prevent the export and import of unverified timber and endangered species.
  • Establish escrow accounts to ensure reforestation. Require licensed logging and agribusiness firms to deposit funds into escrow accounts dedicated to ecological restoration. Funds should only be released upon verification of reforestation or land rehabilitation by either a certified private institution or the relevant state agency, depending on relevant laws and regulations. If companies fail to restore the land, the funds should be redirected to local communities for remediation and compensation.
  • Create national whistleblower systems. Develop national level secure, multilingual tools—such as short message service (SMS) platforms, mobile apps, and anonymous hotlines—for communities, nongovernmental organizations, and forestry workers to report illegal logging, land grabs, and wildlife crimes. Rather than rely entirely on global reporting platforms that may be inaccessible, national and local level platforms would enable faster and real time detection of illegal logging for prompt action by relevant subnational institutions. Enforce strong legal protections for whistleblowers and environmental defenders. Partner with international bodies such as Interpol, TRAFFIC (a network of two hundred experts on the trade of wild species), and CITES to verify and investigate reported violations.

Raise public awareness

  • Support regional civil-society coalitions. Fund and strengthen regional and national coalitions of civil-society organizations that monitor Chinese forestry investments and expose violations of national laws and regulations. Recognize land governed and managed according to traditional community-based systems and build local capacity to negotiate fairer contracts. Equip community actors with tools including drones, Global Positioning System (GPS) devices, and mobile reporting apps to document and report illegal activities in real time.
  • Train and protect environmental journalists. Work closely with local and transnational civil society organizations to provide training for local journalists to investigate the illegal timber trade, land seizures, and biodiversity threats linked to foreign investments. Training should focus on developing investigative methods, digital security, environmental law, and data-gathering. National and regional safety support programs should be made available to journalists, including emergency legal support, and encrypted communication platforms for those facing threats or harassment.

Regional cooperation

  • Adopt a regional forestry code of conduct. The Economic Community of West African States (ECOWAS) should establish a binding regional code of conduct that sets minimum environmental and social standards for all foreign investments in terms of forests and biodiversity. This framework could be modeled on the Forest Law Enforcement, Governance, and Trade (FLEGT) polices of the European Union or United Kingdom, and include voluntary partnership agreements.38 Collective regional action can encourage individual reform-minded leaders to act as a counterweight against corrupt local officials.
  • Create a regional public forestry investment database. Establish and maintain an online database that tracks foreign licenses, timber exports, and environmental violations. Under ECOWAS auspices, this platform should become a regional information hub that documents licensing status, compliance records, and audit outcomes. The intention is to enable public oversight of Chinese and other foreign firms operating in forest and critical biodiversity areas.
  • Enhance international coordination. Set up an ECOWAS task force to regularly exchange information on West African forest and wildlife resource exploitation. The task force would facilitate intelligence sharing on illegal timber trade routes and identify specific violations and bad actors. It could facilitate joint investigations into cross-border violations in shared forests such as the Upper Guinea region, which traverses Liberia, Côte d’Ivoire, and Guinea. The group would publish an annual report for ECOWAS members states and make specific recommendations to member countries. The task force could form a collective negotiation platform in collaboration with national forestry commissions to engage Chinese state-owned enterprises and private investors.
  • Work with China. Create formal and informal dialogue channels among African environment ministries, ECOWAS, and Chinese embassies and companies to address logging violations and environmental disputes. To enhance contract transparency, the equitable sharing of benefits, and improve oversight, urge Beijing to make its Green Development Guidelines for Overseas Investment mandatory. West African governments should push China publicly and privately to implement timber supply chain tracing and to regularly publish customs data on timber imports into China.

About the authors

Roland Azibo Balgah is professor of development studies at the University of Bamenda, Cameroon, and visiting professor at Sol Plaatje University, South Africa and University of Cologne, Germany. As a social economist, he researches on the human-nature sustainability nexus, with thrust on hazards, poverty and livelihoods, and sustainable development in Africa.

Caroline Costello is an assistant director with the Atlantic Council’s Global China Hub. Prior to joining the Atlantic Council, Costello worked on the U.S. Department of State’s International Visitor Leadership Program. In previous roles, she has taught English in Xiting, China; interned with the Peace Corps, the Department of State, and Save the Children; and served as the head of Learning Enterprises, an international volunteer program which sends students to teach English in underserved communities abroad.

Moses Fayiah is a forestry lecturer at the Department of Forestry and Wood Science, School of Natural Resources Management, Njala Campus, Njala University, Sierra Leone and has over 10 years of professional experience. He is also the executive director of Universal Consulting Services and the Forum for Environment, Biodiversity and Climate Change in Sierra Leone. His research interests include forest regeneration, sustainable forest management, climate change, forest policy and ecosystem restoration and conservation.

Jean-Luc Kouassi is an assistant professor of forestry and environmental management at the Felix Houphouet-Boigny National Polytechnic Institute (INP-HB) of Cote d’Ivoire with a decade of experience in cacao agroforestry, fire ecology, and GIS. His research explores the intersection of agriculture and sustainability, focusing on climate change mitigation, community empowerment, and sustainable landscape management.

Christine Ajokè I. N. Ouinsavi is a professor at University of Parakou (Benin), where she coordinates doctoral training in natural resources management, chairs the Scientific Committee of Natural Sciences and Agronomy, and leads the Forestry Studies and Research Laboratory. Her research focuses on ecology, agroforestry, climate change, biodiversity conservation, forest management and restoration in tropical regions. As former cabinet minister she led national policies in trade and education, chaired critical commissions, and participated in international negotiations.

Ebagnerin Jérôme Tondoh is an Associate Professor in in ecology and sustainable management of land at Nangui Abrogoua Universiy, Abidjan, Côte d’Ivoire. He has an extensive experience in stakeholder engagement, feasibility studies, and strategic planning. He is currently involved in projects for the sustainable management of tree-based cash crops agroforestry and other climate smart cropping practices. He is also in dialogue with various ministries responsible for forest, agriculture, and the environment in Côte d’Ivoire to provide science-based insights into their activities and develop integrated management plans for the sustainable management of agroecological landscapes.

Related content

Explore the program

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

1    Olivia Crowe, et al., “A Global Assessment of Forest Integrity within Key Biodiversity Areas,” Biological Conservation 286 (2023),
https://www.sciencedirect.com/science/article/abs/pii/S0006320723003944.
2    Norman Myers, et al., “Biodiversity Hotspots for Conservation Priorities,” Nature 403 (2000), https://www.nature.com/articles/
35002501
; “Key Biodiversity Areas: Standards and Guidelines for Identifying KBAs,” KBA Partnership, last visited September 9, 2025, https://www.keybiodiversityareas.org/about-kbas.
3    Brittany T. Trew, “Predicting Near-future Deforestation in West African Key Biodiversity Areas to Inform Conservation Urgency,” bioRxiv, October 8 2024, https://www.biorxiv.org/content/10.1101/2024.10.07.616969v1.
4    James Mayers, Samuel Assembe-Mvondo, and Hang Zhou, “Enterprise in the Undergrowth: Exploring the Ways Chinese
Companies Operate in the Dja Forest in Cameroon,” African Study Monographs 43 (2023), 84–101, https://www.jstage.jst.go.jp/article/asm/43/0/43_43.84/_article; Anthony Baidoo, Philippe Méral, and Symphorien Ongolo, “Chinese-driven Ghana
Rosewood Trade: Actors and Access Dynamics,” Geoforum 146 (2023), https://www.sciencedirect.com/science/article/abs/pii/S0016718523001975?via%3Dihub; Feyi Ogunade, “Flora / Illegal Logging Cuts Deep into The Gambia’s Ecology and Economy,”Enact Observer, Institute for Security Studies, November 29, 2024, https://enactafrica.org/enact-observer/illegal-logging-cutsdeep-into-the-gambia-s-ecology-and-economy; “James Mayers, “China-Africa Forest Governance Project,” International Institute for Environment and Development, 2018, https://www.iied.org/china-africa-forest-governance-project; Julius Chupezi Tieguhong, “Illicit Trading in Africa’s Forest Products: Focus on Timber,” African Natural Resources Centre, 2021, https://aprm.dedicated.co.za/aprm/.galleries/files-elibrary_resource/illicit_timber_trade_report-1.pdf.
5    “The Rosewood Racket: China’s Billion Dollar Illegal Timber Trade and the Devastation of Nigeria’s Forests,” Environmental Investigation Agency, 2017, https://rosewoodracket.eia-global.org.
6    Solomon Obi, “China’s Impact on Reshaping African’s Infrastructure,” African Leadership, August 4, 2025, https://www.africanleadershipmagazine.co.uk/chinas-impact-on-reshaping-africas-infrastructure/.
7    Ilaria Dibattista, et al., “Socio-environmental Impact of Mining Activities in Guinea: The Case of Bauxite Extraction in the Region of Boké,”
Journal of Cleaner Production 387 (2023), https://www.sciencedirect.com/science/article/abs/pii/S0959652622052945via%3Dihub.
8    Sheridan Prasso, “China’s Quest for Iron,” Bloomberg, June 23, 2022, https://www.bloomberg.com/features/2022-china-africa-iron-mining-simandou-mountains.
9    Caroline Jepchumba Kibii, “Significance of REDD+ in Africa: Challenges and Probable Solutions,” European Union, 2022, https://op.europa.eu/en/publication-detail/-/publication/96b3cb11-139a-11ed-8fa0-01aa75ed71a1/language-en.
10    Oluwole Ojewale, “Nigeria and Cameroon Must Confront Timber Trafficking Together,” Institute for Security Studies, July 15, 2021, https://issafrica.org/iss-today/nigeria-and-cameroon-must-confront-timber-trafficking-together.
11    Oluwole Ojewale, “Nigeria and Cameroon Must Confront Timber Trafficking Together,” Institute for Security Studies, July 15, 2021, https://issafrica.org/iss-today/nigeria-and-cameroon-must-confront-timber-trafficking-together; “Case Study: Enabling Private Sector Investment for Forest Landscape Restoration through Multi-Partner Platforms in Africa: The Case of AFR100,” Partnerships for Forests, October 2022, https://partnershipsforforests.com/wp-content/uploads/2022/11/AFR100_Case_study_EXT.pdf.
12    Ojewale, “Nigeria and Cameroon Must Confront Timber Trafficking Together”; Labode Popoola, “Cross-border Trade in Forest Products and Services and Trade Impacts in West Africa,” African Forest Forum, 2014, 56, https://afforum.org/publications/crossborder-trade-forest-products-and-services-and-trade-impacts-west-africa.
13    “The Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES)” US Congress, August 27, 2025, https://www.congress.gov/crs-product/RL32751.
14    “The Rosewood Racket.”
15    Annika Hammerschlag, “Gambia Bans Exports of Endangered Rosewood; Enforcement Woes Remain,” VOA News, July 7, 2022, https://www.voanews.com/a/gambia-bans-exports-of-endangered-rosewood-enforcement-woes-remain/6649532.html. Nijman, Vincent & Siriwat, Penthai & Shepherd, Chris. (2021). Inaccuracies in the reporting of volume and monetary value of large-scale rosewood seizures. Forest Policy and Economics. 134. 102626. 10.1016/j.forpol.2021.102626.
16    “Illegal Logging in SSA by FCN,” Financial Crime News, 2020, https://thefinancialcrimenews.com/wp-content/uploads/2020/08/Illegal-Logging-SSA-by-FCN-2020.pdf; Miranda Montero, et al., “Illegal Logging, Fishing, and Wildlife Trade: The Costs and How to Combat It,” World Bank Group, October 1, 2019, http://documents.worldbank.org/curated/en/422101574414576772.
17    Eric M. Kioko, “Forest Crime in Africa: Actors, Markets and Complexities” in African Futures, 2022, 125–140, https://brill.com/display/book/9789004471641/BP000021.xml.
18    Montero, et al., “Illegal Logging, Fishing, and Wildlife Trade.”
19    “The Economic Impacts of Illegal Agro-Conversion on Tropical Forest Countries: A New Framework Supports National and Global Cost Estimates,” Forest Trends Information Brief, June 2018, https://www.forest-trends.org/wp-content/uploads/2018/06/Info-Brief-Costs-of-Illegal-Agro-Conversion_Final.pdf.
20    Montero, et al., “Illegal Logging, Fishing, and Wildlife Trade.”
21    “Illegal Logging in SSA by FCN.”
22    Ogunade, “Flora / Illegal Logging Cuts Deep into The Gambia’s Ecology and Economy”; “Shipping the Forest, ”Environmental Investigation Agency, May 14, 2024, https://eia.org/wp-content/uploads/2024/06/EIA_US_Mozambique_Timber_Report_0424_FINAL_SINGLES-5-13.pdf.
23    “The Rosewood Racket.”
24    “Poached Timber: Forest Crimes, Corruption, and Ivory Trafficking in the Malian Rosewood Trade with China, May 18, 2022, https://eia.org/wp-content/uploads/2022/05/EIA_US_Mali_Timber_report_0422_FINAL.pdf.
25    Iván Navarro Milián, et al., “Alert 2022! Report on Conflicts, Human Rights, and Peacebuilding,” United Nations Office of the Special Representative of the Secretary-General on Sexual Violence in Conflict, February 2022, https://www.un.org/sexualviolenceinconflict/wp-content/uploads/2022/06/report/alert-2022-report-on-conflicts-human-rights-and-peacebuilding/Alert-2022.-Report-onconflict-human-rights-and-peacebuilding.pdf; Christian Ani, “Timber Logging Drives JNIM’s Expansion in Mali,” Institute for Security Studies, June 19, 2024, https://issafrica.org/iss-today/timber-logging-drives-jnim-s-expansion-in-mali.
26    “The Rosewood Racket.”
27    Ibid.
28    “Historic Endangered Timber Smuggling Case Revealed Between Nigeria and China,” Environmental Investigation Agency, November 9, 2017, https://eia.org/press-releases/historic-endangered-timber-smuggling-case-revealed-between-nigeria-and-china/#:~:text=WASHINGTON%2C%20DC%20%E2%80%93%20One%20of%20the,million%2C%20were%20laundered%20into%20China.
29    Suyash Padhye, Jenan Almullaali, and Makarand Hastak, “Geospatial Analysis of China’s Overseas Development Finance (CODF) Projects with Protected Areas in Africa,” Proceedings of the 23rd CIB World Building Congress, Purdue University, May 2025, https://docs.lib.purdue.edu/cib-conferences/vol1/iss1/36/.
30    Terrence Neal, “The Environmental Implications of China-Africa Resource-Financed Infrastructure Agreements: Lessons Learned from Ghana’s Sinohydro Agreement,” Nicholas Institute for Environmental Policy Solutions, March 2021, https://nicholasinstitute.duke.edu/sites/default/files/publications/The-Environmental-Implications-of-China-Africa-Resource-Financed-Infrastructure-Agreements-Lessons-Learned-from-Ghana%E2%80%99s-Sinohydro-Agreement.pdf; Sebastian Purwins, “Bauxite Mining at Atewa Forest Reserve, Ghana: A Political Ecology of a Conservation-exploitation Conflict,” GeoJournal 87 (2022), 1085–1097, https://link.springer.com/article/10.1007/s10708-020-10303-3.
31    “Chinese Group Invests in Sierra Leone Rubber,” Tyrepress, January 24, 2012, https://www.tyrepress.com/2012/01/chinese-groupinvests-in-sierra-leone-rubber/; Samuel Assembe-Mvondo, et al., “What Happens When Corporate Ownership Shifts to China? A Case Study on Rubber Production in Cameroon,” European Journal of Development Research 28 (2015), 465–478, https://link.springer.com/article/10.1057/ejdr.2015.13; Xavier Aurégan, “Les Investissements Publics Chinois Dans Les Filières Agricoles Ivoiriennes,” Cahiers Agricultures 26, 1 (2017), https://www.cahiersagricultures.fr/fr/articles/cagri/abs/2017/01/cagri160051/cagri160051.html; “ADF-16 Report 2023: The African Development Fund Evaluates the Transformative Effect of Its Interventions in Africa,” African Development Fund, December 2, 2024, https://adf.afdb.org/adf-16-report-2023-the-african-development-fund-evaluatesthe-transformative-effect-of-its-interventions-in-africa/.
32    “Chinese Rubber Plantations in Cameroon Destroy the Lives and Livelihoods of the Baka,” African Defense Forum, August 22, 2023, https://adf-magazine.com/2023/08/chinese-rubber-plantations-in-cameroon-destroy-the-lives-and-livelihoods-of-the-baka/; “Guidelines on Free, Prior and Informed Consent,” UN-REDD Programme, July 30, 2018, https://www.un-redd.org/document-library/guidelines-free-prior-and-informed-consent.
33    “Out of Africa: How West and Central Africa Have Become the Epicentre of Ivory and Pangolin Scale Trafficking to Asia,” Environmental Investigation Agency, December 2020, https://eia-international.org/wp-content/uploads/2020-Out-of-Africa-SPREADS.pdf; Zwannda Nethavhani, Catherine Maria Dzerefos, and Raymond Jansen, “Scaly Trade: Analyses of the Media Reports of Pangolin (Pholidota) Scale Interceptions Within and Out of Africa,” Global Ecology and Conservation 61 (2025), https://www.sciencedirect.com/science/article/pii/S2351989425002707?via%3Dihub; Alisa Davies, et al., “Live Wild Bird Exports from West Africa: Insights into Recent Trade from Monitoring Social Media,” Bird Conservation International 32, 4 (2022), 559–572, https://www.cambridge.org/core/journals/bird-conservation-international/article/abs/live-wild-bird-exports-from-west-africa-insights-into-recent-tradefrom-monitoring-social-media/4A01FE8DBD90A1095F3557F55219994C.
34    Dumenu, “Assessing the Impact of Felling/Export Ban and CITES Designation on Exploitation of African Rosewood (Pterocarpus Erinaceus).”
35    Kelly Sims Gallagher and Qi Qi, “Chinese Overseas Investment Policy: Implications for Climate Change,” Global Policy 12 (2021), 260–272, https://onlinelibrary.wiley.com/doi/10.1111/1758-5899.12952.
36    Hiromitsu Samejima, “Summary for Business Entities: Revised Forest Law and Status of Timber Legality Verification by Business Entities in China,” Institute for Global Environmental Strategies, 2023, https://www.iges.or.jp/system/files/publication_documents/pub/commissioned/12847/Summary_China%20technical%20report%20in%20EN_final.pdf.
37    “Timber Legality Risk Dashboard: China,” Forest Trends, October 2021, https://www.forest-trends.org/wp-content/uploads/2022/01/China-Timber-Legality-Risk-Dashboard-IDAT-Risk.pdf.
38    “Forest Law Enforcement, Governance and Trade—the European Union Approach,” European Forest Institute, 2008, https://openknowledge.fao.org/server/api/core/bitstreams/8287d950-35a6-4aaa-9d66-c32295b06134/content; “The Forest Law Enforcement, Governance and Trade Regulations 2012,” UK Statutory Instruments, 2012, https://www.legislation.gov.uk/uksi/2012/178/contents; Matilda Miljand, et al., “Voluntary Agreements to Protect Private Forests—A Realist Review,” Forest Policy and Economics 128 (2021), https://www.sciencedirect.com/science/article/pii/S1389934121000630?via%3Dihub.

The post Chinese demand for timber and wildlife in West Africa: Responding to the environmental and social impacts appeared first on Atlantic Council.

]]>
Chinese fishing in West Africa: Responding to the environmental and social impacts https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/chinese-fishing-in-west-africa/ Mon, 06 Oct 2025 12:30:00 +0000 https://www.atlanticcouncil.org/?p=878295 Chinese companies have rapidly expanded into West Africa’s fishing sector, often operating illegally in prohibited coastal waters.

The post Chinese fishing in West Africa: Responding to the environmental and social impacts appeared first on Atlantic Council.

]]>

Editors’ introduction

In May 2025, the China Global South Initiative (CGSi), a collaboration between the Keough School of Global Affairs and the Atlantic Council Global China Hub, convened a group of twenty-two African environmental experts at the Peduase Valley Resort in Ghana for a three-day workshop on China’s environmental impact in West Africa. This policy workshop, hosted with the support of the Ford Foundation, included representatives from eleven West African countries—Benin, Burkina Faso, Cameroon, Cote d’Ivoire, Ghana, Liberia, Mali, Nigeria, Senegal, Sierra Leone, and Togo—and South Africa. Amid three days of comradery and collaboration, these experts worked together to draft policy memorandums on China’s environmental impact across the region. In the months following the workshop, we worked closely with the authors to curate three briefs—on mining and resource extraction, timber and wildlife, and fisheries and water resources—that identify the challenges and offer actionable policy solutions. We would like to recognize the excellent work of the co-authors who contributed their time and expertise to creating these briefs. In particular we would like to thank the group leaders Abosede Omowumi Babatunde, Ebagnerin Jérôme Tondoh, and Ebimboere Seiyafa and Awa Niang Fall, respectively, for their diligent work.

First and foremost, we would like to thank Caroline Costello, assistant director of the Atlantic Council’s Global China Hub, for her essential contributions to the workshop in Ghana and this collection of issue briefs. Her tireless efforts were truly essential to the success of the project. Ashley Bennett, events strategy program director of the University of Notre Dame’s Keough School of Global Affairs, provided critical logistical support across a dozen countries. Alexandra Towns at the Keough School and Cate Hansberry, Beverly Larson, and Jeff Fleischer at the Atlantic Council provided expert editorial support. Guidance from Notre Dame’s Pamoja Africa Initiative helped us identify contributors, and the Kellogg Institute helped support their participation. We would also like to thank the excellent staff of the Peduase Valley Resort for their hospitality during the May 2025 workshop. Last, but not least, we would like to thank our partner, the Ford Foundation, whose support made the workshop and these policy briefs possible. Ford is not responsible for the content of these policy briefs.


Bottom lines up front

  • Chinese companies—including both state-backed firms and private actors—have rapidly expanded into West Africa’s fishing sector, often operating illegally in prohibited coastal waters.
  • Chinese vessels employ bottom trawling and other destructive methods, which—combined with limited oversight and poor enforcement of national and transboundary laws—have caused declining fish stocks, weakened local fishery economies, and deteriorated coastal water quality.
  • This brief examines the ecological and social risks posed by Chinese fishing in West Africa and offers policy recommendations to strengthen legal protections and enhance regional cooperation to safeguard the region’s fisheries and water systems.

Executive summary

Overfishing by Chinese trawlers poses a serious threat to West Africa’s rich fisheries and water resources, endangering regional food security, national economies, and local livelihoods. Chinese companies— including state-backed firms and private actors—have rapidly expanded into the region’s fishing sector, often operating illegally in prohibited coastal waters. Hundreds of Chinese vessels now fish off the West African coast, primarily between Senegal and Mauritania. These vessels are much larger than the artisanal canoes used by local fishermen and easily outcompete them. The expansion of Chinese companies’ fishery operations and overfishing in the region strains marine and freshwater ecosystems and undermines longstanding livelihoods of traditional fishing communities. Chinese vessels employ bottom trawling and other destructive methods, which—combined with limited oversight and poor enforcement of national and transboundary laws—have caused severe environmental degradation and declining fish stocks, weakened local economies, and deteriorated coastal water quality. At the same time, inland fish populations—especially in transboundary rivers such as the Falémé, Niger, and Volta—continue to decline due to runoff pollution from Chinese companies’ illegal mining operations. This policy brief examines the ecological and social risks posed by Chinese trawlers’ fishing in West Africa, and offers policy recommendations to strengthen legal protection and enhance regional cooperation to safeguard the region’s fisheries and water systems.

Background

Fisheries and aquaculture are vital to West Africa’s food security and economy—contributing more than 15 percent of regional gross domestic product (GDP), with Nigeria, Senegal, and Ghana accounting for 70 percent of total production.1 Fish are the main source of animal protein for more than 60 percent of households in the region, which produces 32 percent of Africa’s annual fish catch and 21 percent of its aquaculture in Africa.2

In recent decades, growing concerns have emerged among environmental experts, national policymakers, and coastal communities in West Africa about the environmental and socioeconomic effects of China’s expanding role in the region’s fisheries and water resources. Chinese firms’ involvement— driven by the depletion of domestic fish stocks—now extends throughout West African countries’ Exclusive Economic Zones (EEZs), major rivers, and shared transboundary watersheds.

Small-scale, artisanal local fishermen are no match for the larger, more powerful Chinese trawlers, which engage in both legal and illegal fishery activities, often exploiting weak local regulations, limited enforcement capacity, and the complicity of corrupt local actors.3 The lack of coordinated monitoring
and limited presence of enforcement agencies, such as coast guards or marine patrols, have enabled these fleets to operate with minimal oversight.4 China’s sizeable investments in industrial fishing—backed by state subsidies, low-interest loans, and tax exemptions—has resulted in growing instances of illegal, unreported, and unregulated (IUU) fishing in West Africa, ultimately undermining the long-term sustainability of the region’s fishery stocks.5

Besides fishing, Chinese companies’ activities in mining, dredging, and infrastructure development compound pressures on water quality and aquatic ecosystems, with direct implications for fishery sustainability. Gold mining operations, particularly those involving mercury and cyanide, have contaminated rivers and their fish with harmful chemicals.6 Bucket excavators used in mining operations deposit oils, fuels, and alluvium into riverbeds, which causes erosion, changes the shape of river channels, and damages ecosystems. Dredging also stirs up sediments, turning clear water murky. This increased cloudiness, known as high turbidity, makes water hazardous for drinking and affects aquatic ecosystems.7 The consequences of mine-related pollution extend to upstream catchments and transboundary river basins with socioeconomic and ecological importance, including the Tano-Bia Basin (Ghana and Côte d’Ivoire), the Falémé River (Senegal and Mali), and the Bagoé River (Côte d’Ivoire and Mali).8

West African governments face structural obstacles in addressing Chinese vessels’ impact on fisheries and water resources, including under-resourced enforcement agencies and outdated legal frameworks that hinder effective regulation and governance. Corruption—particularly at the local level, where Chinese fishers sometimes pay communities not to report illegal fishing and mining—weakens oversight.9 Political and business elites with vested interests in fishery ventures involving Chinese companies often obstruct reform or weaken enforcement. Moreover, the presence of non-state armed groups in key maritime zones, such as the Gulf of Guinea, hampers monitoring and leaves fisheries and waterways increasingly vulnerable to exploitation by Chinese trawlers.10

These governance challenges are further compounded by West African states’ dependence on loans from China’s state-owned banks and infrastructure projects, which have reduced their bargaining power and undermined their ability to hold Chinese companies accountable. Despite the existence of regional initiatives such as the Economic Community of West African States Agricultural Policy (ECOWAP) and the African Common Fisheries Policy, implementation has remained weak.11 Taken together, these impediments to enforcement leave marine and freshwater sectors neglected, allowing the associated environmental and social devastations to persist.

Evidence

China’s fishing fleet is currently considered the largest in West Africa, with nearly 17,000 vessels and annual catch amounting to roughly $3.8 billion.12 Chinese vessels benefit from state subsidies and advanced fishing technologies, enabling them to overwhelm local fisheries, leaving artisanal fishers unable to compete. In Ghana, local fishermen in wooden canoes have drowned after their small boats capsized in the wakes of large Chinese vessels.13

Many Chinese fishing companies exploit poorly regulated licensing systems to conceal vessel ownership, engaging in joint partnerships with local actors, operating through local intermediaries, or registering as subsidiaries of local operators.14 Using local companies as legal fronts allows Chinese firms to circumvent fishing license laws that prevent foreign vessels from operating within national EEZs.15 Meanwhile, local corruption and collusion between China’s fishing operations and local political elites further stifles law enforcement.

Chinese industrial vessels operating in West African waters often fish in prohibited zones and use illicit practices such as dynamite, illegal nets, and chemicals that harm marine life and pollute waters.16 The impacts of these destructive techniques on local coastal communities in West Africa are profound. In Nigeria, Senegal, and Ghana, which account for 70 percent of the region’s fish production, foreign vessels dominate the industry, undercutting local economies and ecosystems.17

Due to illegal fishing, small-scale fishers, many of them women working in fish processing and sales, face declining catches and rising unemployment.18 Illegal fishing has led to over 300,000 losses in artisanal and traditional fish related jobs in West Africa. In 2018, illegal fishing cost Nigeria an estimated $70 million.19 In Ghana, Chinese firms’ fleets engage in saiko, a form of illegal fishing in which industrial trawlers deliberately catch and resell small, juvenile fish at sea.20 By catching undersized fish, they undermine the sustainability of fish populations in the region’s marine ecosystems. This illegal fishing practice threatens the livelihoods of coastal communities that rely on sustainable fishing for survival.21

The abuse and neglect of local workers is common on Chinese fishing vessels. Interviews by the Environmental Justice Foundation found that 94 percent of Ghanaian crew members received inadequate medicine or witnessed verbal abuse.22 One fisherman claims that he was treated like a “slave”: beaten, spit on, starved, forced to drink dirty water, and witnessed the deaths of three other African fishermen due to neglect and abuse.23 In Ghana and Senegal, local communities have reported labor violations and bribery involving local officials—practices that undermine local governance and strain relations between China and West African countries.24

Industrial pollution is another major concern. Chinese vessels and processing plants routinely discharge harmful waste into both marine and inland waters. Pollution from Chinese-owned fishmeal factories has been reported in The Gambia, where the process contaminates inland waters, killing fish and precipitating the collapse of some local lagoons.25 Gold mining operations, particularly those involving mercury and cyanide, are a public health menace, contaminating rivers and groundwater and threatening both fish and crops. Chinese companies dredging and mining operations have polluted and deformed the Falémé River in Senegal and Mali and the Bagoé River in Côte d’Ivoire and Mali, reducing the productivity of local fisheries and farmlands.26 China’s infrastructure development has further complicated water governance. The construction of the Lekki Deep Seaport in Lagos, for example, has severely disrupted local water and fishery ecosystems.27

Efforts by individual countries—such as Ghana’s Fisheries Commission and Nigeria’s new Ministry of Marine and Blue Economy—have been undermined by weak institutional capacity and limited financial investment.28 In Togo, understaffing and poor coordination among fisheries and water institutions undermine enforcement despite the country’s accession to the Port State Measures Agreement (PSMA) to combat illicit and unregulated fishing.29 The presence of armed groups in the Gulf of Guinea inhibits enforcement officers’ ability to conduct the surveillance and monitoring necessary to curb illegal activity and protect marine sovereignty.30 These multilayered security challenges underscore the urgent need for national and regional policy interventions to improve oversight and safeguard the sustainability of fisheries and water resources by regulating Chinese fishers exploitation in the EEZs of West African countries.

Policy recommendations

  • Implement stricter penalties. Penalize local fishing companies that collaborate with Chinese trawlers to circumvent fishing license laws and other environmental policies. Fines, vessel confiscation, and blacklisting mechanisms should be introduced for companies and individuals acting as intermediaries to enable illegal fishing or the dumping of waste and pollutants into marine and freshwater systems.
  • Revise outdated fisheries and water resource policies. Update policies and laws to reflect current realities including the rapid expansion of industrial-scale overfishing, invasive ballast discharge by foreign vessels, and plastic waste pollution. Policymakers should engage all relevant stakeholders—including small-scale fishers, processors, local nongovernmental organizations and local communities—to revise existing laws and policies. New laws should clearly outline regulatory loopholes and specify new monitoring and enforcement mechanisms to address them.
  • Invest in the navy and the coast guard. To better monitor China’s illegal fishing activities along their coasts and EEZs, West African countries should invest in increasing the capacity—through better equipment and training—of their navy, coast guard, and other maritime security and enforcement agencies. Port authorities, coast guards, and inland water management units must be trained and incentivized to enforce existing environmental standards effectively and consistently.
  • Work with the Sub-Regional Fisheries Commission (SRFC). The SRFC, based in Dakar, Senegal, should grow its policy influence in West Africa by coordinating closely with member states to develop regional policies and guidelines for dealing with overexploitation. The SRFC can become the regional hub for the harmonization of fishery laws, joint patrols, and shared resource management.

Improve regional monitoring and surveillance

  • Develop a regional real-time monitoring system to track water resources, illegal activities, and waste dumping. The system should integrate satellite data, citizen reporting platforms, and automatic identification systems (AIS) to create a comprehensive monitoring web across the Gulf of Guinea and key river basins. AIS are positional awareness systems used to identify ships and provide additional information such as location, speed, intended port of call, prior identities, and activity history. They give authorities a full view of ships’ likely involvement in illegal fishing activity.31 Ghana has already employed AIS tools as part of its Vessel Viewer pilot program, and has seen success in strengthening its monitoring, control, and surveillance operations.32 AIS should be made mandatory for all industrial vessels operating in West African EEZs, with remote data made accessible to national and regional authorities.
  • Develop public reporting systems. Growing public anger and grassroots activism have the potential to force governments to respond to these challenges, even if elites prefer the status quo. Highly publicized labor abuses, coupled with increasing resentment toward corrupt officials, exact a reputational toll. Civil society campaigns should seek to channel this anger into action, standing up platforms that allow citizens to anonymously report bad actors, including vessels, companies, complicit government officials, and intermediaries involved in illegal fishing or toxic waste disposal. This system should offer multiple online reporting options. This system should begin on the national level with an eye toward expanding to the regional level. By democratizing the response to this problem, civil society leaders can diversify oversight away from a small group of corrupt actors and elite gatekeepers. By demonstrating to officials that the desire for public monitoring is widespread, a successful reporting system will also be a mechanism for generating greater political will for change.

Promote sustainable fisheries agreements and mechanisms

  • Empower the Economic Community of West African States (ECOWAS) to promote transboundary cooperation on shared waterways. Joint watershed management programs should be established to address shared pollution risks, dam regulation, and hydrological data sharing. This should begin with transboundary river systems such as the Volta Basin, the Falémé, and the Tano-Bia. ECOWAS could promote multilateral agreements and provide a multinational venue for promoting data sharing and enabling enforcement transboundary agreements. Working multilaterally can help override local elite resistance, as reform-minded officials can justify enforcement by citing binding regional commitments and reputational risks within ECOWAS.
  • Negotiate regional fisheries agreements with China that prioritize the interests of coastal communities. Enforced under ECOWAS, these regional agreements should emphasize environmental sustainability, verifiable catch quotas, mandatory gear and equipment specifications, and designated no-fishing zones.

About the authors

Ellis Adjei Adams is an associate professor of geography and environmental policy at the Keough School of Global Affairs, University of Notre Dame. With background in both social and natural sciences, his research examines the social, political, institutional, and governance dimensions of environmental and natural resources, particularly water. He currently conducts research in Ghana, Malawi, Kenya, Uganda, and the United States.

Awa Niang Fall is full professor of physical geography at Cheikh Anta Diop University, in Dakar, Senegal. Since 2010 she has been involved in the African Networks of Centres of Excellence on Water Sciences Project, and leads the Master/UNESCO Chair on Integrated Management and Sustainable Development of West African coastal zone (Master GIDEL). Since June 2022 she has been coordinating the European Union-funded GoNEXUS project on behalf of UCAD, covering 6 river basins in Europe and Africa.

Kadidia Kane is a Malian civil servant working at the Mopti Regional Hydraulics Directorate. She holds a degree in hydrogeology engineering and a master’s degree in integrated water resources management. She currently serves as Head of the Water Resources Inventory and Management Division within this directorate, where she is involved in all activities related to water and related resource management.

Kodjo N’Souvi holds a master’s degree in economic analysis and policy and a doctorate in agricultural economics, majoring in fisheries economics and management. He is currently working as post-doctoral research associate at the College of Economics and Management, Shanghai Ocean University, China. His major area of research includes economics of aquaculture, namely shrimp, the socioeconomics of small-scale fisheries, sustainable fisheries, aquaculture development, and climate change.

Isa Olalekan Elegbede is a distinguished environmental assessment, planning, and sustainability expert focusing on marine sustainability and the blue economy. He is the Deputy Chair of IUCN/CEESP/TGER, Switzerland, and a Future Earth Coast (FEC) Fellow. Dr. Elegbede plays a key role in shaping policies for sustainable fisheries management and marine governance through his contributions to the Central and South Atlantic Regional Scientific Research Working Group and as a co-chair of the GEO BON Blue Planet Fisheries Working Group.

Ebimboere Seiyefa is a lecturer at Baze University in the department of international relations and diplomacy, with a background in politics, governance and security in West Africa. She has worked with Conflict Research Network West Africa, ACLED, NATO Southern Hub and USIP, amongst other institutions, to advance human security initiatives towards a peaceful West Africa.

Salamatu J. Tannor is a certified Mining HSE Professional with an interdisciplinary background in natural sciences. She is currently working as postdoctoral research associate at the Faculty of Life Sciences, Rhine-Waal University of Applied Sciences Kleve, Germany. Her research interests include the interactions of global economic systems such as mining and agribusinesses with other socio-ecological systems (people & water) within rural landscapes.

Related content

Explore the program

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

1    “Comprehensive Strategic Framework for Sustainable Fisheries and Aquaculture Development (CSFS FAD),” ECOWAS Commission, Department of Agriculture, Environment and Natural Resources, and Directorate of Agriculture and Rural Development, October 2019, https://ecowap.ecowas.int/media/ecowap/file_document/2019_Regional_strategy_Fisheries__Aquaculture_CSFSFAD_EN.pdf; “The Future of Marine Fisheries in the African Blue Economy,” Africa Development Bank Group, May 4, 2022, https://www.afdb.org/en/documents/future-marine-fisheries-african-blue-economy.
2    “Africa Program for Fisheries,” World Bank, last visited August 25, 2025, https://www.worldbank.org/en/programs/africa-program-for-fisheries; “Fisheries and Aquaculture,” Regional Agency for Agriculture and Food, last visited August 25, 2025, https://www.araa.org/en/fisheries-and-aquaculture.
3    “Is China’s Fishing Fleet Taking All of West Africa’s Fish?” BBC News, YouTube video, March 26, 2019, https://www.youtube.com/watch?v=nUClXFF2PKs; Edmund C. Merem, et al., “Analyzing the Tragedy of Illegal Fishing on the West African Coastal Region,” International Journal of Food Science and Nutrition Engineering 9, 1 (2019), 1–15, https://www.researchgate.net/publication/332327658_Analyzing_the_Tragedy_of_Illegal_Fishing_on_the_West_African_Coastal_Region.
4    Ifesinachi Okafor-Yarwood, et al., “Survival of the Richest, Not the Fittest: How Attempts to Improve Governance Impact African Small-Scale Marine Fisheries,” Marine Policy 135 (2002), https://www.sciencedirect.com/science/article/pii/S0308597X21004589.
5    Juan He, “From Distant-Water Fisher to Investor: Enhancing China’s State Responsibilities for Legal and Sustainable Fisheries in Coastal Africa,” Coastal Management 53, 1 (2025), 71–91, www.tandfonline.com/doi/full/10.1080/08920753.2025.2457308; Sam Geall, et al., “Charting a Blue Future for Cooperation between West Africa and China on Sustainable Fisheries,” Stimson Center, September 14, 2023, www.stimson.org/2023/charting-a-blue-future-for-cooperation-between-west-africa-and-china-on-sustainable-fisheries/.
6    Richard Takyi, et al., “Socio-ecological Analysis of Artisanal Gold Mining in West Africa: A Case Study of Ghana,” Journal of Sustainable Mining 20, 3 (2021), 206–219, https://jsm.gig.eu/cgi/viewcontent.cgi?article=1322&context=journal-of-sustainable-mining.
7    Ibid.
8    Noah Kyame Asare-Donkor and Anthony Apeke Adimado, “Influence of Mining Related Activities on Levels of Mercury in Water, Sediment and Fish from the Ankobra and Tano River Basins in South Western Ghana,” Environmental Systems Research 5, 1 (2016), 5, https://environmentalsystemsresearch.springeropen.com/articles/10.1186/s40068-016-0055-4; Mouhamadou Lamine Diallo, et al., “Gold Mining, Discourses, and Threats: What Is Really Damaging the Fluvial Hydrosystem of the Faleme River?” Journal of Political Ecology 32 (2024), https://journals.librarypublishing.arizona.edu/jpe/article/id/5949/; Augustin Kouame N’Guessan, et al., “Clandestine Gold Mining and Pollution Risks of Sediments from Bagoue River (Niger Watershed. Cote d’Ivoire),” International Journal of Fisheries and Aquatic Studies 9, 4 (2021), 149–158, https://www.researchgate.net/publication/354700049_International_Journal_of_Fisheries_and_Aquatic_Studies_2021_94_149-158_Clandestine_gold_mining_and_pollution_risks_of_sediments_from_Bagoue_river_Niger_watershed_Cote_d’Ivoire.
9    Torbjörn Wester, “‘They Are Stealing What Should Be Ours’: Chinese Trawlers Are Emptying West African Fishing Grounds,” Telegraph, June 5, 2023, https://www.telegraph.co.uk/global-health/climate-and-people/how-chinese-trawlers-are-emptying-westafrican-fishing-grou/; George Wright and Thomas Naadi, “Ghana Fishing: Abuse, Corruption and Death on Chinese Vessels,” BBC, January 3, 2023, https://www.bbc.com/news/world-africa-63720181.
10    Rossella Marangio, “Deep Waters: The Maritime Security Landscape in the Gulf of Guinea,” European Union Institute for Security Studies, January 9, 2025, https://www.iss.europa.eu/publications/briefs/deep-waters-maritime-security-landscape-gulf-guinea.
11    Aboubacar Sidibé, “Diagnostic on the Effectiveness of National Fishery and Aquaculture Policies and Strategies for Food and Nutrition Security in West Africa,” Food and Agriculture Organization of the United Nations, August 2020, https://openknowledge.fao.org/server/api/core/bitstreams/e250dc02-a76f-46ab-8521-36decdc49e76/content.
12    Miren Gutiérrez et al., “China’s Distant-Water Fishing Fleet: Scale, Impact and Governance,” ODI, June 2020, https://media.odi.org/documents/chinesedistantwaterfishing_web.pdf. Mark Godfrey, “China’s Distant-Water Majors Stung by Poor Results despite Bullish Market Conditions,” SeafoodSource, December 22, 2021, https://www.seafoodsource.com/news/business-finance/chinasdistant-water-majors-stung-by-poor-results-despite-bullish-market-conditions.
13    Wester, “‘They Are Stealing What Should Be Ours.’”
14    Kate Bartlett, “Fishy Business: Report Details Chinese Fleet’s Illegal Operations in West Africa,” VOA News, April 7, 2022, https://www.voanews.com/a/fishy-business-report-details-chinese-fleet-s-illegal-operations-in-west-africa-/6519387.html.
15    Andrew Jacobs, “Chinese Fleets Illegally Fish in West African Waters, Greenpeace Says,” New York Times, May 20, 2015, https://www.nytimes.com/2015/05/21/world/asia/china-west-africa-fishing-greenpeace.html; Lu Xinqing, “China’s Distant-Water Fishing and Its Impact in West Africa,” China Global South Project, June 21, 2021, https://chinaglobalsouth.com/analysis/chinas-distantwater-fishing-and-its-impact-in-west-africa; Robert Paarlberg, “West Africa’s Falling Fish Stocks: Illegal Chinese Trawlers, Climate Change and Artisanal Fishing Fleets to Blame,” Conversation, April 9, 2024, https://theconversation.com/west-africas-falling-fish-stocks-illegal-chinese-trawlers-climate-change-and-artisanal-fishing-fleets-to-blame-226819#:~:text=Chinese%20companies-%2C%20thinly%20disguised%20as,had%20a%20chance%20to%20reproduce.
16    Wester, “‘They Are Stealing What Should Be Ours.’”
17    “The Future of Marine Fisheries in the African Blue Economy.”
18    Blamé Ekoue and Mamah Djiman Hairith, “Danger at Sea—West Africa’s Scourge of Foreign Fleets,” Africa in Fact, February 4, 2025, https://africainfact.com/danger-at-sea-west-africas-scourge-of-foreign-fleets.
19    “Nigeria Loses $70m to Illegal Fishing,” Nation, May 6, 2021, https://thenationonlineng.net/nigeria-loses-70m-to-illegal-fishing/#-google_vignette.
20    Victor Owusu, Rosina Sheburah Essien, and Moses Adjei, “The Same Old Story: ‘Saiko’ Practices and Coastal Livelihoods in Ghana’s Small-Scale Fisheries,” Marine Policy 173 (2025), https://www.sciencedirect.com/science/article/abs/pii/S0308597X24005736.
21    Lieven Engelen, “Under Cover of Darkness: The Damaging Effects of Illegal ‘Saiko’ Fishing,” Guardian, October 17, 2022, https://www.theguardian.com/environment/2022/oct/17/ghana-coastal-fishing-villages-industrial-trawling-saiko-illegal.
22    Wright and Naadi, “Ghana Fishing.”
23    Ibid.
24    Ibid.
25    Fatou Hadim Jobe, “The Cycle of Inequity in Fishmeal Factories in The Gambia,” Ocean Nexus, 2025, https://oceannexus.org/2025/01/07/the-cycle-of-inequity-in-fishmeal-factories-in-the-gambia; “When Chinese Trawlers Plunder West African Water,” Maritime Crimes, July 7, 2023, https://maritimescrimes.com/2023/07/07/when-chinese-trawlers-plunder-west-african-waters; Ian Urbina, “The Factories Turning West Africa’s Fish into Powder,” BBC, March 23, 2021, https://www.bbc.com/future/article/20210323-the-factories-turning-west-africas-fish-into-powder.
26    El Hadji Serigne Top, et al., “Gold Mining, Discourses, and Threats: What Is Really Damaging the Fluvial Hydrosystem of the Faleme River?” Journal of Political Ecology 32 (2024), 869–887, https://journals.librarypublishing.arizona.edu/jpe/article/5949/galley/6588/download/.
27    Ibrahim Adeyemi, “Cost of Development? How Lagos $1.5 Billion Seaport Altered Fortunes of Local Communities,” Premium
Times, June 18, 2023, https://rainforestjournalismfund.org/stories/cost-development-how-lagos-15-billion-seaport-altered-fortunes-local-communities.
28    Aboubacar Sidibé, “Diagnostic on the Effectiveness of National Fishery and Aquaculture Policies and Strategies for Food and Nutrition Security in West Africa,” Food and Agriculture Organization of the United Nations, August 2020, https://openknowledge.fao.org/server/api/core/bitstreams/e250dc02-a76f-46ab-8521-36decdc49e76/content.
29    Kodjo N’Souvi, et al., “Fisheries and Aquaculture in Togo: Overview, Performance, Fisheries Policy, Challenges and Comparative Study with Ghana, Mali, Niger and Senegal Fisheries and Aquaculture,” Marine Policy 132 (2021), https://www.sciencedirect.com/science/article/abs/pii/S0308597X2100292X?via%3Dihub.
30    Olusegun Paul Adesanya, “Maritime Crimes and the Gulf of Guinea,” Cogent Social Sciences 9 (2023), https://www.tandfonline.com/doi/full/10.1080/23311886.2023.2241263.
31    “AIS (Automatic Identification System) Overview,” NATO Media Centre, last visited August 20, 2025, https://shipping.nato.int/nsc/operations/news/2021/ais-automatic-identification-system-overview.
32    “Ghana Sees Major Improvements with Vessel Viewer,” Global Fishing Watch, December 3, 2024, https://globalfishingwatch.org/case-study/ghana-sees-major-improvements-with-vessel-viewer.

The post Chinese fishing in West Africa: Responding to the environmental and social impacts appeared first on Atlantic Council.

]]>
Enhancing NATO’s operational readiness through energy interoperability https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/enhancing-natos-operational-readiness-through-energy-interoperability/ Fri, 03 Oct 2025 16:00:00 +0000 https://www.atlanticcouncil.org/?p=878653 NATO forces are facing significant energy-related constraints that put interoperability at risk. The recent Hague Declaration committing 1.5 percent of GDP for infrastructure offers a way to address this.

The post Enhancing NATO’s operational readiness through energy interoperability appeared first on Atlantic Council.

]]>

NATO’s operational readiness faces a critical challenge as energy systems have become a primary military target in modern conflict. The most alarming example of this is Russia’s strikes on Ukraine’s grid, fuel depots, and pipelines. The attacks have disrupted both military operations and civilian life, cutting electricity to defense industries, constraining fuel supplies for frontline units, and forcing costly diversions of air defenses to protect critical infrastructure. Adversaries are also testing vulnerabilities across the Alliance, from cyberattacks on power networks in Poland to the sabotage of undersea power cables in the Baltic Sea, underscoring the risks to the energy infrastructure on which NATO operations depend. 

At the 2025 Hague Summit, allies agreed to raise defense spending to 5 percent of GDP by 2035, with up to 1.5 percent annually dedicated to protecting critical infrastructure, defending networks, and strengthening civil preparedness. The commitment offers NATO a timely opportunity to address energy as a core vulnerability and ensure that interoperability—from common fuel standards to compatible power systems—is embedded in future defense planning.

Enhancing energy interoperability would provide practical ways to keep forces powered and connected in the event of a disruption or attack by an adversary. Shared standards for fuels, power systems, and connectors would enable allied forces to operate more cohesively—if one nation’s supplies or infrastructure are disrupted, their forces could effectively “plug and play” using another ally’s systems to sustain operations. By directing resilience funds toward dual-use projects—such as interoperable charging networks, adaptable refueling corridors, and smart grids designed with military compatibility—member states can provide NATO forces with flexible infrastructure that ensures continuity of operations while also reinforcing civilian resilience.

Maximizing this opportunity will require NATO and its member states to align their approaches to energy as a tool of national security. By agreeing to collective interoperability standards, coordinating energy planning across governments, and creating structured mechanisms for industry engagement, NATO can ensure that energy becomes a source of strength rather than vulnerability.

View the full issue brief

about the authors

related content

stay connected

Sign up for PowerPlay, the Atlantic Council’s bimonthly newsletter keeping you up to date on all facets of the energy transition

explore our work

The Global Energy Center develops and promotes pragmatic and nonpartisan policy solutions designed to advance global energy security, enhance economic opportunity, and accelerate pathways to net-zero emissions.

The post Enhancing NATO’s operational readiness through energy interoperability appeared first on Atlantic Council.

]]>
Dissolving the fence: Improving utility privatization for defense installations’ resiliency https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/dissolving-the-fence-improving-utility-privatization-for-defense-installations-resiliency/ Fri, 03 Oct 2025 16:00:00 +0000 https://www.atlanticcouncil.org/?p=878602 US bases depend on increasingly vulnerable electricity systems. Utility privatization offers a key tool to ensure military installations' energy resilience.

The post Dissolving the fence: Improving utility privatization for defense installations’ resiliency appeared first on Atlantic Council.

]]>

US military power projection begins at home, with installations across the continental United States serving as hubs for command, force generation, logistics, and access to space and cyber domains. Yet these bases are deeply dependent on electricity systems that are increasingly vulnerable. Aging infrastructure, rising demand from advanced technologies, more frequent extreme weather, and mounting cyber threats all pose risks to the reliable power needed for mission readiness. This dependency exposes a persistent vulnerability at the very foundation of US defense.

Congress has directed that critical mission systems on US installations must have power available 99.9 percent of the time, but meeting this requirement is a major challenge. Efforts “inside the fence” to improve backup generation, microgrids, and maintenance are essential, but the fractured funding environment and “run to failure” mentality mean resilience often comes second to urgent demands. At the same time, “outside the fence,” the civilian utilities that installations depend on are struggling with transformer shortages, capacity constraints, and grid modernization challenges. Together, these pressures are widening the gap between mission requirements and the energy systems meant to sustain them.

Utility privatization offers one practical tool to close this gap. By transferring installation distribution assets to regulated utilities whose business model is to invest capital in grid reliability, the Department of Defense can align incentives, reduce bureaucratic delays, and unlock private-sector expertise. But with utilities facing regulatory and financial constraints of their own, deeper partnerships are needed—treating installations as a unique customer class, exploring flexible ownership structures, and integrating on-base assets like microgrids as contributors to both mission assurance and community resilience.

Meeting the installation energy challenge will require the Department of Defense to consolidate fragmented efforts into a coherent resilience strategy, strengthen engagement with utilities and regulators, and expand partnership models that bring innovation to scale. Reliable power is no longer a background requirement—it is a strategic imperative that determines whether US forces can project, fight, and sustain operations in a crisis.

Correction: A previous version of this piece misstated the location of an advanced microgrid on a military base. The base is Marine Corps Air Station Miramar.

View the full issue brief

About the authors

related content

stay connected

Sign up for PowerPlay, the Atlantic Council’s bimonthly newsletter keeping you up to date on all facets of the energy transition

Explore the program

The Global Energy Center develops and promotes pragmatic and nonpartisan policy solutions designed to advance global energy security, enhance economic opportunity, and accelerate pathways to net-zero emissions.

The post Dissolving the fence: Improving utility privatization for defense installations’ resiliency appeared first on Atlantic Council.

]]>
Turkey in the changing transatlantic trade environment https://www.atlanticcouncil.org/in-depth-research-reports/report/turkey-in-the-changing-transatlantic-trade-environment/ Tue, 30 Sep 2025 20:57:29 +0000 https://www.atlanticcouncil.org/?p=877179 Exploring Turkey's position in the changing global trade order and analysis of the opportunities and challenges facing the country.

The post Turkey in the changing transatlantic trade environment appeared first on Atlantic Council.

]]>
We already know 2025 will be remembered for its shocks to global trade. However, the shift from ever greater integration to fragmentation was well under way before President Donald Trump returned to the White House. The challenges experienced by the Turkish economy over the past fifteen years can be partly explained by a global retreat from the trade integration of the 1990s and early 2000s.

Until 2023, the domestic policy focus on boosting consumption was seen as an antidote to this problem. A charitable review of Turkey’s achievements would argue that its growth hasn’t been as badly affected by breakdowns in global trade as that of other countries. Nor is Turkey on the Trump administration’s “Dirty 15” list of markets that have a sizeable goods surplus with the United States, and on which the United States imposed an average tariff far higher than it did before Trump’s tariffs kicked in.

But that policy has brought its own problems—hyperinflation chief among them. It has also had negative consequences for Turkey’s trade balance, which is now firmly stuck in deficit with adjacent current account deficit challenges. The policy normalization under way since Turkey’s 2023 general election relies (among other internal shifts) on a rebalancing of the Turkish growth model, with a renewed emphasis on a trade balance supporting financial stability and rising living standards.

What can this mean in a world that is vastly different from the last time Turkey rode an export-led expansion wave? What clever policies need to be implemented to ensure Turkey harnesses opportunities and mitigates risks? This report will try to answer these questions.

Turkey in the global trade realignment

Over the past few months, the world has needed to adapt to the Trump administration’s high tariffs policy, which is more aggressive than markets and pundits expected. “Reciprocal” country-specific tariffs on any good imported into the United States start at 10 percent and often reach much higher. Given the administration’s self-professed goal of repatriating manufacturing to the United States, exemptions to this policy—even for essential inputs that are currently unavailable in the United States—are very rare.

For now, the Trump administration has shown an uncanny ability to anchor global debates and impose its tariffs without facing much retaliation. However, it seems the United States will remain a strange outlier with its completely different set of policies. Bilateral deals will sometimes bind partners into a specific rate for the United States (in return for a high US tariff lower than it otherwise might have been). But otherwise, markets are still following what has been the general practice of global trade for decades: Countries can set product-specific tariffs and balanced quotas applying to all World Trade Organization (WTO) members or they can enter bilateral trade agreements, which bring tariffs down and lift quotas if they apply.

The reassuring view broadcast by the Turkish government is that the Turkish economy is isolated from new US trade policy.1 The government also argues that Turkey does 80 percent of the value of its trade with markets with which it has a free-trade agreement (FTA). At 31.2 percent of imports and 41 percent of exports,2 the most important of these FTA partners remains the European Union (EU), whose customs union has included Turkey since 1995. The common external tariff policy could have put Ankara in a difficult position had the EU decided to retaliate against US tariffs. But it hasn’t.

Initially Turkey got the basic rate of “only” 10 percent but this was moved up to 15 percent when the EU managed to secure the same rate through the Turnberry deal. This is the bearable tariff rate Turkey will have to face for the foreseeable future, while having to apply slightly lower rates for US manufactured goods than before—as agreed between Trump and Commission President Ursula von der Leyen.

The less reassuring reality is that Turkey is trying to reverse its trade deficit at a time of global trade fragmentation. The International Monetary Fund (IMF) has shown that in the first decade of this century, when Turkish gross domestic product (GDP) accelerated rapidly, trade volume growth was 6.5 percent per annum on average and outpaced global GDP growth by more than  2 percentage points. This outpacing became negligible in the next decade: 3.7 percent trade growth for 3.5 percent GDP growth. In this decade, trade growth has been slightly behind GDP growth, and it might even start to become a drag in the next five years.

Several sticky factors entrench Turkey’s trade deficit. Turkey’s reliance on energy imports has been a key driver, especially in high price environments. This effect is currently muffled. On the other hand, Turkey can’t compete on wages and other production costs as much as the depreciation of the lira would usually imply. Frequent pay adjustments have been unavoidable considering persistent inflation. The monthly Turkish gross minimum wage of $817 is close to Romania’s $955 yet Turkey doesn’t enjoy the same access to the EU single market and continues to exhibit high inflation.

The pre-2023 focus on boosting consumption led to a surge in imports. Meanwhile, lower foreign direct investment (FDI) and an ever greater prevalence of real estate investments over more productive sectors have stymied modernization in Turkey’s manufacturing (see Chart 1). A sectoral study of the imports Turkey needs to produce its own exports shows that this dependency was on a downward trend from early 2013 until September 2019, but that it reversed after this date and the import dependency of exports started to increase rapidly.3 The highest import dependence of exports is observed in the manufacturing sector, including textiles, apparel, and basic metals.

It is imperative to reverse these trends to ensure Turkey can again benefit from its trade links, but the global context will make this more challenging than ever. The United States is adding barriers to its market, which will hamper growth in markets that import goods and services from Turkey. These include the EU but also markets which currently face much higher US tariffs, like China, India and Vietnam. Meanwhile, the output of China’s manufacturing capacity continues to far outstrip the country’s own needs.

Turkey’s trade deficit with China exceeded $30 billion in 2023. Ankara has already been taking targeted measures against cheap supply by primarily targeting Chinese electric vehicles through a flat 40-percent tariff and a minimum per vehicle price of $7,000. Investigations into Chinese solar panel components are ongoing and, in October 2024, Turkey imposed definitive anti-dumping duties on hot-rolled flat steel imports from China, Russia, India, and Japan to protect its domestic steel sector. These escalations have led to formal complaints and disputes at the WTO.

There are some encouraging, if very early and mixed, signs in Turkey’s latest Medium-Term Program, published on September 8. When examining the contribution of production factors to growth, the largest contribution to the 3.3 percent growth in 2024 came from capital stock and employment. In 2025, the main determinants of growth are expected to be total factor productivity and increases in capital stock. For the 3.3-percent growth projected in 2025, capital stock and total factor productivity are expected to contribute 1.3 percentage points and 2 percentage points, respectively. On the other hand, exports net of imports switched from enhancing growth in 2024 back to being a drag on growth in the fourth quarter (Q4) of 2024 and the first two quarters of 2025.

So nothing will fall into Turkey’s lap; it will need to fight for trade to contribute more positively to the economy. Section 2 will take a closer look at the opportunities Turkey should seize.

Opportunities for Turkey to seize

Turning trade into a reliable engine for Turkish growth and prosperity will take hands-on coordination between the Turkish government and firms. It is clear that Turkey cannot rely on its web of extant FTAs. There are opportunities for Turkey to seize by diversifying the substance and the geographic reach of its trade relations. The United States might have changed philosophies, but this doesn’t rule out bilateral trade deals with others. It so happens that the European Union, with which Turkey does almost $250 billion of trade every year, is even more committed to updating these agreements. 

Figure 2 emphasizes the European Union’s central role in Turkish global trade ties, especially as Turkey’s primary export market. This contrasts with major trade partners, such as Russia or China, where large deficits persist.

The long-professed goal of modernizing the customs union has yielded such little progress that it has become the subject of derision. The fact that Turkey and its main trading partner trade in goods and services from each other in a framework settled in the mid-1990s can seem absurd. As economies have evolved, the proportion of goods falling under the customs union has dwindled to only 37.9 percent of Turkey’s exports and 44.1 percent of EU exports.4 This does not cover agriculture (although bilateral trade concessions apply), services, or public procurement.

Volatile political relations have been the dominant reason why possibilities for modernizing this relationship have been left unexplored. The revival of High-Level Dialogues on Economics and Trade in 2024 was a good sign. The Turkish side has keenly argued that Brussels has been even more eager to make progress since Trump’s return to the White House. But the readout from the latest meeting in July 2025 still suggests an incremental approach to removing barriers by streamlining customs procedures and revising quotas for some agricultural goods.

How can the level of ambition be raised, bearing in mind the EU’s reticence to discuss free movement of workers or agriculture? Whether or not these qualify as modernizing the customs union, there are three areas in which feasible updates would positively affect Turkish trade.

First, there is a clear case for further alignment on emissions trading systems as Turkey prepares to launch its own in 2026. It is important that this alignment spares Turkey from the EU’s Carbon Border Adjustment Mechanism duties when the system moves into its next phase. The healthy supply of boron, chromium, thorium, tungsten, and cobalt provides the EU with another reason to keep Turkey “in the tent” on carbon emissions. It will also want to ensure Turkey can build out its processing capacities for these critical minerals in a way that is cost-effective. 

Second, although amendments were made in March 2024 to further align Turkish law with the General Data Protection Regulation (GDPR), the EU has not yet issued an “adequacy decision” on Turkish data protection laws. Discussions should aim to bridge any remaining gaps.

And third, geopolitical developments have revived interest in new security arrangements beyond the frozen accession process. Turkey’s role in NATO and the volatile European security landscape—especially concerning the war in Ukraine—make it a vital partner, but innovative partnerships between firms also need to be bolstered. The good news is that June 2025 saw the confirmation that Turkish firms will be able to access loans from the EU’s new fund for defense innovation.

Finally, both sides should continue to think of creative solutions to the disadvantage Turkey has in negotiating its own trade agreements. As part of the customs union, Turkey must currently align its external tariffs with those of the EU. When the EU signs a deal with a third country, Turkey most open its market on the same terms but this is not reciprocal, and the third country is not obliged to open its market to Turkish exports. Naturally, Ankara should not wait for a solution to this long-standing problem to enhance its other existing trade partnerships or initiate new ones.

Turkey’s size and geographic location are often presented as natural advantages, but these should not be taken for granted. Turkish leaders were frustrated by Turkey’s conspicuous absence from the India–Middle East–Europe Economic Corridor (IMEC) when it was first announced at the New Delhi Group of Twenty (G20) Summit in 2023, with US and EU backing. Trump has since signaled support for the project in his own way, even suggesting it could provide opportunities to reconstruct the Gaza strip.5 Turkey participates in other big and small connector projects, such as China’s Belt and Road Initiative and Iraq’s Development Road. It even plays a leadership role the Middle Corridor (or Trans-Caspian International Transport Route), which connects Europe and Asia via Turkey, the Caucasus, the Caspian Sea, and Central Asia.

The point is that Turkey’s role as a trade and manufacturing hub isn’t guaranteed and cannot be secured through geography and new infrastructure alone. Incentives like free ports already exist, but Turkish firms will also need to reach new markets—whether these are riskier, like Syria and Ukraine, or farther away. Syria rebuilding activity could provide a 0.6-percent boost to Turkish GDP.6 Turkish firms will also be the most willing to go into Ukraine first as soon as there is a ceasefire. They should bear in mind that they will not be eligible for EU funding—the major resource on which Ukraine will rely—if they have major activities in or with Russia.

Projects in the Middle East, Africa, and Southeast Europe already make Turkish construction contractors the second global force after China’s.7 The sector makes a positive contribution to Turkey’s trade surplus in services. The government and firms should use this good position to revive manufacturing sectors by aiming to produce a higher share of the construction firms’ inputs domestically. Supply of white goods and electronics, minerals, and construction materials can flow into Turkish-led construction projects. The same strategy could work with Turkey’s impressive trade surplus in medical services; the goal should be to produce more of the goods that this industry requires, instead of importing them.

The High Technology Investment Program (HIT-30), announced in July 2024, commits $30 billion in incentives to establish Turkey as a hub for modern manufacturing. The program pinpoints semiconductors, e-mobility, green energy, advanced manufacturing, healthy living, communication, and space technologies as the promising sectors. This is, of course, welcome as only 3.6 percent of exports are high-tech exports.8 While Turkey is already at the cutting edge on drone technology, catching up in enough other fields to affect the trade deficit noticeably is a tall order. Investment partnerships with foreign firms can help speed up the transition, provided these include some technology transfer. Turkey can continue to use the EU customs union to welcome investment from firms that want to sell into the EU. This is happening with Chinese electronic vehicle (EV) brand BYD, which is making a $1-billion investment. To improve the terms, Turkey must make sure it is welcoming investment from different sources.

Finally, on defense partnerships, the prowess of Turkish drones in the early stages of the war in Ukraine have created a considerable amount of interest. Sadly, residual US sanctions on the defense sector, dating back to Turkey’s purchase of a Russian S-400 missile system, continue to have a chilling effect. This needn’t remain so. In 2024, Turkey managed to get itself off the Financial Action Task Force’s gray list by making a limited number of regulatory and transparency reforms.9 Ensuring Western firms feel no reticence about partnering with Turkish firms should be a priority.

Cranes and shipping containers are pictured. Photo by Kurt Cotoaga on Unsplash

Stabilizing the domestic economy remains a precondition for rebalancing trade 

We have seen how Turkey is blessed with geographic, strategic, and workforce quality advantages that should enable it to continue seizing opportunities in otherwise challenging times for global trade. But we also know the record of the past 10–15 years has been patchy. International investors have been spooked by policy volatility. Opportunities to modernize the manufacturing base have been missed due to state-owned banks placing too much emphasis on consumer spending and high-visibility investment projects. Since 2023, the orthodox turn has gone some way toward alleviating these challenges. But it also comes with risks, especially because of high interest rates.

Many objectives have been squeezed into the Medium-Term Program, which was updated on September 8. They are, at least, coherent. The Turkish government currently aims to strengthen macroeconomic and financial stability to enable sustainable growth. This involves maintaining fiscal discipline and reducing inflation to single digits in the medium term. Ancillary goals include improving research and development (R&D) and innovation capacity, ensuring technological transformation with a focus on transition to a green and digital economy, strengthening human capital, further activating the labor market, improving the business and investment environment, and reducing informality in the economy.

Can Turkey do this?

The plan appears to be working on restoring current account and reserves. But this is also the result of good luck coming with lower energy prices. In the second quarter of 2024, the impact of disinflationary policies became more apparent and, for the first time in eighteen quarters, net exports of goods and services contributed more to growth than domestic demand did. And despite constant pressure to spend and raise wages, the government is slowing the pace of increase for both.

Still, it is alarming that the reshoring of manufacturing has not been seen as a source of growth for Turkish firms. A May 2024 S&P Global survey of Turkish manufacturers found just 22 percent expected growth from reshoring in the next twelve months, with 61 percent not expressing an opinion.10 Seventy-one percent of firms cited capital cost and availability as challenges to reshoring, while 64 percent cited labor availability. While a small minority also cited access to raw materials as a challenge, it’s clear that high interest rates and wage pressures—the price to pay for the much-needed macroeconomic policy normalization—are taking their toll.

The strategy espoused by Ankara and Turkish firms needs to be more holistic and take Turkey’s own import dependencies into account. Greening the economy is often cited as a way to reduce dependency on energy imports, and Turkey has some of the critical minerals required in its soil. But it shouldn’t neglect other resources that can be used as inputs in services exports. These include raw materials and semi-manufactured goods, such as steel and aluminum, refined oil products, and raw minerals and ores ranging from building materials like marble to industrial metals such as chromium, copper, and lead. Minerals and ores only accounted for a small percentage of total exports, but nearly half of shipments to mainland China.

In the end, Turkey’s ability to turn trade into a lasting engine of growth will depend less on geography or one-off projects than on the strength of its institutions and the consistency of its external partnerships. Transparent, predictable, and rules-based institutions are essential for attracting investment, upgrading production, and ensuring that trade contributes to financial stability rather than volatility. At the same time, maintaining constructive and forward-looking relations with the West, especially the EU and the United States, remains important. They are both Turkey’s largest markets and its most important sources of capital, technology, and credible alternatives to turn to as Ankara rightly courts investment from China.

Acknowledgments

The Atlantic Council would like to extend special thanks to Limak Holding for its valuable support for this report.

About the author

Related content

Explore the program

The Atlantic Council Turkey Program aims to promote and strengthen transatlantic engagement with the region by providing a high-level forum and pursuing programming to address the most important issues on energy, economics, security, and defense.

1    John Paul Rathbone, “Turkey sees opportunity in tariff turmoil, finance minister says,” Financial Times, April 8, 2024, https://www.ft.com/content/247051bf-1bca-490f-a371-50d668f9ade1
2    “EU trade relations with Türkiye,” European Commission, September 5, 2025, https://policy.trade.ec.europa.eu/eu-trade-relationships-country-and-region/countries-and-regions/turkiye_en
3    Serdar Varlik, N. Hande Sevgi, and Hakan Berument, “Analyzing Türkiye’s Import Dependency of Exports: A Sectoral Approach,” Fiscaoeconomia 8, 2 (2024), https://www.researchgate.net/publication/380843766.
4    Andrew Birch, et al., “Turkey as a Supply Chain Reshoring Center: Opportunities and Challenges,” S&P Global, September 4, 2024, https://www.spglobal.com/market-intelligence/en/news-insights/research/turkey-supply-chain-reshoring-center-opportunities-challenges.
6    Ben Holland, “Who Else Benefits From Syria’s Postwar Recovery,” Bloomberg, July 12, 2025, https://www.bloomberg.com/news/newsletters/2025-07-12/who-else-benefits-from-syria-s-postwar-recovery-new-economy-saturday
7    “Turkey Second Only to China in Global Ranking of Top 250 Contractors: Ministry,” Turkish Minute, August 23, 2025, https://www.turkishminute.com/2025/08/23/turkey-second-only-to-china-in-global-ranking-of-top-250-contractors-ministry/.
8    “The Trilemma of Turkish Techno-Nationalism,” Deutsches Institut fur Internationale Politik und Sicherheit,” May 30, 2025, https://www.swp-berlin.org/publikation/the-trilemma-of-turkish-techno-nationalism.
9    “Press Release on Türkiye’s Removal from the Grey List,” Republic of Türkiye Ministry of Treasury and Finance, press release, June 28, 2024k https://en.hmb.gov.tr/haberler/press-release-on-turkiyes-removal-from-the-grey-list.
10    Birch, et al., “Turkey as a Supply Chain Reshoring Center.”

The post Turkey in the changing transatlantic trade environment appeared first on Atlantic Council.

]]>
As Europe’s neutral states shift closer to NATO, Ireland approaches a turning point for its security https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/as-europes-neutral-states-shift-closer-to-nato-ireland-approaches-a-turning-point-for-its-security/ Tue, 30 Sep 2025 19:03:13 +0000 https://www.atlanticcouncil.org/?p=874619 Ireland spends the least of any EU country on defense. Taoiseach Micheál Martin wants to change that. With military neutrality deeply rooted in the country's history of violent civil conflict, what will re-armament take?

The post As Europe’s neutral states shift closer to NATO, Ireland approaches a turning point for its security appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Irish Taoiseach Micheál Martin and Minister of Defense Simon Harris have proposed a staggering number of defense policy reforms, including raising defense spending to an all-time high.
  • Seventy-five percent of international data cables pass through or near Irish waters; to protect this critical communications infrastructure Dublin has just eight patrol ships. 
  • The government is clear that despite Ireland’s deeply engrained culture of neutrality the country needs a larger and more capable military—but the public may not yet be convinced.

In a further sign of the deteriorating security environment in Europe, the Republic of Ireland is rethinking the role of its military and its policy toward defense. Ireland’s renewed security discussion highlights the diminishing number of neutral or nonaligned countries in Europe in the wake of Russia’s 2022 invasion of Ukraine. Sweden and Finland’s 2023 decision to join NATO ended their centuries of military nonalignment. Even Austria and Switzerland, two countries synonymous with neutrality, have taken some steps toward condemning Russian aggression, such as Switzerland’s decision to host a NATO liaison office in Geneva. Although Ireland’s renewed security debate should not be misconstrued as an interest in NATO membership, it represents a timely reassessment of its security needs and a reconsideration of its geostrategic role in transatlantic security.

Ireland has historically been militarily neutral, but it is far from politically neutral. In recent months, Taoiseach (head of government) Micheál Martin has proposed a staggering number of defense policy reforms aimed at shoring up Ireland’s military and addressing potential vulnerabilities. This reassessment has also been hastened by the ongoing US reevaluation of its military presence in Europe. Ireland is entering a new era in its security and defense posture, spurred by Russian aggression, especially in the hybrid domain and critical undersea infrastructure. The consensus at the highest levels of government is clear—Ireland must do more to ensure its security in an increasingly complicated and uncertain world. Public opinion, however, may not have coalesced around this consensus.

The history of Ireland’s armed forces

Understanding Ireland’s armed forces today requires a look at the history of the island as it was shaped through numerous conflicts. Portions of the island of Ireland had been occupied by the English since 1169. As a result, Ireland’s military tradition is that of the rebel groups and paramilitaries who recurrently resisted colonial rule in several staggered uprisings and short conflicts. The Irish Republican Army (IRA) relied heavily on guerrilla fighting against the occupying English forces during the war; the IRA lacked training, standard weaponry, and force tactics. The period known as the Troubles (approximately 1966 to 1998) would see similar guerrilla tactics employed by Irish Republican paramilitaries during the 30 years of violence and unrest.

As World War II began, Ireland declared itself neutral but was sympathetic to the Allies and offered covert support. This policy of military neutrality dates back to the 1921 end of the Irish War of Independence, when the Irish Free State was established. As a result, Ireland was offered NATO membership by the United States in 1949, but declined the offer in order to maintain neutrality. To this day, the idea of NATO membership remains unpopular in Ireland, with 19 percent of the public in support and 49 percent opposed. Ireland continues to participate in NATO’s Partnership for Peace program, which allows some cooperation and interoperability.

Traditionally, Ireland has valued its role as a militarily neutral nation with a strong peacekeeping tradition, where it has gained a global reputation. Relative to the size of its military, Ireland has an unusually large role in global peacekeeping efforts and is the only nation to have a continuous presence on United Nations (UN) missions, which it has done since 1958. Ireland’s 2024 Defence Policy Review concluded that the country must adapt to the current geopolitical landscape while maintaining its commitment to military neutrality. Despite its peacekeeping tradition, Ireland’s military has been undersized and is reassessing its needs to ensure sovereignty in a more contested threat environment.

Three-quarters of all international data cables pass through or near Irish waters, representing as much as ninety-five percent of international data trafficall vulnerable to sabotage.

Ireland has faced scrutiny from security and defense analysts for its relatively low levels of military and defense spending. Despite the current government’s record-high defense budget of €1.35 billion ($1.48 billion) with a stated goal of increasing defense spending to €1.5 billion ($1.74 billion) by 2028, this still only accounts for 0.25 percent of Ireland’s gross domestic product (GDP). Ireland spends the least on defense out of any country in the European Union, despite having the second-highest GDP per capita in the bloc—its defense spending is only half that of fellow neutral state Malta, a country with about a tenth the population of Ireland. At the 2025 NATO Summit in The Hague, other European countries committed to spending 5 percent of their GDP on defense, further widening the gap between Ireland and its NATO-member neighbors when it comes to defense spending.

Part of the conversation around Ireland’s defense needs is focused on a worrying trend; like many European countries, Ireland is struggling to address personnel shortages. Obstacles for the Defence Forces include a lack of incentives for recruitment, poor rates of retention and low wages, and a lack of expertise in the officer corps. This confluence of wages, conditions, and lack of opportunities have led to what has been described as an “existential crisis” for Ireland’s military. For historical and cultural reasons, Ireland has never had a large military, and as a result, military service is an uncommon path for young people to choose. In 2022, the Commission on the Defence Forces reported 13,569 combined permanent and reserves, while the most recent reports indicate 9,900 combined forces. In 2025, Ireland’s military consists of approximately 7,400 active-duty personnel (5,950 Army, 750 Navy, 700 Air Corps) and 1,500 reservists (1,400 Army, 100 Navy). Ireland hopes to reverse this trend of personnel decline with a dramatic plus-up in the years ahead: Ireland’s permanent Defence Forces plans to grow to 11,500 by 2028. As the armed forces continue to struggle to retain the numbers needed to operate effectively, this growth will be difficult to achieve.

Evaluations and considerations of Ireland’s security posture

Central to Ireland’s contemplation of its security posture and needs are the government’s proposed reforms to the “triple lock” mechanism, a requirement since 1960 for the approval of troop deployment. To meet the triple lock requirement, three bodies must approve the deployment: the UN Security Council or General Assembly, the Irish government, and the Dáil, the directly elected lower house of the Irish parliament. Under the requirement, up to 12 members of the Irish Defence Forces can be sent on an overseas mission without triggering the lock. The proposed change would lift the UN approval requirement and allow up to 50 troops to be deployed without Dáil approval. Amending the triple lock is not without precedent. It was previously amended in 2006, allowing the UN General Assembly—not just the Security Council, where a veto is possible—to authorize Irish troop deployment. Amending the triple lock is contested; as many as 400 academics wrote a letter to Taoiseach Micheál Martin arguing that removing the lock would effectively end Ireland’s military neutrality. If the triple lock is amended, Ireland will find itself more capable of mobilizing when international peace or security is at stake. On the global stage, this would not impact perceptions of Ireland’s neutrality. The lock’s removal is more a question of Ireland’s internal discourse and self-perception.

The evaluations of Ireland’s 2024 Defence Policy Review place its current capabilities at what the review describes as Level of Ambition 1 (LOA 1). LOA 1 denotes that Ireland’s security forces would not be able to defend against a sustained military campaign against the nation. With increased defense spending agreed upon, Ireland has committed to moving to Level of Ambition 2 (LOA 2) Enhanced Capability for the Defence Forces. This next level would transition Ireland’s current capabilities to a large defense force, capable of defending Irish sovereignty and participating in high-intensity peace support, crisis management, and humanitarian relief operations abroad. Once LOA 2 is achieved, Level of Ambition 3 (LOA 3) Conventional Capability would be the next step, including upgrades to bring Ireland’s defense capabilities in line with similarly sized European countries. The Defence Policy Review identifies maritime capabilities and air surveillance as top priorities, given concerns over critical undersea infrastructure and increased foreign military activity in Ireland’s economic exclusion zone. The Irish Department of Defence has also established a new maritime strategy unit to address this security challenge, and plans to release an updated maritime strategy document in the near future.

Between revanchism and uncertainty

Echoing other European leaders at a March 2025 meeting of the European Council to discuss supporting Ukraine’s efforts to defeat Russia, Martin agreed that “Europe must do more to secure its own security and defense,” acknowledging “Ireland is not immune to these threats.” For its part, Ireland is in the process of hastening the procurement of a new primary radar and air defense system. Without a primary radar, Ireland is unable to track aircraft in its airspace. In April, the US Department of State approved a request for Ireland to buy Javelin launchers and missiles worth $46 million. The Irish Air Corps, meanwhile, has no fighter jets at its disposal, having retired its last one in 1998. The Air Corps otherwise largely consists of a handful of helicopters and planes, amounting to two maritime patrol aircraft, five small transport jets, and eight training aircraft. For the first time in 50 years, Ireland is weighing the acquisition of new fighter jets, at a projected cost of €2.5 billion. Tánaiste (Deputy Prime Minister) and Minister for Defence Simon Harris announced on February 28 the beginning of an exploration phase to acquiring at least eight combat jets, with a target of 12 to 14 aircraft, to “deter and detect airborne threats.” The government’s interest in the aircraft may also show a will to reduce dependencies on other countries for Ireland’s air surveillance and defense. Since the 1950s, a “secret pact” has existed between the United Kingdom and Ireland that would allow the Royal Air Force to intervene in Irish airspace in case of an incident. Ireland may not be able to count on this anymore, however, given the numerous pressing challenges identified in the UK’s new Strategic Defence Review, which did not mention the Republic of Ireland.

Despite being an island nation, Ireland’s navy largely consists of just eight patrol ships and no submarines, yet it is tasked with patrolling 16 percent of the EU’s territorial waters. Due to staffing shortages, as of 2022 not all ships were operable at once, necessitating the use of chartered private vessels to fill gaps. This was particularly apparent in January 2022 when the Russian navy conducted military exercises on the edge of Ireland’s territorial waters, over a region that holds the densest concentration of undersea cables linking North America and Europe. In recent years, there have been increased instances of sabotage against critical infrastructure in Europe, especially in the Baltic Sea. Gray-zone attacks on Europe attributed to Russia almost tripled between 2023 and 2024, 21 percent of which were on critical infrastructure. Maritime security is increasingly on the agenda, especially at NATO and in a transatlantic context, as Russia further probes for weaknesses in European waterways. Approximately 75 percent of data cables in the Northern Hemisphere pass through or near Irish waters; combined, they represent 95 percent of international data traffic. Outside of the multiple undersea cables that keep the island connected to the rest of the world, Ireland has offshore wind infrastructure that may also be vulnerable to sabotage. As a first step toward protecting undersea cables and offshore wind installations, Harris approved the Irish Defence Forces joining the Common Intelligence Sharing Environment, which will allow naval forces to exchange information and intelligence with 10 other European nations. Any intelligence-sharing arrangement for Ireland will augment its investment in its defense capabilities and allow it to more capably patrol its waters.  

As the Irish government continues to push to strengthen Ireland’s defenses and military, Ireland has a difficult balancing act ahead: preserving its unique form of neutrality while rising to meet the challenges posed by the current security environment. Between a revanchist Russia and an uncertain United States, Ireland is facing a bold new era in its defense policies and a historic break in its own norms to meet future security needs.

About the authors

Maeve Drury most recently was a Joseph S. Nye Jr. intern for the Transatlantic Security Program at the Center for New American Security.

Jason C. Moyer is a nonresident fellow with the Transatlantic Security Initiative at the Atlantic Council’s Scowcroft Center for Strategy and Security. 

Related content

Explore the program

The Transatlantic Security Initiative aims to reinforce the strong and resilient transatlantic relationship that is prepared to deter and defend, succeed in strategic competition, and harness emerging capabilities to address future threats and opportunities.

The post As Europe’s neutral states shift closer to NATO, Ireland approaches a turning point for its security appeared first on Atlantic Council.

]]>
404 Accountability not found: Spyware accountability through software liability https://www.atlanticcouncil.org/in-depth-research-reports/report/404-accountability-not-found-spyware-accountability-through-software-liability/ Tue, 30 Sep 2025 10:00:00 +0000 https://www.atlanticcouncil.org/?p=876863 This report proposes a legislative safe harbor framework that would incentivize technology companies to engage in spyware accountability.

The post 404 Accountability not found: Spyware accountability through software liability appeared first on Atlantic Council.

]]>

Table of Contents

Executive summary

The global spyware market enables human rights harms and amplifies national security risks. Despite mounting awareness of spyware abuses and repeated efforts to pursue accountability through litigation, existing legal avenues to accountability have proven inadequate at delivering justice or compensation for affected individuals. 

This report identifies four obstacles that frustrate accountability efforts: limited awareness among targeted individuals of their compromise, the intentional obscurity of spyware vendors that engage in name changes and jurisdictional arbitrage, difficulties establishing proper legal jurisdiction, and risks of exposing valuable threat intelligence during litigation proceedings.  

Technology companies operating messaging platforms and mobile operating systems possess unique capabilities that position them as essential actors in accountability efforts. These capabilities include unmatched technical insights for detecting and attributing spyware infections, established relationships with users that facilitate threat notifications, exclusive ability to patch vulnerabilities and secure products against exploitation, and resources to develop opt-in enhanced security features for high-risk users. 

This report proposes a legislative safe harbor framework that would incentivize technology companies to engage in spyware accountability by shielding compliant firms from litigation related to software insecurity, including potential products liability claims. Under this framework, companies would qualify for protection by meeting standards of behavior including comprehensive threat notification and detection programs, responsible information sharing with researchers and advocacy organizations, provision of enhanced security features, and rapid remediation of identified vulnerabilities. This approach recognizes both the heightened threat environment companies face when defending against state-sponsored actors and the rapidly evolving nature of spyware capabilities that requires flexible regulatory responses. 

By aligning incentives to reward proactive security measures rather than penalizing failures, this safe harbor structure could incentivize prevention and protection for spyware while complementing existing accountability approaches. The framework acknowledges that perfect security against well-resourced, nation-backed actors is not technically feasible or economically reasonable, but encourages meaningful investment in best practices that have proven effective in mitigating spyware harms.

Introduction

Spyware is a type of malicious software that facilitates unauthorized remote access to an internet-enabled target device for purposes of surveillance or data extraction.1 More than 80 countries are reported to have procured spyware and used it against individuals.2 In some cases, states have used spyware for intelligence and law enforcement purposes. In many cases, targets include journalists, political opposition, lawyers, academics, ethnic or religious minorities, businesses, and activists.3 Spyware vendors are entities that develop, support, and sell spyware to end users.4 Often, resellers, brokers, and intermediaries play a role in connecting vendors to customers, including government customers.5 While vendors may have varying degrees of control over the use of their spyware tools after purchase, at least some vendors are responsible for the installation, delivery, and continued operation of spyware capabilities.6

Despite repeated efforts, court action has offered limited recourse to affected individuals pursuing accountability from spyware harms. Through the pursuit of court action, individuals often seek compensation for the harms of spyware that they have suffered and to prevent similar harms to others. Alarmingly, according to a tracker of spyware-related litigation maintained by Citizen Lab no case in the United States or the United Kingdom brought by victims has achieved final resolution against a spyware vendor.7 By contrast, technology companies have seen slightly greater success in lawsuits against spyware vendors, seeking justice for the harms of spyware suffered by their businesses and seeking to prevent further harm from spyware companies to themselves and their customers. WhatsApp’s case against NSO Group achieved an eye-popping $167 million judgement from a jury in the Northern District of California, but as of September 2025, litigation in the matter is ongoing.8 Cases against spyware vendors take years—WhatsApp’s decision in May is the result of a suit originally filed in October 2019.9 Meanwhile, spyware vendors continue to emerge and evolve, perpetuating abuses against individuals and developing new exploits against messaging apps, mobile operating systems, and other popular consumer products.10

Efforts to constrain spyware’s impact include multilateral efforts to counter the proliferation of offensive cyber capabilities, visa bans on individuals involved in the development and sale of spyware, and investigations into previous spyware use.11 Recognizing the importance of international coordination and deconfliction to the success of any spyware accountability effort, the scope of this report’s includes avenues towards spyware accountability through liability in both the United States and the United Kingdom. The two countries share somewhat compatible legal systems and host a significant number of the technology companies relevant to this spyware accountability framework. The two jurisdictions already host important legal cases related to spyware accountability.  

Individuals affected by spyware have brought lawsuits in the United Kingdom and the United States against both spyware vendors and states using spyware, which has created a notable fork in jurisprudence between the two jurisdictions. In the United States, foreign states retain sovereign immunity in civil suits except under a specific set of circumstances outlined in the Foreign Sovereign Immunities Act.12 In a case involving Ethiopia’s use of the FinSpy spyware tool, the US District Court for the District of Columbia ruled that sovereign immunity prevented a suit brought by a US citizen residing in Maryland against the government of Ethiopia.13 In the WhatsApp case against NSO Group, the US Court of Appeals for the Ninth Circuit held, and the Supreme Court declined to overturn, that sovereign immunity does not extend to NSO Group, even though the spyware vendor claimed to be acting as an agent of a foreign state.14 Meanwhile, in the United Kingdom, courts have allowed cases against foreign states involving the use of spyware by Bahrain, Saudi Arabia, and the United Arab Emirates to proceed.15 Taking into account the different approaches to cases against foreign states between the United States and the United Kingdom, the authors explore a policy solution that would be feasible in both countries, focusing on accountability for spyware vendors rather than state customers and perpetrators. 

This piece examines obstacles to accountability, discussing why legal actions against spyware vendors have achieved limited results in compensating victims, imposing costs on spyware vendors, and creating deterrent effects. Spyware vendors engage in practices that frustrate paths to accountability, such as shifting identities, opaque corporate structures, and movement between jurisdictions. Individual victims of spyware, especially when targeted by powerful and well-resourced states, face steep costs in pursing legal recourse against spyware vendors and procedural challenges in showing causation and fault. In addition to the cost of litigation, individuals can suffer physical, financial, or other retaliation against themselves or their affiliates, including family, friends, colleagues, and healthcare providers.16 On the other hand, technology companies can be disincentivized from litigation, as lawsuits against vendors are slow, difficult, expensive, and in some cases, could require exposure of detection techniques or sensitive design information and practices. This exposure could pose wider risks to the security and integrity of software products, while ultimately insufficiently discouraging vendors from engaging in the development and sale of spyware.17

The authors posit that technology companies have an essential role in the pursuit of accountability for spyware harms and abuse. Technology companies can provide technical insights, facilitate interactions with affected individuals, secure software, and provide opt-in enhanced security features to protect the most vulnerable users of messaging platforms and mobile devices. These capabilities can assist advocacy groups, civil society organizations, and individuals targeted by spyware in achieving accountability. To incentivize the use of those capabilities, this piece suggests a policy mechanism, a safe harbor, which would reward technology companies that engage in best practices for spyware accountability by shielding them from certain litigation related to spyware’s harms, even when those harms are enabled by security flaws in their products. This safe harbor structure assists with existing challenges within the legal system that frustrate accountability efforts by encouraging technology companies to utilize their existing strengths. This approach would complement and strengthen additional approaches to accountability, while acknowledging the difficulties those approaches must overcome to achieve justice. 

Obstacles to accountability

Spyware use harms individuals by targeting their communications, and technology companies, by hijacking their infrastructure and breaching their products. Accountability encompasses incentive structures that discourage harmful behaviors and encourage best practices, as well as mechanisms that deliver justice to affected individuals in the form of compensation for experienced harms.18 This section will outline four challenges for litigation-based paths to accountability: lack of awareness of targeted individuals, the obscurity of spyware vendors, difficulties establishing jurisdiction, and risks of exposing technical information. 

Awareness of targeted individuals

Awareness of spyware use is an essential prerequisite to accountability. Spyware is designed to be undetectable to victims and often can only be detected with advanced forensic analysis. Without knowledge or suspicion of spyware use, individuals whose devices are compromised may be unable to pursue justice or take countermeasures to protect themselves, their contacts, or their communications. In some cases, activists, dissidents, and journalists may be aware of the cybersecurity risks they face due to the nature of their work or their identities. Individuals may be unaware of organizations and resources that could provide support, or fear repercussions for themselves and their contacts if caught contacting or engaging with advocacy organizations or other targeted individuals.  

To date, policymakers have focused on responding to incidents where individuals or groups became aware of targeting, particularly when the use of a spyware capability can be attributed to specific actors or spyware vendors. For example, the Pegasus Project, an international investigative journalism initiative that drew attention to spyware vendor NSO Group’s Pegasus spyware tool prompted the creation of a European Parliament committee to examine use of Pegasus and the inclusion of NSO Group on the US Department of Commerce’s Entity List.19

Awareness of the impacts and harms of spyware has increased over the last few years due to the important actions of civil society investigative work. In high-profile cases such as the campaign against human rights activists, journalists, and lawyers in Mexico, victims and their affected family members have collaborated with research and advocacy groups, including Citizen Lab, Amnesty International, and Access Now, to attribute suspicious text messages to attempts to install NSO Group’s Pegasus on their devices.20 In recent cases, including the use of Paragon’s Graphite against European journalists and either NSO Group or Candiru’s tools against prominent members of civil society in Catalonia, threat notifications from Apple and WhatsApp have prompted forensic investigations from Citizen Lab, which confirmed the presence of spyware.21  Without suspicion and subsequent confirmation of spyware use, individuals cannot pursue legal action against spyware vendors.  

Obscurity of the spyware market

Another obstacle to accountability for spyware vendors is the obscurity of the spyware market. Prior research including the Atlantic Council’s Mythical Beasts report, which maps the spyware ecosystem and imposes transparency on the market, outlines tactics used by spyware vendors to obfuscate their identities.22 Without attribution of a spyware infection to a specific vendor, litigation cannot achieve accountability from specific vendors for specific harms.23

As outlined in Mythical Beasts, spyware vendors often change names, in some cases multiple times, to hide their identities and potentially to mitigate the business impacts of negative reporting. For example, the vendor Candiru Ltd changed its names four times in rapid succession from 2016 to 2020 and now operates as Saito Tech Ltd.24 Figure 1 highlights various entities within the spyware market that have changed names. Without consistent naming conventions and legal records, civil society organizations, targeted individuals, and corporations are often unable to pin down responsible entities and individuals, which enables them to act with impunity.  

Spyware vendors also engage in corporate restructuring, including opening branches, procuring subsidiaries, developing strategic partnerships, or creating supplier relationships, which can make it difficult to attribute spyware incidents to specific entities.25 In depositions from the WhatsApp case against NSO Group, an individual working for Q Cyber Technologies, part of NSO Group, noted that there was no practical difference between employees of NSO Group and Q Cyber, despite legal distinctions between the companies.26

Spyware vendors engage in strategic jurisdiction hopping, often in conjunction with corporate restructuring tactics, to evade accountability and allow for the promotion and sale of their products in other countries, enabling them to take advantage of more permissible legal environments.27 Figure 2 highlights the cross-jurisdictional connections present across a sample of the spyware market.  

Figure 1: Name changes for entities studied in Mythical Beasts project (1992-2023).28
Figure 2: Entities in the Mythical Beasts dataset that cross jurisdictional boundaries.29

Difficulties establishing jurisdiction

Suits against spyware vendors also face the obstacles of finding an appropriate venue. In a lawsuit against a spyware vendor, relevant physical locations can be both varied and difficult to determine. It is a considerable challenge to verify the corporate nationality or countries of activity of the spyware vendor, the location of the targeted devices, the citizenship and residence of the targeted individual, the locations of the company and computing infrastructure providing the technology product targeted by the spyware, and the legal status of the purchaser of the spyware tool. The distributed, decentralized nature of the harms in these cases can make it difficult to determine which courts are the correct avenues for claims against spyware vendors and, therefore, have jurisdiction to hear a case.  

In practice, several high-profile lawsuits have not overcome the jurisdiction hurdle. The widow of assassinated Washington Post journalist Jamal Khashoggi’s suit against NSO Group was dismissed by the US Court of Appeals for the Fourth Circuit due to a lack of personal jurisdiction over the defendant in Virginia in May 2025, despite the argument that spyware was used against the widow while she was in Virginia.30 A case in California, brought by El Salvadoran journalists against NSO Group, was also dismissed but will be reconsidered after an appeals court found in July 2025 that the dismissal did not fully evaluate the relevant forum choice considerations.31 The WhatsApp case overcame jurisdictional barriers in part because the case involved US citizens and residents, and in part because the court relied upon WhatsApp’s evidence that “Pegasus code was sent through plaintiff’s California-based servers forty-three times during the relevant time period.”32

Spyware vendors have also invoked sovereign immunity as a defense, claiming that their role as agents of foreign governments shields them from legal action in US courts. The Supreme Court denied NSO Group’s petition to hear their sovereign immunity defense, allowing the Ninth Circuit’s decision to stand— that NSO is not entitled to sovereign immunity—in agreement with an amicus brief from the Justice and State Departments.33 In the United Kingdom courts have gone further, determining that even foreign states are not immune from litigation and allowing cases against Saudi Arabia for the use of NSO Group’s spyware and Bahrain for the use of Gamma Group’s spyware.34

Clearing the bar of establishing jurisdiction is one obstacle that has plagued recent spyware cases in the United States. As jurisdiction must be established before a court can hear the merits of a case, lurking behind jurisdictional concerns may be a number of other legal difficulties.  

Exposure of attribution information

Another obstacle to successful litigation against spyware vendors is the risk of exposing methods of detection and other valuable research sources to spyware vendors. For the purpose of this work, it is sufficient to understand that researchers can “fingerprint” spyware based on technical traces or patterns of behavior of spyware vendors, enabling attribution of spyware infections to specific vendors or spyware tools.35 However, public disclosure of that information can risk alerting spyware vendors to the details upon which researchers rely to detect spyware infections and infrastructure, allowing for the adoption of new tactics, and thus enabling vendors to keep their tools one step ahead of targeted individuals.36 In September 2024, Apple dropped an ongoing lawsuit against NSO Group, citing its preference to avoid the risk of exposing threat intelligence and detection capabilities during litigation.37 This illustrates a tradeoff between the benefits of public disclosure of indicators and the risks of alerting spyware vendors to detected techniques.38

Researchers and technology companies can choose to divulge details to inform and protect the public, exposing information like domain names, email addresses, and process names that spyware vendors use.39 This disclosure often prompts spyware vendors to shift to new infrastructure configurations in order to avoid detection and attribution.40 Maintaining the secrecy of certain technical indicators of spyware infections can also enable the attribution of future attacks, as a Citizen Lab report on FORCEDENTRY indicates.41

Spyware vendors have proven that they can bounce back from the public exposure of their infrastructure and continue to operate, as was the case with the Intellexa Consortium. In at least three instances beginning in 2023, Intellexa Consortium’s infrastructure was exposed by civil society researchers at Amnesty International, Recorded Future’s Insikt Group, and Sekoia, resulting in an internal takedown of their infrastructure, which impacted the consortium’s ability to deploy or maintain infections, and was compounded by US Department of Treasury sanctions on members of the Intellexa Consortium in 2024.42 Despite these efforts by civil society, the private sector, and the US government, the Intellexa Consortium adapted and rebuilt its exposed infrastructure at an alarming speed.43 According to Recorded Future, the Intellexa Consortium continues to operate in 2025.44

Overcoming accountability obstacles

While litigation and other accountability action that technology companies such as Apple (iMessage, iPhone), Google (Android), and Meta (WhatsApp) pursue are not immune from the aforementioned obstacles, these companies have unique capabilities with which to push back against the risks and harms of spyware and to overcome those obstacles. Technology companies’ litigation and preventative action do not necessarily involve direct victim compensation or justice for previous harms, but can act as an important preventative measure for future harms of spyware, complementing other approaches to accountability. Four essential capabilities of technology companies will be discussed in this section: unmatched technical insights and awareness, preexisting user relationships, the ability to directly secure products from spyware, and the ability to offer opt-in security features. 

Technical insights and awareness

As developers, maintainers, and sellers of technology products, technology companies are best situated to identify and make sense of technical signals of spyware abuse. As the manufacturers of devices, companies like Apple shape the use of their products through both the development of operating systems and choices about third-party access to devices, including what applications are available on app stores.45 Apple cites its closed ecosystem as a security benefit, highlighting controls that prevent developers from accessing sensitive user data without permission.46 Advanced spyware tools, such as zero-click exploits, overcome the security controls that operating system and messaging platform developers promote.47

Technology companies also have visibility across campaigns through the infrastructure they operate to deliver services. According to a 2021 Apple complaint, the technology firm determined that NSO Group obtained more than one hundred Apple IDs and stored an encrypted Pegasus payload on iCloud servers as part of executing the spyware.48 Companies whose products are not directly targeted by spyware might also have useful information and the ability to intervene, as illustrated by  Amazon Web Services (AWS) shutting down NSO Group’s access to the firm’s cloud content delivery network service in 2021.49 Companies can utilize these technical insights directly, eliminating infrastructure access or as evidence in litigation against spyware vendors, or share them with members of civil society and targeted individuals who are pursuing accountability.  

Ease of notification

Technology companies with consumer-facing products already have relationships with affected victims, making the task of threat notification easier than alternative approaches. Instead of relying on emails or text messages from third-party sources, which to individuals could resemble either spam or further attempts to infect their devices with spyware, companies like Apple, Meta, and Google have multiple options to privately and proactively communicate with affected individuals in a way that is distinguishable from a third-party source. As developers, technology companies have the unique ability to push notifications directly to users via banners, settings, or account menus, or dedicated security pages within an app, operating system, or messaging platform. The reinforcement of notifications across email, text, and push notifications or via banners on user’s settings pages, as well as more specialized features like security check-up pages, all allow users to distinguish threat notifications from spam or third-party harassment. 

In the past, technology companies including Meta, Apple, and Google have used several of these methods to notify individuals of the likely use of spyware against their devices or communications.50 The further use of this capability could improve awareness of exposure to the risks of spyware, prompting follow-on accountability actions. 

Hardening products against spyware

Technology companies can take another important step toward combatting spyware: directly securing their products. Spyware tools exploit vulnerabilities or misconfigurations in software which, while technically challenging to avoid, detect, or remedy, depend almost entirely on the development decisions and practices of technology companies. Chained-together vulnerabilities, which comprise a zero-click exploit, can only be conclusively stamped out with a patch issued by the organization responsible for the product or device. In the case of FORCEDENTRY, a NSO Group exploit targeting Apple’s image library, Citizen Lab discovered an artifact on an infected phone, which the researchers then forwarded to Apple for analysis and remediation.51 In response, Apple promptly issued a patch and notified customers via a security update.52 In that case and several others, Apple’s security team deserves praise for both their efforts to remediate the underlying vulnerability and the speed of their response. Unfortunately, if a company responsible for an operating system or messaging platform chose not to behave as Apple did in this case, targeted individuals and researchers would have minimal leverage to incentivize other behavior. 

Offering additional security features

Consumers choose the platforms, apps and operating systems they use, but with a few notable exceptions, they do not possess the ability to adjust design and root functionality of their devices to protect themselves from spyware. However, technology companies can offer opt-in security features, which may prevent the use of certain device features, but ultimately provide stronger security. Since 2022, Apple has offered Lockdown Mode, which restricts certain functionality on Apple devices in exchange for heightened protections from spyware.53 As part of its bug bounty program, Apple has also doubled payouts to researchers identifying vulnerabilities that affect devices in Lockdown Mode.54 Google offers a free Advanced Protection Program for Google Accounts, which requires the use of a passkey or security key, provides additional warnings for downloads, and enables other optional security settings.55 Advocacy organizations and researchers, including Citizen Lab and Amnesty International, have endorsed these optional features. Only the companies that provide these products and services can offer hardened versions, which remain licensed versions of their offerings, highlighting the critical role these companies play in shaping the security ecosystem. 

Shifting responsibility with products liability for software

Efforts to achieve spyware accountability have focused on justice delivered through the courts and litigation. An adjacent policy debate around the challenge of redistributing responsibility for software insecurity has resulted in proposals to apply the legal scheme of common law products liability to software. This section provides an overview of the legal basis for proposals aimed at shifting incentives in the private sector for software insecurity, and explores the advantages and disadvantages of such a structure for spyware accountability. The authors also offer a proposal for a legislative safe harbor structure, which if implemented, could reshape incentives for technology companies to assist in the pursuit of accountability for spyware. The structure would have several essential features, as outlined in the table below. 

Figure 3: Essential characteristics of proposed safe harbor structure

Software liability 101

The core premise of software liability proposals is straightforward: the costs of software failures are poorly distributed, with customers bearing the costs of security failures while vendors face little incentive to invest in security. Advocates argue that the market for software security is misaligned, with too little cost attached to the sale of insecure software products and services, while opponents argue that the result of this proposal would be to impose too heavy of a burden on software companies.56 However, the legal concepts underpinning these proposals are anything but straightforward and assessing such proposals can require fluency with both case law and complex legal theories. This section is not intended as a comprehensive overview of all proposals related to applying products liability to software; for a more detailed exploration of such proposals, refer to the Cyber Statecraft Initiative’s Design Questions in the Software Liability Debate report and the Lawfare Institute’s series on this topic, which features research by Atlantic Council fellow Chinmayi Sharma.57

Products liability is a subset of tort law. For the purposes of this brief, it is sufficient to understand that litigation involving torts does not require government intervention to enforce but grants victims the right to sue and receive compensation for harms suffered.58 Two main obstacles explain the lack of successful products liability cases against software vendors for insecure software at present. Defining software as a product, and thus eligible for a products liability framework, is difficult because software is legally treated as text or an intangible product governed by copyright and licensing regimes.59 The economic loss rule prevents litigation for solely economic harms under tort law, which would be a barrier to any litigation that does not involve physical damage.60 Proposals for products liability regimes designed to address insecure software often refer both to standards of care and safe harbors.61 The critical point is that, in the context of these proposals, standards of care define acceptable and reasonable conduct by software developers and manufacturers, while safe harbors provide protection from litigation to entities that comply with certain, specified practices.62 

Several legislative proposals have emerged over the last few years to create a statutory federal products liability regime for software in the United States. The Cyberspace Solarium Commission  proposal for applying liability to software suggests creating a standard of care for software products that requires companies to patch vulnerabilities within ninety days of discovery or reporting.63 Companies that fail to comply with that standard of care would be liable for economic harms greater than $75,000, physical damage, and harm to physical safety or security, with end users able to sue for damages, court costs, and attorney fees capped at 15 percent of the company’s annual revenue the year prior.64

The Biden administration’s proposal for a software liability regime emerged from its National Cybersecurity Strategy (NCS), which argued that “Responsibility must be placed on the stakeholders most capable of taking action to prevent bad outcomes, not on the end users that often bear the consequences of insecure software.”65 The NCS proposal suggested an “adaptable safe harbor framework to shield from liability companies that securely develop and maintain their software products and services,” involving the National Institute of Standard and Technology to inform the codification of secure software development standards.66 A proposal from Jim Dempsey, as part of Lawfare’s Secure by Design paper series, suggests a three-part regime for insecure software liability.67 The Dempsey proposal also includes a safe harbor, which would shield developers from liability if they comply with a set of best practices for software security.68 Industry groups and trade associations, including the Business Software Alliance in its 2025 Global Software Agenda, have also argued that a safe harbor premised on secure development standards would drive more companies to adopt those standards, strengthening the security of the overall software ecosystem.69

A path forward for spyware liability

The use of spyware capabilities against individual mobile devices represents an extreme form of a common security failure, which is the exploitation of insecure software by a malicious actor. In the spyware market, highly motivated and well-resourced threat actors continue to procure vulnerabilities and target individuals with sophisticated capabilities. Even the strictest secure development standards cannot eliminate all vulnerabilities, and under some proposed frameworks of liability, only unpatched vulnerabilities would enable customers to collect damages from companies. However, the spyware ecosystem has several characteristics that complicate the ability of the above proposals to resolve the harms of spyware or realign incentives in the spyware ecosystem.  

As discussed previously, obstacles to spyware accountability through litigation—i.e., a lack of awareness of targeted individuals, the intentional obscurity of spyware vendors, difficulties establishing jurisdiction, and the risks of exposing research—complicate the ability of individuals affected by spyware to successfully bring lawsuits addressing the harms of spyware. Rather than expecting a general proposal for applying products liability to resolve the harms of spyware, this report proposes a targeted application of concepts from those proposals to the specifics of the spyware ecosystem. This legislative safe harbor framework could be a component of a broader policy regime designed to shift incentives and responsibility for insecure software, or function as a standalone structure designed to incentivize technology companies to pursue and support spyware accountability.  

Three considerations should shape the development of a safe harbor framework, which would shield technology companies from litigation resulting from the application of products liability to software, or related litigation designed to hold software companies to account for the insecurity of their products. 

1. Any policy intervention should recognize the heightened threat environment that technology companies face when defending against state-sponsored or affiliated spyware vendors.  

Unlike financially motivated cybersecurity incidents, which might principally target well-resourced institutions, spyware often targets journalists, activists, dissidents, and human rights defenders, whose communications and activities are already subject to state scrutiny and repression. As discussed, technology companies possess capabilities to push back against spyware vendors. However, perfect security against well-resourced, nation-backed actors is neither technically feasible nor economically reasonable to expect from private companies that do not have total control over how users operate and use their platforms and systems. Companies can also face backlash from governments as they implement security practices that have the effect of restricting governments, particularly law enforcement agencies, from accessing information of interest or notify individuals of government use of spyware. 

2. The rapidly evolving nature of both spyware capabilities and defensive technologies also requires a framework that can adjust to new threats and incorporate emerging best practices.  

Adaptability should be built into the framework’s structure rather than requiring legislative amendments for each technological development. Without such flexibility, especially related to the nature of information that can be shared about spyware threats, defenders could quickly find themselves out of step with effective practices for mitigating the harms of spyware. Legislation and regulatory frameworks should not be expected to fully predict the evolution and transformation of an ecosystem as complex as the spyware market, but the historical pace of change within the market suggests that policymakers should anticipate new and different threats to continue to emerge.  

3. The nature of the spyware ecosystem requires careful international engagement, as the challenges of spyware are not contained within the borders of the United States.  

The involvement of other countries in responding to or perpetuating spyware is a critical consideration for any domestic policy proposal, as other countries could undermine or take advantage of carelessly designed policies. For example, requiring additional reporting or notification to governments globally about the identities of spyware victims or of technical indicators of compromise of spyware could tip off spyware customers to the detection of their spyware use. Policy interventions that create additional requirements and mechanisms for governments to shape the behavior of technology companies could also be abused to compel companies and organizations responsible for the security of messaging platforms and operating systems to disclose further information about customers or end users. As international efforts continue to address the harms of spyware, including the UK and France-led Pall Mall Process, which applies diplomatic levers to constrain the growth of spyware, US engagement in international forums and collaboration with aligned governments will be essential to the effectiveness of any framework designed to deliver spyware accountability. 

A Safe Harbor for spyware

In response to the above considerations, this report proposes a spyware-focused safe harbor framework that would incentivize technology companies to engage in best practices for spyware accountability by shielding them from litigation related to spyware’s harms. This would include any future litigation resulting from the application of a products liability standard to software insecurity. The details of the proposed safe harbor are included below and are referenced in the summary table at the beginning of this section. 

1. Standards or duties of care that would make a technology company eligible for the safe harbor’s shield should include comprehensive threat notification and detection, information sharing, enhanced security features, and rapid remediation of identified flaws. 

Threat notification represents a particularly critical component of this framework. Technology companies that proactively notify users of suspected spyware targeting, provide clear guidance on protective measures, and facilitate connections with relevant support organizations should be shielded from claims related to the initial compromise, and will play a critical role in addressing the challenges of victims’ awareness of spyware infections. 

Information sharing with researchers, advocacy organizations, and other technology companies is another crucial area for safe harbor protections. Companies that responsibly share threat intelligence with organizations like Citizen Lab, Amnesty International, and other established research entities should receive liability protections, provided they follow established guidelines for protecting sensitive information and user privacy. This sharing is vital to addressing the challenges presented at the start of the paper, including aiding with visibility of spyware incidents, including enabling investigative research by civil society organizations, and decreasing the obscurity of the spyware market, while respecting companies’ legitimate concerns with exposing sensitive security information to the public. 

The framework should also reward companies that offer opt-in enhanced security features, such as Apple’s Lockdown Mode or Google’s Advanced Protection Program. These features require significant development effort and financial resources, including when tied to bug bounty programs. By providing safe harbor protections for companies that invest in developing and maintaining these specialized security offerings, the framework would encourage broader adoption of such protective measures across the industry. 

Finally, rapid remediation of vulnerabilities or exploit chains is a step that only technology companies can take to respond to ongoing spyware campaigns. By patching devices and updating messaging platforms, technology companies curb infections and protect users from harm. While developing patches and mitigating flaws should not be rushed—as developers and technology companies must completely evaluate software changes to ensure they completely fix flaws without disrupting functionality—companies should be rewarded for the rapid mobilization of effort that quick patching requires.  

2. Eligible harms should include harms resulting from the infection or targeting of devices or software by spyware vendors. 

Harms that would trigger application of the safe harbor shield should be limited to those caused by spyware capabilities. Qualifying incidents would involve targeted capabilities, such as the use of zero-day exploits and individual persistent device access, but not general cybersecurity incidents, which are shaped by a wide variety of incentives. As the discussion of applying products liability to software broadly indicates, a host of legal barriers and considerations would shape the implementation of such a regime. To minimize disruption to broader cybersecurity incentives, this safe harbor shield should apply narrowly to harms specific to the spyware ecosystem. However, this would not make this proposal’s tailored proposal incompatible with a broader software liability structure based on products liability, and the implementation of such a safe harbor would not require policymakers to intervene in or decide other debates related to those proposals and broader software security challenges. 

3. Eligible technologies and products should include messaging platforms, mobile operating systems, and the companies responsible for the security of those systems or involved in their development and operation. 

The safe harbor should apply to technology sectors that are targets of sophisticated spyware tools, particularly messaging platforms like WhatsApp and iMessage, as well as mobile operating systems including iOS and Android. Companies eligible for protection should include primary developers and operators of these platforms, plus entities involved in their security infrastructure such as cloud service providers hosting messaging services or companies providing security services. This scope recognizes that spyware campaigns often exploit vulnerabilities across interconnected systems and that effective defense requires coordination among stakeholders. 

4. Compliance with standards should be determined by a government entity outside of the judicial system, which would certify compliance to court entities for the purposes of litigation. 

Certification of compliance with standards could be carried out by an independent regulatory agency, such as the FTC, but would occur separately from judicial assessment and adjudication of claims where the safe harbor would be relevant, maintaining important neutrality from policy departments and the legal system while still providing a critical verification role. This would prevent judicial bodies from having to make esoteric technical decisions, while allowing industry and advocacy organizations to offer expertise to guide the definitions and development of best practice standards. The certification of compliance occurring outside of the judicial system could enable such standards to evolve on a regular basis, which would ensure that practices are kept up to date instead of emerging fitfully through a patchwork of case law.  

At the federal level, such a framework would require careful coordination across the public and private sector, along with the participation of agencies such as the Cybersecurity and Infrastructure Security Agency, which could act as a host body to advise on the technical standards that companies would need to meet. Implementation of such a framework would require extensive consultation and testing to define effective standards for threat notification programs, information sharing protocols, and enhanced security measures. The cybersecurity community, advocacy organizations, targeted individuals, and technology companies must collaborate to ensure that any resulting standards meaningfully support accountability efforts while remaining technically feasible and economically sustainable. 

Conclusion

Spyware and the spyware ecosystem pose significant challenges that will not be resolved with any single policy intervention. The current lack of comprehensive justice or deterrence from litigation-based approaches demonstrates the need for a complementary strategy that leverages the abilities of technology companies to protect individuals from spyware while also supporting other efforts to pursue accountability.  

The safe harbor framework proposed in this report offers a targeted approach to realigning incentives within the technology ecosystem. Rather than expecting general products liability proposals to address the specific challenges of spyware abuse, this framework recognizes the distinct characteristics of state-sponsored surveillance tools and the specialized role of technology companies in defending against them. By rewarding companies that invest in threat detection, user notification, information sharing, and enhanced security features, the framework could drive industry-wide improvements in protection for the journalists, activists, and human rights defenders most vulnerable to spyware targeting.  

The framework’s success would also depend on careful international coordination. As spyware vendors and their customers operate across jurisdictions, domestic policy interventions risk being undermined by international actors or creating opportunities for abuse by governments seeking additional leverage over technology companies. US engagement in multilateral efforts like the UK and France-led Pall Mall process will be essential to ensuring that accountability measures reinforce rather than conflict with international coordination efforts. US government support of a safe harbor proposal would demonstrate a renewed commitment to constraining spyware’s harms. Such a commitment would give the United States more leverage with which to push back on countries that attempt to limit the ability of technology companies to respond to spyware’s threats and engage in spyware-related abuses, ultimately preserving the ability of American technology companies to defend mobile communications and devices from national security threats. 

The proposed safe harbor represents a complementary approach that acknowledges the limitations of existing accountability mechanisms while taking advantage of the demonstrated effectiveness of technology company interventions in recent spyware incidents. Developing and implementing this framework will take time, resources, and sustained commitment from policymakers, industry, and civil society. This is especially relevant in a current political climate where public-private collaboration is headed in the direction of minimizing the compliance burden upon industry, while also pushing companies to secure their products and infrastructure from the outset.  

However, given the persistent threat that spyware poses to vulnerable individuals worldwide and the demonstrated inadequacy of existing accountability mechanisms, targeted policy interventions that strengthen the incentives for protective behaviors represent a critical component of a comprehensive accountability strategy. These interventions could be a useful test case for effective public-private collaboration designed to induce companies to take greater responsibility for helping to secure users over the long term. As part of broader international coordination efforts to address spyware proliferation and abuse, a well-designed safe harbor framework could provide meaningful protection for those most at risk while advancing the broader goal of accountability within the spyware ecosystem. 

Acknowledgements

This report would not have been possible without the support of the Spyware Accountability Initiative and the pro bono research assistance provided by Christopher Hart and his team at Foley Hoag LLP, Langie Cadesca, Katherine Jung, and Gilleun Kang. Thank you to Nikita Shah and Trey Herr, as well as other colleagues at the Cyber Statecraft Initiative for their support, guidance, and reviews of this research. Thank you to Lisandra Novo and Chinmayi Sharma for their review of a draft of this work. All errors are the authors’ own. 

About the Authors

Explore the Program

The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

1    Jen Roberts et al., Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and Its Threats to National Security and Human RightsAtlantic Council, September 4, 2024, https://www.atlanticcouncil.org/in-depth-research-reports/report/mythical-beasts-and-where-to-find-them-mapping-the-global-spyware-market-and-its-threats-to-national-security-and-human-rights/.
2    Ellen Nakashima and Tim Starks, “At Least 50 U.S. Government Employees Targeted with Phone Spyware Overseas; White House Bans Federal Agencies from Using Spyware That Poses National Security and Human Rights Risks in the U.S.,” Washington Post, March 27, 2023, https://www.washingtonpost.com/national-security/2023/03/27/spyware-diplomats-us-pegasus; Andy Greenberg and Lily Hay Newman, “US Congress was Targeted with Predator Spyware,” Wired, October 14, 2023, https://www.wired.com/story/us-congress-spyware.
3    Jen Roberts et al., Markets Matter: A Glance into the Spyware IndustryAtlantic Council, April 2024, https://www.atlanticcouncil.org/in-depth-research-reports/report/markets-matter-a-glance-into-the-spyware-industry/.
4    Roberts et al. Mythical Beasts and Where to Find Them.
5    Sarah Graham, Jen Roberts, and Nitansha Bansal, Mythical Beasts: Diving into the Depths of the Global Spyware MarketAtlantic Council, September 10, 2025, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/mythical-beasts-diving-into-the-depths-of-the-global-spyware-market/.
6    Suzanne Smalley, “Testimony from NSO Group Raises Questions about its Culpability for Spyware Abuses,” The Record, November 19, 2024, https://therecord.media/nso-group-whatsapp-case-documents; Stephanie Kirchgaessner, “NSO – Not Government Clients – Operates its Spyware, Legal Documents Reveal,” The Guardian, November 14, 2024, https://www.theguardian.com/technology/2024/nov/14/nso-pegasus-spyware-whatsapp.
7    Within this litigation tracker, this report is concerned with cases that are brought 1) in US or UK courts 2) against a spyware vendor (under the Mythical Beasts definition) 3) by a victim or company, which specifically excludes the September 2021 DarkMatter enforcement action brought by the DOJ and FBI; Siena Anstis, “Litigation and Other Formal Complaints Concerning Targeted Digital Surveillance and the Digital Surveillance Industry,” The Citizen Lab, last updated August 15, 2025, https://citizenlab.ca/2018/12/litigation-and-other-formal-complaints-concerning-targeted-digital-surveillance-and-the-digital-surveillance-industry/.
8    WhatsApp Inc. et al. v. NSO Group Technologies Limited, et al., 4:19-cv-07123-PJH (N.D. Cal. 2025).
9    Joseph Menn, “Spyware Maker NSO Ordered to Pay for Infecting WhatsApp Accounts,” Washington Post, May 6, 2025, https://www.washingtonpost.com/technology/2025/05/06/nso-pegasus-whatsapp-damages/; Asaf Lubin, “Unpacking WhatsApp’s Legal Triumph over NSO Group,” Lawfare, January 7, 2025, https://www.lawfaremedia.org/article/unpacking-whatsapp-s-legal-triumph-over-nso-group.
10    Roberts et al., Mythical Beasts and Where to Find Them.
11    Roberts et al., Mythical Beasts and Where to Find Them.
12    Foreign Sovereign Immunities Act of 1976 (FSIA), Pub. L. 94-583, 90 Stat. 2891 (1976).
13    Luca Marzorati, “D.C. Circuit: Ethiopia Immune from Hacking Suit under the FSIA,” Lawfare, March 21, 2017, https://www.lawfaremedia.org/article/dc-circuit-ethiopia-immune-hacking-suit-under-fsia; Nate Cardozo, “D.C. Circuit Court Issues Dangerous Decision for Cybersecurity: Ethiopia is Free to Spy on Americans in Their Own Homes,” Deeplinks (blog), March 21, 2017, https://www.eff.org/deeplinks/2017/03/dc-circuit-court-issues-dangerous-decision-cybersecurity-ethiopia-free-spy.
14    NSO Group Technologies Limited v. WhatsApp Inc., No. 21-1338, Supreme Court of the United States, petition for a writ of certiorari filed April 6, 2022 denied January 9, 2023, https://www.supremecourt.gov/docket/docketfiles/html/public/21-1338.html.
15    “Court of Appeal Rules that Two Bahraini Dissidents Can Bring FinFisher Spyware Claims Against the Kingdom of Bahrain in the UK,” Leigh Day, October 4, 2024, https://www.leighday.co.uk/news/news/2024-news/court-of-appeal-rules-that-two-bahraini-dissidents-can-bring-finfisher-spyware-claims-against-the-kingdom-of-bahrain-in-the-uk/.
16    Stephanie Kirchgaessner, “Mexico NSO Spyware Journalists Human Rights Hacked Pegasus,” The Guardian, October 4, 2022, https://www.theguardian.com/world/2022/oct/04/mexico-nso-spyware-journalists-human-rights-hacked-pegasus.
17    Suzanne Smalley, “Apple Seeks Dismissal of NSO Lawsuit over Pegasus Spyware,” The Record, September 13, 2024, https://therecord.media/apple-seeks-dismissal-of-nso-lawsuit-pegasus-spyware.
18    Allison Pytlak et al., Advancing Accountability in Cyberspace: Models, Mechanisms, and Multistakeholder Approaches, Stimson Center, July 8, 2024. https://www.stimson.org/2024/advancing-accountability-in-cyberspace/; Freedman Consulting, Spyware Accountability Mechanisms FrameworkFord Foundation and Open Society Foundations, https://tfreedmanconsulting.com/wp-content/uploads/sites/264/Spyware-Mechanisms-Framework_Final.pdf.
19    “The Pegasus Project,” Amnesty International Security Lab, accessed September 13, 2025, https://securitylab.amnesty.org/case-study-the-pegasus-project/; European Parliament Policy Department for Citizens’ Rights and Constitutional Affairs, “Spyware as a Threat to Fundamental Rights and Democracy in the EU,” April 2024, https://www.europarl.europa.eu/RegData/etudes/BRIE/2024/761472/IPOL_BRI(2024)761472_EN.pdf.
20    John Scott-Railton et al., “Reckless Exploit: Mexican Journalists, Lawyers, and a Child Targeted with NSO Spyware,” The Citizen Lab, June 19, 2017, https://citizenlab.ca/2017/06/reckless-exploit-mexico-nso/.
21    Bill Marczak and John Scott-Railton, “Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted,” The Citizen Lab, June 12, 2025, https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/; John Scott-Railton et al., “CatalanGate: Extensive Mercenary Spyware Operation Against Catalans Using Pegasus and Candiru,” The Citizen Lab, April 18, 2022, http://citizenlab.ca/2022/04/catalangate-extensive-mercenary-spyware-operation-against-catalans-using-pegasus-candiru/.
22    Roberts et al., Mythical Beasts and Where to Find Them.
23    Roberts et al., Mythical Beasts and Where to Find Them.
24    Roberts et al., Mythical Beasts and Where to Find Them.
25    Roberts et al., Mythical Beasts and Where to Find Them.
26    Deposition of Sarit Bizinsky Gil, WhatsApp Inc., et al. v. NSO Group Technologies Limited, et al., No. 4:19-cv-07123-PJH (N.D. Cal.),  September 6, 2024, https://about.fb.com/wp-content/uploads/2025/05/WhatsApp-v-NSO-Gil-Transcrips_Case-4-19-cv-07123-PJH.pdf.
27    Roberts et al., Mythical Beasts and Where to Find Them.
28    Roberts et al., Mythical Beasts and Where to Find Them.
29    Roberts et al., Mythical Beasts and Where to Find Them.
30    Joe Dodson, “Widow of Slain Saudi Journalist Can’t Pursue Surveillance Claims Against Israeli Spyware Firm,” Courthouse News Service, May 21, 2025, https://www.courthousenews.com/widow-of-slain-saudi-journalist-cant-pursue-surveillance-claims-against-israeli-spyware-firm/.
31    Tim Starks, “Legal Barriers Complicate Justice for Spyware Victims,” CyberScoop, October 30, 2024, https://cyberscoop.com/spyware-court-cases-nso-group-meta-whatsapp-apple/; Tim Starks, “Appeals Court Clears Path for El Salvadoran Journos to Sue Spyware Maker,” CyberScoop, July 8, 2025, https://cyberscoop.com/appeals-court-clears-path-for-el-salvadoran-journos-to-sue-spyware-maker/.
32    WhatsApp Inc., et al. v. NSO Group Technologies Limited, et al., “Order Re Motions for Summary Judgment, Motion for Sanctions, and Discovery Letter Briefs,” No. 19-cv-07123-PJH, U.S. District Court for the Northern District of California, filed December 20, 2024, https://storage.courtlistener.com/recap/gov.uscourts.cand.350613/gov.uscourts.cand.350613.494.0.pdf
33    NSO Group Technologies Limited, et al. v. WhatsApp Inc., et al., No. 21-1338, Supreme Court of the United States, petition for certiorari denied January 9, 2023, https://www.supremecourt.gov/docket/docketfiles/html/public/21-1338.html; NSO Group Technologies Limited, et al. v. WhatsApp Inc., et al., “Brief for the United States as Amicus Curiae,” No. 21-1338, Supreme Court of the United States, filed November 21, 2022, https://www.supremecourt.gov/DocketPDF/21/21-1338/247116/20221121154250394_NSO%20v.%20WhatsAppp%20CVSG.pdf.
34    “Court of Appeal Upholds Ruling that a Foreign State Can Be Sued for Alleged Hacking of Computers,” Twenty Essex, October 7, 2024, https://www.twentyessex.com/court-of-appeal-upholds-ruling-that-a-foreign-state-can-be-sued-for-alleged-hacking-of-computers/; “High Court rules that a foreign state can be sued for alleged use of spyware,” Twenty Essex, August 22, 2022, https://www.twentyessex.com/high-court-rules-that-a-foreign-state-can-be-sued-for-alleged-use-of-spyware/.
35    Bill Marczak et al., “Triple Threat: NSO Group’s Pegasus Spyware Returns in 2022 with a Trio of iOS 15 and iOS 16 Zero-Click Exploit Chains,” The Citizen Lab, April 18, 2023, https://citizenlab.ca/2023/04/nso-groups-pegasus-spyware-returns-in-2022/.
36    Marczak et al., “Triple Threat.”
37    Joseph Menn, “Apple Seeks to Drop its Lawsuit Against Israeli Spyware Giant NSO,” Washington Post, September 13, 2024, https://www.washingtonpost.com/technology/2024/09/13/apple-lawsuit-nso-pegasus-spyware/.
38    Marczak et al., “Triple Threat.”
39    Amnesty International, Forensic Methodology Report: How to Catch NSO Group’s Pegasus, July 18, 2021, https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/.
40    Amnesty International, Forensic Methodology Report.
41    Bill Marczak et al., “FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild,” The Citizen Lab, September 13, 2021, https://citizenlab.ca/2021/09/forcedentry-nso-group-imessage-zero-click-exploit-captured-in-the-wild/
42    AJ Vicens, “Predator Spyware Infrastructure Taken Down after Exposure,” CyberScoop, March 4, 2024, https://cyberscoop.com/predator-spyware-infrastructure-taken-down/US Department of the Treasury, “Treasury Sanctions Members of the Intellexa Commercial Spyware Consortium,”, press release, March 5, 2024, https://home.treasury.gov/news/press-releases/jy2155.
43    Insikt Group, Predator Spyware Infrastructure Returns Following Exposure and SanctionsRecorded Future, September 5, 2024, https://www.recordedfuture.com/research/predator-spyware-infrastructure-returns-following-exposure-sanctions.
44    Insikt Group,  Predator Still Active, with New Client and Corporate Links Identified, Recorded Future, June 12, 2025, https://www.recordedfuture.com/research/predator-still-active-new-links-identified.
45    Apple Inc., Building a Trusted Ecosystem for Millions of Apps: The Important Role of App Store Protections,” white paper, June 2021, https://www.apple.com/privacy/docs/Building_a_Trusted_Ecosystem_for_Millions_of_Apps.pdf.
46    Apple Inc., Building a Trusted Ecosystem.
47    Zack Whittaker, “Apple Patches an NSO Zero-Day Flaw Affecting All Devices,” TechCrunch, September 13, 2021, https://techcrunch.com/2021/09/13/apple-zero-day-nso-pegasus/.
48    Apple Inc. v. NSO Group Technologies Limited, and Q Cyber Technologies Limited, “Complaint: Demand for Jury Trial,” filed November 23, 2021, https://www.apple.com/newsroom/pdfs/Apple_v_NSO_Complaint_112321.pdf.
49    Dan Swinhoe, “AWS Kicks NSO Group from its Infrastructure After Hacking Report,” Data Center Dynamics, July 21, 2021, https://www.datacenterdynamics.com/en/news/aws-kicks-nso-group-from-its-infrastructure-after-hacking-report/.
50    Zack Whittaker, “Google is Notifying Android Users Targeted by Hermit Government-Grade Spyware,” TechCrunch, June 23, 2022, https://techcrunch.com/2022/06/23/hermit-zero-day-android-spyware/; “Protecting Users from Spyware,” WhatsApp, accessed September 15, 2025, https://faq.whatsapp.com/641700318302674; Zack Whittaker, “WhatsApp Fixes Zero-Click Bug Used to Hack Apple Users with Spyware,” TechCrunch, August 29, 2025, https://techcrunch.com/2025/08/29/whatsapp-fixes-zero-click-bug-used-to-hack-apple-users-with-spyware/; “About Apple Threat Notifications and Protecting Against Mercenary Spyware,” Apple, April 23, 2025, https://support.apple.com/en-us/102174.
51    Marczak et al., “FORCEDENTRY.”
52    Whittaker, “Apple Patches.”
53    Jackie Snow, “The iPhone’s Lockdown Mode: What It Is and Who Should Consider Using It,” Wall Street Journal, November 30, 2024, https://www.wsj.com/tech/cybersecurity/iphone-lockdown-mode-e1901a85?st=ej1wAy&reflink=desktopwebshare_permalink.
54    “Apple Expands Industry-Leading Commitment to Protect Users from Highly Targeted Mercenary Spyware,” Apple, updated July 6, 2022, https://www.apple.com/newsroom/2022/07/apple-expands-commitment-to-protect-users-from-mercenary-spyware/.
55    Google, “Google’s Strongest Security Helps Keep Your Information Safe,” accessed September 9, 2025, https://landing.google.com/intl/en_in/advancedprotection/.
56    Maia Hamin et al., Design Questions in the Software Liability DebateAtlantic Council, January 16, 2024, https://www.atlanticcouncil.org/in-depth-research-reports/report/design-questions-in-the-software-liability-debate/.
57    Hamin et al., Design Questions; Chinmayi Sharma and Benjamin C. Zipursky, “Who’s Afraid of Products Liability? Cybersecurity and the Defect Model,” Lawfare, October 19, 2023, https://www.lawfaremedia.org/article/who-s-afraid-of-products-liability-cybersecurity-and-the-defect-model.
58    Sharma and Zipursky, “Who’s Afraid of Products Liability?”
59    Sharma and Zipursky, “Who’s Afraid of Products Liability?” 
60    Sharma and Zipursky, “Who’s Afraid of Products Liability?”
61    Derek E. Bambauer and Melanie J. Teplinsky, “Standards of Care and Safe Harbors in Software Liability: A Primer,” Lawfare, May 31, 2024, https://www.lawfaremedia.org/article/standards-of-care-and-safe-harbors-in-software-liability–a-primer.
62    Bambauer and Teplinsky, “Standards of Care.” 
63    US Cyberspace Solarium Commission, “Legislative Proposals,” July 2020,  https://www.solarium.gov/report/legislative-proposals.
64    US Cyberspace Solarium Commission, “Legislative Proposals.”
65     The White House, “National Cybersecurity Strategy,”  March 2023, https://bidenwhitehouse.archives.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf.
66    The White House, “National Cybersecurity Strategy.”
67    Jim Dempsey, “Standards for Software Liability Focus on the Product for Liability, Focus on the Process for Safe Harbor,” Lawfare, January 23, 2024, https://www.lawfaremedia.org/article/standards-for-software-liability-focus-on-the-product-for-liability-focus-on-the-process-for-safe-harbor.
68    Dempsey, “Standards for Software Liability.”
69    Business Software Alliance, “BSA’s 2025 Global Agenda: The Enterprise Technology Sector’s Agenda for a Secure and Resilient Digital Ecosystem,” October 2024, https://www.bsa.org/files/policy-filings/2025cyberagendabsa.pdf.

The post 404 Accountability not found: Spyware accountability through software liability appeared first on Atlantic Council.

]]>
Partnering for economic security: A comprehensive strategy for greater United States–Dominican Republic integration https://www.atlanticcouncil.org/in-depth-research-reports/report/partnering-for-economic-security-a-comprehensive-strategy-for-greater-united-states-dominican-republic-integration/ Mon, 29 Sep 2025 13:00:00 +0000 https://www.atlanticcouncil.org/?p=876505 As global supply chains shift and geopolitical competition intensifies, the United States and the Dominican Republic have a timely and strategic opportunity to deepen their partnership across economic, security, and institutional dimensions. This report outlines six key pillars where coordinated engagement can enhance resilience, unlock new avenues for growth, and strengthen regional stability.

The post Partnering for economic security: A comprehensive strategy for greater United States–Dominican Republic integration appeared first on Atlantic Council.

]]>

Bottom lines up front

  • With growing export capacity and geographic proximity, the Dominican Republic is a strategic partner that can help the United States secure supply chains through joint twinshoring. 
  • The United States can deepen this partnership by leveraging targeted investment, infrastructure modernization, and digital and energy cooperation to reduce reliance on China.
  • To fully capitalize on this opportunity, the Dominican Republic must continue its institutional development, upgrade infrastructure, and train a workforce aligned with US industry needs.

The view from the Hill

“The relationship between the United States and the Dominican Republic is rich with history and underpinned by our shared tenets of democracy, trade, and security. Here in New York’s Hudson Valley, I am proud to represent a large Dominican population, whose contributions to our economy, culture, and communities are felt every single day. We are proud to join the Atlantic Council’s Adrienne Arsht Latin America Center to announce the release of this comprehensive strategy for greater United States–Dominican Republic integration. This new, imaginative framework will ensure that our bilateral cooperation continues for decades to come—and will lead to the mutual expansion of our economic partnership, shared security efforts, and celebration of each other’s cultures.”

Representative Mike Lawler (R-NY)

“The partnership between the United States and the Dominican Republic is a cornerstone of stability, prosperity, and security in the Caribbean. The Atlantic Council’s Adrienne Arsht Latin America Center has provided a timely report offering strategic recommendations to leaders in both nations as we work collaboratively to deepen economic cooperation, enhance technological integration, and strengthen our shared security. I am honored to join the Council and sector leaders in recognizing this important contribution to advancing the United States–Dominican Republic relationship.”

Representative Adriano Espaillat (D-NY)


As global supply chains realign and geopolitical competition intensifies, the United States and the Dominican Republic have a unique opportunity to deepen economic, security, and institutional ties. By working together across six key strategic pillars both countries stand to enhance resilience, unlock new growth opportunities, and bolster regional stability. DR-US engagement presents the following strategic payoffs:

  • Industrial supply chain security: The United States secures critical supply chains, reduces dependence on China, preserves high-value domestic production, and expands exports through integrated co-production. The Dominican Republic shifts from low-cost assembly to higher-value manufacturing, attracts long-term investment, integrates into strategic US supply chains, and develops a skilled, specialized workforce.
  • Strategic infrastructure and regional logistics: The United States gains a logistics diversification partner in the Caribbean, enhances US Southern Command disaster and counter-narcotics capacity, enables a neighbor’s exit from Belt and Road-aligned infrastructure, and leverages the Dominican Republic for regional warehousing, transshipment, and space infrastructure. The Dominican Republic modernizes strategic infrastructure, becomes a regional logistics and disaster response hub, attracts investment in cutting-edge sectors such as space, and deepens security and counter-narcotics cooperation with the United States.
  • Digital infrastructure and cybersecurity: The United States establishes a secure regional digital hub for the Caribbean, reduces Chinese tech penetration, expands secure cloud and intelligence networks, and strengthens cybersecurity coordination. The Dominican Republic leads Caribbean digital transformation, attracts international tech and data firms, evolves into a regional cybersecurity operations hub, and diversifies into high-value digital services.
  • Energy security and critical minerals: The United States secures regional critical minerals and liquefied natural gas (LNG), diversifies supply away from China, supports Puerto Rico’s energy needs, and creates a regional partnership model. The Dominican Republic monetizes mineral resources, modernizes its grid and exports electricity, gains energy sovereignty, and becomes a regional resource development hub.
  • Homeland and regional security: The United States locks in a security partner in the Caribbean, prevents regional instability, narcotics flows, and migration crises, reinforces counterterrorism and sanctions enforcement against hostile regimes, and enhances resilience against cyber and hybrid threats. The Dominican Republic strengthens border and national security, secures structured US support against spillovers from Haiti and regional shocks, institutionalizes anti-corruption and rule of law gains across political cycles, and bolsters international standing as a hemispheric security partner.
  • Institutional alignment and bilateral mechanisms: The United States builds a resilient alliance with a regional partner, improves policy coordination, enhances diaspora engagement, and models whole-of-government cooperation. The Dominican Republic institutionalizes US–Dominican ties beyond political cycles, grows influence in Washington, engages diaspora capital and talent, and articulates long-term priorities with strategic continuity.

View the full report

Watch to learn more

About the authors

Marino Auffant is a nonresident senior fellow at the Atlantic Council’s Scowcroft Center for Strategy and Security.

Enrique Millán-Mejía is senior fellow for economic development at the Atlantic Council’s Adrienne Arsht Latin America Center.

Acknowledgments

This report would not have been possible without the invaluable input, support, and
feedback throughout the research and drafting process of the DR-US Economic Strategy Advisory Group.

This initiative was made possible with the support of ASIEX (Asociación de Empresas de Inversión Extranjera) through a grant from the Ministry of Industry and Trade of the Dominican Republic.

Related content

Explore the program

The Adrienne Arsht Latin America Center broadens understanding of regional transformations and delivers constructive, results-oriented solutions to inform how the public and private sectors can advance hemispheric prosperity.

The post Partnering for economic security: A comprehensive strategy for greater United States–Dominican Republic integration appeared first on Atlantic Council.

]]>
Stable US-EU trade requires a new approach to globalization https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/stable-us-eu-trade-requires-a-new-approach-to-globalization/ Mon, 29 Sep 2025 04:00:00 +0000 https://www.atlanticcouncil.org/?p=874281 From the China shock to the breakdown of free trade, any assessment of the US-EU trade agreement and the future of transatlantic trade hinges on understanding the leverage that both parties brought to Scotland.

The post Stable US-EU trade requires a new approach to globalization appeared first on Atlantic Council.

]]>
Much has been said about the unequal terms of the US-EU trade deal reached in Turnberry, Scotland, in July. Two camps have emerged: those who see Europe as having prematurely capitulated to US coercion and those who see Europe as having had little choice.

The road to Turnberry

Any assessment of the outcome of the Turnberry negotiations—and, therefore, any assessment of where to go from here—hinges not on the negotiations themselves but on the amount of leverage the two parties brought to Turnberry. The European Union (EU) had less of it. Europeans have a goods export dependency on the United States that the United States does not have with any country, let alone those in Europe. This asymmetry is long-standing, an outcome of the post-war trade system that emerged after Bretton Woods. That system was grounded in a model of export-led growth. As the richest market and with the lone currency pegged to gold, the United States was the target designation for others’ exports, not least so that European countries could earn dollars to rebuild.

US negotiators of that era were comfortable with asymmetrical concessions because they believed the global economy as a whole would grow, aggregate demand would rise, and all trading nations could benefit from increased production. The United States did not undertake these commitments with the expectation that increased imports would come at the expense of US workers or producers. At some point, however, that is just what happened, contributing to the Nixon Shock of 1971. Part of Richard Nixon’s goal in allowing the dollar to float was to correct for overvaluation that had depressed US export competitiveness. The accession of China’s non-market economy to the World Trade Organization (WTO) in 2001 accelerated US deindustrialization and, along with it, the loss of jobs that had provided many blue-collar Americans with lifelong economic security. Today, this is known as the China Shock.

As the last three years have exposed all too well, exports are not the only area of asymmetrical European dependency. The EU has also relied on the United States for its security—another outgrowth of the post-war environment. The United States was not only the market of first and last resort, but Europe’s security guarantor. To be sure, this was not an altruistic undertaking. The United States sought to keep Europe democratic and market oriented, part of an overall effort to fend off the threat of communist encroachment.

European prosperity flourished. Today, more than half the Group of Seven (G7)—the club of rich countries—comprises European democracies as well as all three former Axis powers. Nevertheless, these dependencies persisted.

As the China Shock began to unfold in US communities, the 2008 financial crisis and resulting recession severely widened inequality and aggravated precarity in many of those same communities. The one-two punch of deindustrialization and the Great Recession sparked popular backlash against a global governance regime seen as serving the interests of elites at the expense of the middle and working classes. In retrospect, this backlash can be understood as the beginning of the end of the United States’ willingness to serve as the market of first and last resort.

In 2013, academics began to document the China Shock, formally publishing the results of their work in 2016. These results showed that US imports from China had caused a significant loss of manufacturing jobs, concentrated in particular regions, with economic effects that lasted throughout workers’ lifetimes. The researchers also linked the China Shock to electoral outcomes. In 2015, the Chinese government adopted a Made in China 2025 industrial strategy that promised to transform China into a producer and innovator of cutting-edge goods. The combination of the China Shock and Made in China 2025 triggered a profound and rapid shift in US thinking. Policymakers who had supported the effort to create a global free market confronted the rise of a non-market economy that was dominating one critical industrial sector after another. Made in China 2025 sought to expand that dominance from steel, aluminum, and glass to advanced sectors such as electric vehicles, robotics, and aerospace. It was precisely to avoid that kind of dominance that the architects of Bretton Woods planned to embed antimonopoly rules in the global trading system in 1948.

The “free trade” paradigm breaks down

Made in China 2025 was inspired by Germany 4.0, Germany’s industrial strategy, and both were grounded in export-led growth. As early as the 1970s, the United States complained that Germany was promoting exports at the expense of domestic consumption.

In 1995, Europeans and Americans led the creation of an entirely new trade regime, yet this failed to address the long-standing transatlantic tension of Germany’s export orientation. Moreover, the tariff asymmetry dating back to the founding of the General Agreement on Tariffs and Trade (GATT) lingered; the US tariff cap was 3.4 percent, while Europe’s was 5 percent. While the United States sought to use the narrower tools of trade remedies (known as “trade defence” in Europe), the WTO Appellate Body over time eroded the strength of those tools, even creating commitments that the parties had expressly declined to make during negotiations. The EU has been well aware of this dynamic, having lost the first of several disputes involving one of the commitments in question.

The 2016 double shock of Brexit and the election of Donald Trump should have served notice that popular discontent was manifesting as an angry rejection of the system as a whole. Yet trading partners who had come to rely on export-led growth largely rejected calls for change, instead pressing for more of the same. Similarly, despite a clear message that NATO partners needed to bear more of the burden of collective security, now-wealthy allies neglected to step up.

The COVID-19 pandemic drove home the vulnerability that comes with that kind of domination. Not only did shortages of personal protective equipment prove lethal, but production around the world was hamstrung when Chinese lockdowns persisted.

The Biden reset and Trump 2.0

The Joe Biden administration came into office offering strong support for the transatlantic relationship, from declaring a truce on rancorous trade disputes like Boeing-Airbus in 2021 to providing military support to Ukraine in the wake of its invasion by Russia. Europeans consistently expressed fear of a second Trump administration but, in the end, seemed disinclined to do much to bolster the Biden administration’s efforts to address the core challenge of US deindustrialization. The European posture was infused with a conviction that the only proper course was restoration of the status quo ante. Early on, one European paper characterized Biden as “Trump with manners,” a line that administration officials would routinely hear in person. To meet climate commitments, as well as to begin to address deindustrialization, the United States enacted the Inflation Reduction Act (IRA). Europeans responded by complaining that the IRA represented a “continuation of President Trump’s hard-nosed America First policies.” A more pragmatic and less ideological analysis revealed that the IRA played to European manufacturing strengths and thus presented an opportunity, rather than a constraint, for European exporters.

Now we have the second Trump administration. It is indeed engaged in hard-nosed “America First” policy, deploying tariff authorities in unprecedented ways while criticizing trading partners for regulating their economies contrary to the preferences of some US multinational corporations—the very thing the Biden administration had declined to do. This policy led not only to Turnberry, as the Europeans felt a trade war would lead to an even worse outcome, but to an ongoing discussion about European regulatory sovereignty.

The EU position is more precarious still. Europe risks not only the loss of export opportunities to the United States, but the possibility that the European market will itself become the destination of choice for the next China Shock. All this is happening as the Trump administration expresses fatigue with guaranteeing Europe’s security.

The way out

Is there a way out of this downward spiral? Yes. But it requires policymakers around the world to spend less time pining for the past and more time focused on what to build next.

Fortunately, there are signs that a shift is taking place. Germany’s willingness to remove the debt brake for defense spending suggests that the long-standing goal of having Germans consume more and export less might indeed be coming to pass—all while addressing outsized dependence on the United States for security. It is a fraught debate. If Germany pairs military Keynesianism with austerity, the result could be an acceleration of authoritarian sentiment reminiscent of the policies that ushered in the end of the Weimar Republic. Still, the shift in approach is a positive step.

Germany’s efforts have been followed by a pledge for Franco-German cooperation, signaling a shared commitment to charting a new path for Europe to extricate itself from these challenges. On a still broader European scale, the recent report by Mario Draghi rightly argues that the EU must do more to integrate and unleash the power of the internal market.

Similarly, there are signs that China is wrestling with the harmful consequences of its economic model. Xi Jinping recognizes that fierce internal competition leads to excessive production (much of which is then exported). As finance professor Michael Pettis has argued for years, China must find a way to encourage greater domestic consumption, relieving the emphasis on exports that is problematic for advanced economies and has also contributed to premature deindustrialization in less advanced economies.

The United States must also adjust. If other governments succeed in reducing their dependencies, the United States will have less influence. Shifting overnight to a world of pure power politics, coupled with the erosion of US domestic rule of law, will have implications for the long-term viability of the dollar as the reserve currency. That, in turn, will have implications for the servicing of US debt, which is expected to grow as a result of the One Big Beautiful Bill.

The answers suggested here lie principally in the domestic policies of each relevant economy. Many trade experts reach for trade tools, such as the Comprehensive and Progressive Trans-Pacific Partnership (CPTPP) and other free trade agreements (FTAs), as the escape hatch. Yet too few understand what these agreements actually do: They lock in existing supply chains rather than diversify them. This is especially true for intermediate goods. If Europe is looking to further strategic autonomy by diversifying away from existing dependencies—one of the goals of the Franco-German alliance—then signing agreements that incentivize half the content of an FTA good to come from non-FTA partners will not do the trick.

None of these transitions is without cost or pain. Europe has struggled for decades to complete the internal market. Still, even the shock of the first Trump administration did not move Europeans to minimize their exposure in any significant way. Weighing existential threats to Europe, Draghi—who recognizes the shortcomings of the old system—pleaded before the European Parliament: “Do something!”

China’s reorientation of its economy toward consumption will not be easy either, which is why it has not yet happened. But the potential consumption power of its huge domestic market means that China is not fated to play the role of a predatory global monopolist, distorting markets and crushing the ability of market-oriented producers to compete.

The biggest obstacle to moving toward a global trading system more suited to contemporary circumstances might be intellectual: the lingering belief that there is, in essence, only one way to do globalization and it was done in 1995. History tells us otherwise. The previous great globalization boom was grounded in UK hegemony, colonialism, and the gold standard. This model also once seemed inexorable. Yet the onset of World War I proved the beginning of the end. Countries struggled for two decades thereafter to salvage the gold standard, but they were eventually forced to accept the demise of what John Maynard Keynes referred to as a “barbarous relic”—and to come up with something else.

The post-war regime, suited for its era, encouraged dependencies that shifted over time from beneficial to unhealthy. We are now living through a period in which the adverse consequences of those dependencies have become manifest. Just as the architects of the post-war vision summoned the courage and imagination to create a new system to foster peace and stability, so must we.

About the author

Beth Baltzan is a nonresident senior fellow with the Atlantic Council GeoEconomics Center. She previously served as a trade policy adviser in the Biden administration.

Related content

Explore the program

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

The post Stable US-EU trade requires a new approach to globalization appeared first on Atlantic Council.

]]>
How to dismantle a reserve currency https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/how-to-dismantle-a-reserve-currency/ Mon, 29 Sep 2025 04:00:00 +0000 https://www.atlanticcouncil.org/?p=875322 For the economic tumult that the dollar has faced over the last eighty years, its political foundations have remained steadfast—until now. As the political order on which the dollar system rests grows creaky, dollar preeminence is also looking wobbly.

The post How to dismantle a reserve currency appeared first on Atlantic Council.

]]>
The Trump administration could redefine the world’s relationship with the dollar

Few national monies have what it takes to reach international reserve currency status. Markets are picky, only elevating currencies with stable values and issued by states with broad international transactional networks and large, open financial markets. The role of politics in shaping the global currency hierarchy is seen as secondary to these baseline economic fundamentals. That is changing as the second Donald Trump administration has thrust politics to the fore of a renewed discussion about the dollar’s reserve currency status. In the great global currency debate, market forces have never been more passé and political forces have never been so prominent. As the Trump administration’s foreign policy upends the liberal international order (LIO) upon which dollar dominance is built, questions are being raised about the future of the dollar and the potential for change in the international currency system—and rightly so. As realist scholar Robert Gilpin argued, “Every international monetary regime rests on a particular political order.” With the survival of the LIO now in question, Gilpin’s thesis is being tested in real time. Dollar dominance is as much a political phenomenon as a market-driven one. It reflects a set of ideas about what it means to be the reserve currency issuer, as well as a series of policy choices that enabled and fostered the dollar’s international use. If ideas and policy choices change, the status quo monetary equilibrium will destabilize. Today, the Trump White House appears to be breaking from the long-standing postwar view that the dollar’s reserve currency status is in the US interest. This position shift reflects a contrarian perspective that blames the dollar’s reserve role for large US trade deficits and industrial decline. Consequently, the administration is embracing an unorthodox economic policy path to undo these alleged harms. As uncertainty about the United States’ political commitment to the dollar’s reserve role grows under this administration, the currency’s appeal will diminish.

International security dynamics are also stoking change. US allies are incentivized to hold dollars due to security considerations. Moreover, so long as they depend on Washington for protection, their own currencies are less likely to emerge as rivals to the dollar. Trump views US allies as free riders who have taken advantage of the United States by enjoying military protection without paying for it, leading him to openly question the NATO Alliance. If the United States casts aside its security responsibilities in Europe and elsewhere, former military dependencies will pursue self-help security strategies. A more independent Europe that finances a large and fast-growing military budget through joint debt issuances could put the euro on a path toward being the dollar’s rival, which some predicted it could become a quarter century ago.

The dollar’s rise, enshrinement, and reign as the world’s indispensable currency coincided with an unprecedented era of global economic integration and international institution building. As US power has waned in the twenty-first century, its currency power has remained steady. Indeed, dollar dominance might be the most durable feature of the aging US-led postwar international order. Predicting its demise has been a foolhardy enterprise for more than half a century. This time could be no different, but there are reasons to think it might be. For all the economic tumult that the dollar has faced and endured over the last eighty years, its political foundations have remained steadfast—until now. As the political order on which the dollar system rests grows creaky, dollar preeminence is also looking wobbly.

The reserve currency role as policy choice

Political economist Jeffry A. Frieden’s opus Global Capitalism, a sweeping historical account of economic globalization in the twentieth century, presents us with a seven-word thesis: “Globalization is . . . a choice, not a fact.” Frieden’s pithy point is that global markets do not develop in a political vacuum; rather, they are the product of politics, of government policy choices that remove barriers to economic integration. The political base upon which markets are built is easy to ignore, especially during times of openness and cooperation. However, when things begin to fall apart, the weight of politics and policy becomes impossible to miss.

Extending Frieden’s thesis, it is also true that issuing the world’s reserve currency is a choice, not a fact. US economist Peter B. Kenen wrote more than fifty years ago that the United States“allowed other countries to attach [reserve currency] status to the dollar.” That is, US policy choices enabled market actors to elevate the dollar to its global currency status.

Decades of US political leadership supported the dollar’s reserve currency role largely for one reason—it was believed to be in the US national interest. Because the world’s investors want to hold dollars, the US government, as well as US businesses, can tap global capital markets for a seemingly limitless supply of low-cost financing. To overly simplify it, being the reserve currency issuer is akin to having a credit card with an unusually high borrowing limit and the lowest interest rates available. This gives the United States unparalleled macroeconomic flexibility, allowing Washington to keep taxes low while spending more freely on priorities like national defense than it could if its currency were not so special. This is why, in the late 1960s, France’s finance minister infamously labeled the dollar’s reserve status an “exorbitant privilege”; it uniquely allowed the United States to practice fiscal profligacy without being disciplined by markets.

Given the perceived benefits of issuing the world’s reserve currency, preserving dollar preeminence has been a mainstay of presidential administrations going back decades. The proof is in the policy. For example, successive administrations have espoused the United States’ commitment to a “strong dollar,” aimed at ensuring that dollar assets maintain their long-term appeal to foreign investors. Since fully deregulating its capital markets after the Bretton Woods system collapsed, the United States has maintained an open-door investment policy, making it an attractive destination for foreign capital. As a borrower, the US government has earned a sterling reputation by never defaulting on its bonds, which is a central reason why US Treasuries are viewed as safe assets. During the most extreme moments of global financial distress, the Federal Reserve has repeatedly acted as the lender of last resort to the global economy, making its currency available to jurisdictions where panic had made dollar funding scarce. The political independence of the Federal Reserve, while occasionally tested by presidents, has been respected and protected, signaling competent, technocratic management of the dollar.

None of this happened by accident. To return to Frieden’s thesis, the United States has chosen, time and again, to take on the role and responsibility of issuing the world’s reserve currency. Now, as the United States’ commitment to the LIO appears to be fading, its commitment to the dollar’s reserve role might also be slipping away.

From privilege to burden

What happens if US policymakers change their minds? How might US policy evolve if Washington no longer views issuing the reserve currency as a net positive for the United States and something worth preserving? We are beginning to get answers to these questions as the Trump administration breaks with decades of dollar policy orthodoxy.

At the heart of this apparent position shift is a contrarian view of the dollar, associated with the ideas of Michael Pettis, which portrays the reserve currency role as a burden rather than a privilege. As the primary provider of the global safe asset, the argument goes, the US financial system absorbs massive amounts of foreign capital each year. As foreign central banks and private investors buy dollars to scoop up safe, highly liquid US Treasury bonds, the dollar’s value increases while corresponding foreign currency values are depressed. As a result of the strong dollar, US-made goods are uncompetitive globally, depressing exports, while foreign goods are inexpensive in US markets, stimulating imports. The net effect is a large and persistent current account trade deficit that harms US producers and shrinks US industrial capacity.

This perspective has gained a foothold within the Trump White House. In a 2023 public hearing with Federal Reserve Chair Jerome Powell, then Senator JD Vance suggested that reserve currency status amounts to “a massive tax on American producers” and linked it to a “hollowed out industrial base.” Stephen Miran, who served as the president’s top economic advisor prior to joining the Federal Reserve Board of Governors earlier this month, published a paper last year detailing policy steps the Trump administration might take to offload some of the reserve currency burden onto other countries.

For Miran, the objective is clear: to rebalance US trade with the world through dollar devaluation and bring down long-term US debt service costs in the process. He meticulously outlines a range of policy paths the administration can take toward these ends, including: the imposition of tariffs to bring trading partners to the table where a coordinated, multilateral dollar devaluation could be negotiated; cutting off allies from US security commitments and from the Federal Reserve’s dollar swap lines unless they agree to exchange their ten-year US Treasury bills for hundred-year bonds; imposing a “user fee” or tax on foreign official holders of US Treasury securities to reduce the inflow of capital into US financial markets; and influencing Federal Reserve policy to assist in weakening the dollar.

Uncertainty and the dollar

Whether the White House chooses to pursue all, some, or none of Miran’s proposals, the discussion itself generates uncertainty about the global dollar’s future. Political scientists Helen Milner and Erik Voeten argue that, even in the absence of fundamental changes to the “building blocks” of the LIO, uncertainty about the stability of those building blocks—including uncertainty about future policy choices—can affect the global economy. If structural uncertainty increases to the point that the equilibrium to which most market actors previously expected to converge is no longer shared, behavior becomes unpredictable.

The Trump administration’s unorthodox position on the dollar is producing uncertainty on multiple fronts. First, there is the apparent end of a US commitment to a strong dollar. If dollar asset holders expect that the currency is in a sustained depreciation, the appeal of US assets will decline relative to alternatives. Second, there is the question of swapping short-term Treasury bills for much less attractive hundred-year bonds, a move that many would consider a technical default on US debt obligations. If the United States can force foreign governments to accept this deal today, it might do so again in the future. This undermines confidence in future bond issuances, making US Treasuries less attractive as a safe asset. Next is the proposal that the United States might deny its partners access to the Fed’s dollar swap lines. This suggestion has already raised anxiety in Europe and, if implemented, would be viewed as an abdication of US monetary leadership. Then there is the suggestion that the United States could impose capital controls to slow financial inflows into US Treasuries. This move would challenge the United States’ fifty-year reputation as the world’s most open financial system and raise questions about its future commitment to liberalism. Finally, the notion that the White House might somehow secure the Federal Reserve’s cooperation in an effort to depreciate the dollar raises questions about the independence of the US central bank, fanning fears about the soundness of US monetary policy and the dollar’s long-term appeal as a store of value. These measures, to say nothing of the use of coercive trade measures or the threat to withdraw US security protections to key allies, have the potential to reshape how the dollar is perceived around the world.

What happens if structural uncertainty about Washington’s global dollar policy increases? We might have witnessed a trial run of this in April amid the unveiling of Trump’s “Liberation Day” tariffs and his unprecedented threats to fire Powell (threats which continue today). Historically, the dollar strengthens and US bond yields fall in times of crisis and uncertainty, as investors rush for the safety of US Treasuries. This is precisely what happened during the initial weeks of the global financial crisis in 2008, as global investors clambered out of risk assets, such as equities and emerging market assets, and into the haven of US debt securities. In April 2025, however, investors sold their riskier US equities as well as their “safe” US government bonds. Rather than the dollar appreciating and government bond yields falling after Trump’s announcement, the dollar slumped and US borrowing costs jumped, shocking markets. Amid swelling uncertainty about the United States’ political commitment to the global dollar and to liberal economic principles, the old currency equilibrium might be approaching its critical point. Uncertainty about US security commitments is also contributing to this instability.

Security and securities

Collective security is a core component of the LIO, with NATO functioning as its cornerstone. The transatlantic Alliance rests on the bedrock principle that an attack on one member is an attack on all, yet Trump’s transactional approach to foreign policy is straining the credibility of Article 5. Today, US allies in Europe and beyond question whether they can count on Washington to guarantee their security in a future crisis.

While the connection might not appear obvious at first glance, a breakdown in trust within the US alliance network could further weaken the dollar’s reserve currency status. Foreign governments that rely on the United States for security tend to hold a higher share of their foreign exchange assets in US dollars. Investments in US government debt subsidize Washington’s ability to pursue an assertive military posture in the world, including providing defense guarantees for its allies. Thus, security dependencies are incentivized to buy Treasuries that finance the US defense capabilities on which they rely. Were Washington to pull back from its defense commitments abroad, the security-driven logic for holding dollars would fade, cutting into demand for dollar assets.

More importantly, as Trump has sown uncertainty about the United States’ commitment to NATO, Europe is now planning for a future in which its security will not depend on the United States. If Europe embraces a unified approach to security-driven fiscal expansion, the euro stands to expand its share of global reserves at the US dollar’s expense.

TINA meets the euro

Hyping the euro’s potential is as old as the euro itself. Upon its introduction at the turn of the century, some observers envisioned the new monetary unit emerging as the dollar’s equal, if not its rival. Jacques Delors, former European Commission president, proclaimed, “the little euro will become big” while former Federal Reserve Chair Alan Greenspan speculated that “it is absolutely conceivable that the euro will replace the dollar as [the] reserve currency.” Though the currency has ensconced itself as the clear number-two international currency, it is a distant second, accounting for 20 percent of global reserves to the dollar’s 57 percent.

The euro’s stunted rise has reinforced the popular view that dollar dominance is destined to endure indefinitely. Even as dissatisfaction with dollar dominance has climbed because of rising US debt levels and Washington’s reliance on financial sanctions, skeptical observers cry “TINA!” (there is no alternative). This argument accepts that the dollar system is flawed but asserts that it remains the cleanest dirty shirt in the laundry bin. The euro cannot supplant the dollar’s reserve role because the sovereign bond market in Europe is too small and too fragmented. Also, China’s authoritarian political system, closed capital account, and non-convertible currency disqualify the renminbi as an option.

These are not unfair characterizations. On size alone, Europe’s $10-trillion government bond market cannot absorb as much of the world’s savings as the $25-trillion US Treasury market. Furthermore, because the currency union lacks an attendant fiscal union, European governments issue debt separately. With the European debt crisis of fifteen years ago still fresh in market memory, investors rightly view German debt differently than debt issued by other Eurozone nations. In short, European sovereign bonds are of varying quality and are available in too limited a quantity to be a viable alternative to their dollar-denominated counterpart.  

Despite these legitimate constraints, the Trump administration’s upending of the United States’ traditional security role in Europe is giving the euro renewed potential as a reserve currency. The European Commission is now calling for the continent to have a self-sufficient defense posture by the beginning of the next decade. To achieve this, the commission acknowledges, “a massive increase in European defence spending is needed,” targeting €800 billion ($930 billion) in newly mobilized financial resources. While not all of this will necessarily be financed through new debt issuances, much of it will. Germany’s surprising elimination of its debt brake—a self-imposed rule that previously limited Berlin’s capacity to deficit spend—is indicative of the change that is already happening.  

The issuance of many new sovereign bonds in Europe over the rest of this decade will prove attractive to central banks looking to diversify away from their US Treasury holdings. Importantly, Europe has space for significant and sustained fiscal expansion; in 2024, the European Union’s collective debt-to-GDP (gross domestic product) ratio was 81 percent compared to 120 percent in the United States. European government bond markets have the capacity to grow more than the US Treasury market over the next ten years, increasing the supply of highly rated euro-denominated bonds in primary and secondary markets. There is also reason for optimism on European progress toward unified Eurobond capital markets: the 2025 commission report proposes that €150 billion of the €800 billion total be raised via a newly created financial instrument that would issue single-branded European Union (EU) bonds and EU bills.

Whether these proposals become reality is a political question more than an economic one. The euro’s stunted rise over the last quarter century is attributable primarily to the lack of political will on the continent to implement the policies necessary for the common currency to reach its full international potential. With an aggressive Russia waging a hot war on its eastern flank and a US president aiming to end what he sees as European free riding on US defense, there has never been a moment riper for the Eurozone to take the steps needed to unleash the euro and take down TINA.

What the future holds

We are less than a year into the second Trump administration. Much is yet to be written, and much can still change. In time, the White House might drop its contrarian view of the reserve currency role as a burden and embrace policies that reinforce dollar centrality. Europe might fail to achieve fiscal unity and expansion, leaving its borders less secure from invasion and its currency’s potential arrested once again. However, if we continue along the current path, the erosion of dollar dominance will pick up speed. Change will come in increments, not overnight, but one day—perhaps within the next decade—the dollar’s share of worldwide reserves will fall below 50 percent. This share will continue to slide, not undoing the dollar’s international role but ending its unquestioned unipolar moment. US global financial power and influence will fall in kind.

History is littered with failed predictions of the international dollar’s imminent demise. The are many reasons why the dollar has endured despite its critics. It has unique infrastructural advantages including its dense, efficient, low-cost, cross-border payment network and the world’s deepest, most liquid, and most open financial markets. It also has incumbency advantage. International currency markets are prone to inertia because of network effects. The benefits any actor derives from using any given currency are directly related to whether others are also using that currency. Once the market settles on a choice (in this case, the dollar) actors have little incentive to change. The dollar has also lacked a true peer competitor in the marketplace. While TINA might not be a strong positive argument for dollar dominance, it remains a powerful, constraining, and stabilizing force. These are all good reasons to bet on the status quo continuing.

Yet it is also true that dollar dominance will not last forever. Eventually, the doomsayers will get it right. As Charles Kindleberger once quipped, “the dollar will end up on history’s ash heap.” Kindleberger was an economist, but one with a keen eye for the fundamental role that politics plays in the world economy. He would have been sympathetic to Gilpin’s observation that monetary regimes and political orders are co-constituted. Dollar dominance and the US-led LIO were constructed alongside one another by a series of mutually reinforcing policy choices. Whether the former can long endure without the latter is the monetary question of our age.

About the author

Daniel McDowell is the Maxwell Advisory Board professor of international affairs at the Maxwell School of Citizenship and Public Affairs at Syracuse University and a nonresident senior fellow at the Atlantic Council’s Geoeconomics Center. 

Related content

Explore the program

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

The post How to dismantle a reserve currency appeared first on Atlantic Council.

]]>
What drives the divide in transatlantic AI strategy? https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/what-drives-the-divide-in-transatlantic-ai-strategy/ Mon, 29 Sep 2025 04:00:00 +0000 https://www.atlanticcouncil.org/?p=876649 The US and EU share AI ambitions but diverge on regulation, risking a fractured Western front. Nowhere is this tension sharper than in financial services, where details matter most.

The post What drives the divide in transatlantic AI strategy? appeared first on Atlantic Council.

]]>
As both the United States and European Union unveiled their respective AI strategies this summer, a paradox emerges: despite sharing broadly similar objectives—boosting domestic AI capabilities, maintaining technological leadership, and managing AI risks—the two allies find themselves increasingly at odds over how to achieve these goals. The divergence reflects fundamental differences in regulatory philosophy, economic structure, and geopolitical positioning — all of which threaten to fragment what should be a unified Western approach to AI governance at a critical moment of competition with China.

The Donald Trump administration’s “Winning the Race: America’s AI Action Plan” outlines a vision of AI as a decisive frontier of global economic and security competition. The first pillar advocates for a deregulated, private-sector-led environment by reducing regulations, promoting open-source AI models, and fast-tracking AI deployment in industries such as healthcare, while tackling some questions about workforce transition. The second pillar addresses energy capacity by upgrading the electric grid, restoring domestic semiconductor manufacturing, building secure data centers, and establishing cybersecurity measures including incident response capabilities. The third pillar on international diplomacy and security, seeks to counter Beijing’s growing influence in international governance bodies and export the full stack of US AI to allies and partners. The plan also identifies financial services as both an opportunity and a vulnerability. AI is viewed as a driver of financial innovation and efficiency, but also as a channel for risks including misinformation, cyber fraud, and systemic instability.

The European Commission’s AI Continent Action Plan was unveiled in April 2025, and is part of a long series of reports and regulations undertaken by the EU to bolster its competitiveness in AI. It lays out a five-pronged plan to scale up computation models through new AI factories, innovation hubs, and pooled resources, improve access to and availability of high-quality data, accelerate application of AI through public services and industrial activities, enable the Draghi report’s ambition to “exceed the US in education” when it comes to training and retaining skilled talent, and further fortify the European single market for AI.

Both the approaches aim to buttress domestic adoption and application of AI—often through nudges from the state when it comes to exploring applications in public services, and encouragement for many kinds of commercial activities. China has come to a similar conclusion, with its continual emphasis on using local government action plans to diffuse AI into public service provisions, and all kinds of industrial activities through its “AI Plus” initiative. There are few references to China in the EU’s latest AI document, while Washington’s approach has both implicit and explicit connotations of a largely two-way race between itself and Beijing.

Approaches from the United States and the EU are both likely to face issues regarding capital and financing of these action plans. While US private-sector investments in AI are many-fold those in the EU and China, the scale and focus of spending make a big difference. In the United States, the Trump administration has put AI contracts front and center in its broader deregulation approach—recent quarters have seen dozens of venture capital rounds above $100 million, and large megadeals (one of about $40 billion in the first quarter of 2025 alone aside) are becoming more common. Major players like Microsoft have committed to $80 billion this year for AI-capable data centers, and overall US tech capital expenditure for AI and infrastructure is being projected in the hundreds of billions over the next few years.

Meanwhile, across the EU, fiscal rules constrain deficit and debt levels: member states are required to keep deficits below 3 percent of gross domestic product (GDP) (though some exceed this threshold) and debt below 60 percent. The EU’s budget amounts to about 1 percent of GDP, and key instruments such as the Recovery and Resilience Facility are set to expire in 2026—leaving a gap in large-scale funding. The EU is currently negotiating its next seven-year budget (2028–2034), which is expected to place strong emphasis on large-scale investments, including a proposed Competitiveness Fund. In China, while growth targets remain and fiscal policy is being kept “flexible,” debt burdens, weak investment returns in sectors such as property and manufacturing, and slowing external demand limit what Beijing can unilaterally spend without risking macroeconomic instability.

These differences mean that even when headline figures like “$500 billion investments” are floated, much of that tends to flow into private capital for infrastructure, cloud and chip production, startup rounds, and acquisitions. They are not distributed evenly or necessarily aimed at building strategic domestic capabilities. Europe and China risk being unable to match the pace of US capital expenditure, not only because of absolute capital constraints but because of institutional, regulatory, and macro-fiscal drags.

Challenges to US-EU alignment on AI

These structural spending imbalances are compounded by inconsistent US policy decisions that leave European partners scrambling to adapt. For example, Joe Biden administration’s AI diffusion rule in January 2025 left many countries in Europe with restrictions on importing advanced chips from the United States, and led to a call for maintaining a “secure transatlantic supply chain on AI technology and super computers, for the benefit of our companies and citizens on both sides of the Atlantic.” The Trump administration repealed this rule and, in its place, the EU committed to purchasing $40 billion of US-made chips as a part of its trade agreement with the United States.

This interaction lays bare the two tensions complicating the US-EU alignment on AI strategies. The first concerns the strategies’ time horizons and the enabling actions undertaken by each jurisdiction. The EU’s approach has been solidified with years of iterative public discussion amid the market transformation from AI—starting with the Draghi report, the AI Act and even Ursula von der Leyen’s European Commission presidency campaign. In contrast, the US AI strategy has seemed reactive and temperamental—shifting focuses between administrations on important issues such as risk and safety, open-source models, and export controls. Recent partnerships with the Gulf states and lifting of controls on NVIDIA’s H20 chips sale to China have also demonstrated a deal-making approach to AI, which is often at odds with the stated US strategy.

The EU has embraced binding rules such as the AI Act, in line with its broader tradition of digital regulation. By contrast, US administrations have favored light-touch, voluntary frameworks, and sectoral oversight rather than comprehensive law. This reflects a bipartisan reluctance to over-regulate the industry. This divergence in regulatory culture means that even when Washington and Brussels agree on broad goals, they often diverge on the instruments used to achieve them,

The second tension in the US and EU strategies concerns the EU’s own complicated motivations in the context of its present economic interdependence on the United States and China. This reliance is visible across the entire AI input stack. At the software level, European firms overwhelmingly depend on US-developed foundational models, cloud platforms, and AI tools provided by companies such as Microsoft, Google, and OpenAI, reflecting the absence of a globally competitive European alternative. In 2025, the United States produced about forty large foundation models, China around fifteen, and the EU only about three. At the infrastructure and cloud level, the “big three” US cloud hyperscalers are estimated to power about 70 percent of European digital services. At the hardware level, the EU remains structurally reliant on advanced semiconductors designed in the United States and fabricated in Asia, with Europe’s domestic semiconductor sector making up less than 10 percent of global production. Supply chains for critical minerals and legacy chips further reinforce exposure to Chinese producers, which control a significant share of upstream inputs and mid-tier manufacturing. Chinese companies dominate the refining of critical minerals such as rare earths and graphite, essential for chipmaking and AI datacenter equipment. They are also leading suppliers of mid-range GPUs, networking hardware, and AI server components, which European firms may increasingly source to diversify away from US vendors. Chinese technology companies, including Baidu and Alibaba, are also emerging players in foundation model training and deployment, reinforcing Europe’s reliance on external providers. These dependencies complicate the EU’s sovereignty ambitions and its ability to balance relations with the United States.

Recognizing these vulnerabilities, the EU launched initiatives to expand domestic capacity, raising about €20 billion to build “AI gigafactories.” These factories would be capable of hosting large-scale compute infrastructure, with the aim of catching up to the US and China. While these projects signal a commitment to reduce dependency, they remain long-term efforts. Even as Europe invests in its own infrastructure, there is still high exposure to non-EU supply chains for the critical inputs into AI. The European Central Bank noted that about half of Euro area manufacturers sourcing critical inputs from China report being exposed to supply chain risk.

These two tensions—uncertainty in US policy actions and the gap between the EU’s ambitions of sovereignty and its reliance on US and China for critical inputs—will continue to play out over the next few years.

The financial services sector and AI action plans

For financial services in particular, AI adoption is accelerating—banks now flag AI as core to transformation. JPMorgan reports hundreds of production use cases across fraud, marketing, and risk in its shareholder communications, while Bank of America’s “Erica” virtual assistant has logged more than 2 billion client interactions—evidence that AI is reshaping front-, middle-, and back-office processes from customer service to underwriting to treasury operations. This brings opportunities including cost and error reduction, real-time risk sensing, and new AI-enabled products like cash flow intelligence for corporate treasurers.

But financial services also represent one of the highest-risk sectors for AI adoption, given the direct societal impact of errors or bias in lending, risk modeling, or compliance monitoring. The AI Index 2025 shows that measurable gains remain modest, with most firms reporting less than 10-percent cost savings or revenue growth below 10 percent. AI adoption for financial services also lags in key areas. Many institutions remain in pilot phases, data quality and legacy infrastructure limit deployment, and regulatory uncertainty combined with talent shortages slows uptake in high-risk applications such as credit scoring and underwriting. Regulatory divergence sharpens these trade-offs: The United States leans on voluntary risk-management tooling (the National Institute of Standards and Technology – Artificial Intelligence Risk Management Framework) that gives firms latitude to innovate, whereas the EU’s binding AI Act and sectoral guidance from the European Securities and Markets Authority impose high-risk classifications and board-level accountability for AI in investment services—raising documentation, testing, and oversight burdens for cross-border finance.

Ultimately, the private sector and business in both jurisdictions need to adapt to these tensions and, in some cases, even begin to view them as productive in their journey of AI adoption and diffusion across various functions. What the AI action plans have done is provide a broad framework of AI strategy. But for financial services companies and the broader commercial sector, the devil is in the details and will require closing the transatlantic gap in the regulatory approach to AI. This seems more difficult than it would have a year ago.

About the authors

Ananya Kumar is the deputy director, Future of Money, at the GeoEconomics Center.

Alisha Chhangani is an assistant director at the GeoEconomics Center

Related content

Explore the program

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

The post What drives the divide in transatlantic AI strategy? appeared first on Atlantic Council.

]]>
The dollar’s role in the fight for US primacy https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/the-dollars-role-in-the-fight-for-us-primacy/ Mon, 29 Sep 2025 04:00:00 +0000 https://www.atlanticcouncil.org/?p=877020 The contours of the second Trump administration's trade and exchange rate policies are becoming clearer. Economic policies have now become inextricably linked with US foreign policy priorities, including the role of the dollar.

The post The dollar’s role in the fight for US primacy appeared first on Atlantic Council.

]]>
Eight months into the second Donald Trump administration, the contours of its trade and exchange rate policies are becoming clearer—or at least their objective is. In line with the administration’s wider goal of reasserting the United States’ dominant global role, especially vis-à-vis China, economic policies have now become inextricably linked with US foreign policy priorities. The administration has deployed both its military and economic leverage in the service of its policy goals to a degree not seen for a long time.

With respect to China, the administration is taking steps to preserve and exploit US technological advantages, while trying to close the gap in other areas in which China has strategic advantages. The first category includes advanced chip design and artificial intelligence (AI), in which the United States continues to enjoy a slim advantage over China; the second category includes restoration of US manufacturing with the help of tariffs. Closing the manufacturing gap with China serves both domestic and international ends, of course, with the goal of boosting US employment while building the capacity to sustain a potential military conflict that would otherwise quickly exhaust the United States’ advanced weapons arsenal.

The administration aims to leverage new financial technologies as a source of growth and to keep the dollar at the apex of the world’s exchange rate system. Faced with the development of an internationally tradable Chinese digital currency that would operate outside US law, the administration aggressively pushed for Congress to pass the Guiding and Establishing National Innovation for US Stablecoins (GENIUS) Act to set up a regulatory environment for US dollar-backed stablecoins. From its point of view, staking out a crypto universe that consists largely of dollar-denominated assets could stifle Chinese plans and further underpin the United States’ economic leverage. Another advantage is that coin issuers would help finance the growing US deficit burden, as crypto firms have already become major buyers and holders of short-term Treasury securities.

At the same time, the administration has discarded important economic principles that, in medical terms, are equivalent to basic advice for a healthy lifestyle. For example, it has emphasized short-term growth by continuing with loose fiscal policies that add to already high debt, hollowed out government functions via across-the-board staff cuts, compromised market integrity by reducing regulatory oversight, appeared to interfere with statistical data collection, and sought to undermine the independence of the Federal Reserve. Formerly close allies and major trading partners are rethinking economic relations with the United States, given a climate of uncertainty in which disagreements in any policy area could trigger new tariff threats as a means of extracting further concessions.

Can the administration defy economic gravity?

These policies have been met with pessimistic—if not downright fatalistic—assessments of the future of the global economy and the international financial system, including in a recent Foreign Affairs edition and a Centre for Economic Policy Research e-book. The gist of these reactions has been that, by discouraging foreign trade and removing the cornerstones of the post-WWII economic order, the administration is: undermining the stability and productivity of the United States and other economies; and creating the risk of global instability, given economic interlinkages and the tight integration of financial markets. The biggest casualty of these developments might be the United States itself, given the inherent contradictions in a policy that aims to close the current deficit without improving public saving, raise productivity while sheltering firms from foreign competition, and cancel energy projects while electricity is urgently needed to feed a sprouting network of data centers—not to mention giving China the opportunity to boost its geopolitical standing as a trading partner and source of economic support for third-party countries.

And yet, the reaction of markets to this generational change in US policies has been remarkably muted. Stock markets have rebounded strongly after the April 2 tariff announcements and, even in the aftermath of the attempted dismissal of Federal Reserve Governor Lisa Cook, capital inflows into the United States have remained strong. The dollar and long-term Treasury markets have weakened in recent months, but these movements have been minor compared to the momentous policy reversals in recent months.

The momentum in technology stocks could well overshadow the consequences of recent policy changes, which will take some time to show their full effect. The picture would be much worse, however, had the United States and China not agreed to a truce in their trade dispute, with the United States refraining from further tariff measures in exchange for China’s continuing exports of rare earth minerals. Indeed, the dependence on China as a provider of these minerals presents a major constraint on the Trump administration’s latitude for further action.

It remains to be seen how markets will react to the possible release of pent-up inflation in the coming months, including from rising energy prices, the exhaustion of stockpiles of goods imported at lower tariff rates, and sectoral labor market shortages due to ramped-up immigration enforcement. A slowing economy might mitigate price pressures for some time, especially if there is a rise in unemployment among younger labor market cohorts, but it would be difficult to imagine these factors not reasserting themselves as long as the fiscal position is extremely loose.

If the administration were to respond by suppressing inconvenient data or shaping the Federal Reserve’s interest decisions, volatility could increase sharply. This risk still seems remote, but there is a real possibility of a fiscal doom loop due to a blowout of long-term interest rates caused by investors moving out of Treasuries, risking financial distress in case of unexpected market movements.

Currency dominance by default?

With these prospects, the debate about the future of dollar dominance is back in full swing. The risks of using the dollar would certainly increase if the Trump administration were able to directly influence monetary policy in the face of rising inflation (as happened, for example, under Turkish President Recep Tayyip Erdoğan in recent years, leading to overall negative outcomes).

It is important to keep in mind, however, that changes in global currency arrangements are not bound to happen overnight. Even in the case of large policy mistakes, the global role of the dollar might only weaken gradually, as it still seems unlikely that another dominant currency contender could replace it within a short time period.

A recent Atlantic Council strategy paper emphasized the link between global hegemony and reserve currency status, suggesting that only China, with its economic reach and geopolitical expansion, could possibly become a successor to the United States. Europe, meanwhile, is buffeted by powerful forces from the outside and within, ruling out a major geopolitical role for the euro in the foreseeable future.

However, China’s economic model is showing severe strains from adverse demographics, stagnant growth, and a large domestic debt overhang. Moreover, as China is a continental (rather than maritime) power, Chinese leaders have consistently stated that their strategic aims revolve around regional order and expanding trade and economic relations, rather than gaining global dominance. Another reason to be skeptical about the renminbi’s international use is that China’s capital account and financial markets are still tightly controlled and fairly closed to the outside. Moreover, the renminbi plays only a limited role as a store of value, given China’s lack of a stable and transparent regulatory regime and an independent judiciary.

Chinese authorities have refrained from liberalizing the capital account because of the risk that residents would invest substantial parts of their savings abroad for more attractive returns, leading to sharp capital outflows. This risk would, of course, diminish if the United States (along with other Western countries) were to end up in a debt spiral, but it still seems unlikely that the Chinese Communist Party would give up control over its citizens’ external transactions.

While this is obviously speculative, perhaps it will one day become possible for China to fully trace the participants and purposes of transactions in renminbi-based stablecoins, using its extensive surveillance capabilities in combination with sophisticated AI tools. This could allow further liberalization for foreign investors while keeping domestic capital controls in place. If China were also able to reassure foreign investors about their property rights and the rule of law, the renminbi could become more attractive as an investment vehicle, boosting its international use.

This thought experiment is just to show that we are entering uncharted territory. Eighty years after Bretton Woods, a new chapter of international finance is being written, in terms of both technology and the shared commitment to financial stability. The Trump administration supports this transition because it believes that earlier administrations did not respond forcefully enough to China’s misuse of global rules, to which it credits the country’s rise as a manufacturing power. The administration seems to hope that a tariff- and technology-driven boost will restore the US economy to the dominant position it once held.

With policies in flux, it is hard to predict how this paradigm change will play out. The United Kingdom at the end of the nineteenth century certainly did not expect the pound to be displaced by the dollar within a generation. Neither is it clear that there will be a dominant currency in the years to come. The alternative could be a multipolar, or even fragmented, global financial system with all the costs, uncertainties, and volatility that this could bring.

Stablecoins are no panacea

What seems certain, however, is that further cooperation between the large economies will be needed even if the administration succeeds in leveraging crypto technology to support the dollar’s global status.

The reason is that stablecoins will operate freely across borders, with different issuers competing for customers through a variety of incentives, which could include interest payments or the ability to obtain loans against their holdings. This is not allowed under the GENIUS Act, but other countries might be more lenient, or industry pressure might prompt changes to relevant legislation. However, the diversion of reserves by stablecoin issuers would increase the already nontrivial risk of a run by coin holders, which exists even under stricter regulatory standards.

The potential erosion of stablecoin discipline, as well as the consequences of stablecoins’ illegitimate use and susceptibility to cyberattacks, will require collaboration between regulators and monetary authorities of different jurisdictions. Unlike banks, stablecoins have no access to central bank balance sheets in case of distress, making it more difficult to inject emergency liquidity into the system. This further increases the risk of fire sales of the underlying assets—with potentially cataclysmic spillovers into the real economy.

For the same reason, it is clear that the United States must adopt responsible fiscal policies to support the primacy of global dollar-based stablecoins. Doubts about the value of the underlying asset would be a prime reason for investors to sell off their coin holdings. This is yet another reality that the administration will not escape. Crypto holdings can certainly help finance the deficit, but investors will take things into their own hands if the United States is unable to keep its public debt at reasonable levels.

To conclude, we could be at the cusp of an unprecedented change in the global financial landscape. The Trump administration looks to unshackle itself from what it sees as the constraints imposed on the United States by the previous global architecture. It seeks to preserve the dominance of the US dollar by means of stablecoins as one major advantage in its competition with China. Despite its unorthodox and controversial economic policies, it will need to realize that stablecoins offer no free lunch in the battle for geopolitical influence. Economic discipline and international cooperation must continue even under the envisaged paradigm change—a lesson that should be heeded before a crisis reminds us of it.

About the author

Martin Mühleisen is a nonresident senior fellow at the Atlantic Council’s GeoEconomics Center and a former IMF official with decades of experience in economic crisis management and financial diplomacy.

Related content

Explore the program

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

The post The dollar’s role in the fight for US primacy appeared first on Atlantic Council.

]]>
Waiting for the Big Bang: Executing the European defense build-up in Germany https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/waiting-for-the-big-bang-executing-the-european-defense-build-up-in-germany/ Mon, 29 Sep 2025 04:00:00 +0000 https://www.atlanticcouncil.org/?p=877478 When it comes to European defense spending, Germany can and should be the first mover. By leveraging private capital, the 5% NATO spending target can be seized as an opportunity to avert deindustrialization.

The post Waiting for the Big Bang: Executing the European defense build-up in Germany appeared first on Atlantic Council.

]]>
Since Germany’s reunification, defense spending has been a taboo topic in the country. Russia’s war with Georgia and incursions into Ukraine in 2014 raised relatively few strategic concerns in Berlin, and it took until February 2022 to shake the system loose. From guns versus butter debates to the unwinding of spending orthodoxies and industrial transformations, the last several years have witnessed a small revolution in the national dialogue as well as in the broader economy. The country has begun building a military-industrial complex essentially from scratch and exploiting all means to finance it—including using the public purse, commercial banking, and private capital. Policymakers and industry leads must deliberate what will be financed nationally, in consortium or through European Union (EU) and NATO mechanisms. It is all new.

European institutions are also expanding their mandate. The European Commission appointed Lithuanian Andrius Kubilius as its first commissioner for defense in a bid to draw defense consolidation into the technocratic machine best known for streamlining trade and financial regulation across the bloc. In November 2024 at the Berlin Security Conference, then-Commissioner-Designate Kubilius called for a “Big Bang” approach in defense policy, which would entail “producing a clear Industry Output Plan, based on the analysis of capability gaps according to NATO evaluations and covered by European production of defence equipment where we have capability gaps, with a clear target date to fulfil this Plan around 2030.”

The political will is there—and the private sector is ready to contribute

The June 2025 commitment of NATO allies to spend 5 percent of gross domestic product (GDP) on security and defense until 2035 provides the new baseline and blueprint for European defense: 3.5 percent is to be invested into weapon systems and ammunition, 1.5 percent into critical infrastructure. NATO Secretary General Mark Rutte articulated this shift after pre-summit consultations with President Donald Trump, but he already had the facts to back up his assertions to the US president. Just weeks earlier, Germany had upended its constitutional debt brake for security and defense investments and created the Sondervermögen for infrastructure.

After years of circuitous debate, the presumed new chancellor, Friedrich Merz, invoked the outgoing German Bundestag mandate to relax the debt brake. The move ultimately gained support across the centrist political spectrum, ensuring that both state-driven and external financing mechanisms would be used to reach NATO pledges. The drastic increases in defense spending remain broadly in line with fiscal principles, requiring what some would call an accounting trick, and others a compromise. Defense investments are now exempt from the constitutional debt brake and can total up to 1 percent of GDP. Anything beyond 1 percent of GDP for defense investments requires credits in special funds, usually referred to as Sondervermögen. While on-budget expenditures and investments in security and defense depend on the incoming tax revenues of the German economy, discretionary spending is effectively freed from these constraints, imposing no specific limit on such extra funding. Defense spending has gone from a crawl to a sprint, overnight.

Government stimulus tends to trigger private sector interest, which is poised to play a crucial role in scaling up defense-related resources, increasingly billed as a reliable, growing, and even socially responsible investment sector. Commercial and investment banks as well as private equity and venture capital firms are rapidly developing products for both institutional and private clients, reflecting broader awareness among decision-makers from the public and private sectors that capital is needed to meet defense spending goals. As Deutsche Bank Chief Executive Officer Christian Sewing put it, “we need to efficiently combine public funds with private capital to finance expansion. Banks and investors are ready for this—for example, Deutsche Bank’s corresponding loan portfolio amounts to a mid-double-digit billion-euro amount.”

Two recent high-level events that the Atlantik-Brücke hosted in Berlin brought together stakeholders from the military and private sector to discuss how private capital can fund the German defense build-up, sending a clear signal that private investors are ready to channel capital into Germany’s defense capabilities. It is a sea change that the government will now rely on private funding to uphold its national security obligations.

From incrementalism to joint European procurement

NATO’s 5 percent goal, and the financing behind it, is an aspirational figure without the hardware. Effective procurement is the ultimate test whether Germany and its partners can develop a modern defense capability. The strategic priorities for armament stem from the general planning processes in the alliance’s North Atlantic Council. These priorities range from modern tanks and air missile defense systems, such as the Patriot, to fighter jets, such as the F-35; unmanned drones; battleships; submarines; and the latest defense and intelligence satellites for space and cyber operations.

So far, the incremental procurements of military assets by individual NATO allies and EU member states are hardly the breakthrough the European defense architecture so desperately needs. European defense procurement does not take advantage of scaling effects in procurement and maintenance, and the various procured systems are not interoperable, artificially inflating operating costs.

The problem has been long recognized by EU officials. Jiří Šedivý, chief executive of the European Defence Agency, noted in a briefing to the defense industry in February 2025 that “the European defence base remains fragmented” and that “it is only by cooperating more that Member States can strengthen the defence technological and industrial base, create economies of scale, and develop the defence capabilities our Member States need.”

Based on this assessment, the EU created a program, SAFE (Security Action for Europe), to provide €150 billion in long-maturity loans for procurement efforts and fund projects based on common procurement.[10] SAFE projects should involve “at least one Member State benefitting from SAFE and another Member State, as well as Ukraine and EEA-EFTA [European Economic Area–European Free Trade Association] countries,” but will also temporarily fund individual member states’ procurement in acute security crises. It remains to be seen whether SAFE can fulfill Commissioner Kubilius’s big promise from September 2025 to “unify our fragmented defense procurement.” For the time being, nation-states and private capital will provide the lion’s share of required funding, largely due to the direct economic impulse defense spending gives to national economies and their flagship contractors.

Through defense, Germany’s economy can change in shape and scope

Increased investment in military systems will impact the overall industrial and economic landscape in Germany. In addition to defense allocations, the Sondervermögen also includes €500 billion for infrastructure and climate protection. It has not escaped the governing parties that the security crisis in Europe provides an opportunity to ignite a long-needed growth stimulus for the German economy. Germany remains the third-largest economy in the world, but is poised to record a third consecutive year of zero or negative growth. This year most likely will not bring the turnaround: In the second quarter of 2025, Germany’s economy decreased by 0.3 percentage points compared with the first quarter. All major economic institutes in the country as well as the International Monetary Fund predict hardly any economic growth for Germany in 2025.

Germany’s economy has developed formidable strengths in the automotive, machine engineering, and chemical industries over the past few decades, leading to its export-oriented position in the global economy. This has changed significantly, especially over the past five years, as global competitors have improved their research and development in all kinds of industrial sectors, their labor force skills, and their knowledge. More robust supply chains and much lower energy costs have also contributed to the successes of foreign economies, mostly in the Indo-Pacific region and in South America.

The stimulus of the defense sector lands at a decisive moment for Europe’s industrial powerhouse. In the near and midterm future, development and production in German defense industrial capacities will change the economic landscape and help maintain industrial output and employment levels. They could even ensure long-term economic growth given Germany’s extended NATO commitments, so long as the country focuses on defense technologies of the future (such as drones) as well as industrial stalwarts that can draw on current production capacities (such as tanks). Germany’s defense industry will also play a crucial role in building Ukraine’s deterrence capabilities—which European Commission President Ursula von der Leyen refers to as Europe’s “steel porcupine.” This will provide opportunities for the defense industry beyond NATO’s borders.

From Zeitenwende to Kriegstüchtigkeit

NATO planning structures are responsible for analyzing allied readiness in Europe, the United States, and Canada in varied crisis scenarios, including if Russia were indeed able to attempt a full-scale attack on the alliance’s territory by 2029, as predicted by recent war games. Acknowledging that Germany is far from reaching this goal, Germany’s federal minister of defense, Boris Pistorius, has coined the term Kriegstüchtigkeit, or “war readiness,” for the Bundeswehr. This is a sea change. As minister, he has spearheaded an about-face in the security identity of Germany, from enjoying the fruits of a peace dividend under the United States’ nuclear umbrella to becoming a European leader and transatlantic partner in security and territorial defense. Germany’s new role is even now visible on the streets. There are widespread advertisements for both drone-warfare technology and recruitment for the armed and intelligence services.

Although public attitudes are changing, we must continue to wait for the “Big Bang” at both the EU and German levels—and perhaps we need to come to terms with the idea that the outcomes produced by the EU always reflect the intricate balancing of diverse interests. Instead, the process will be arduous. However, first steps have been made, and we can learn from them to meet the urgency of the moment:

  • Private capital is waiting to be leveraged. Private capital will play an ever-increasing role in funding the capability to innovate and will assume some risk-taking propensity in new technologies. This paradigm shift has already occurred but too often lacks the mechanisms to effectively translate private assets into tangible capabilities.
  • Europe and Germany should seize this moment as an opportunity to avert deindustrialization. While demand can also stimulate production beyond Europe’s borders, it also presents Europe with the chance to boost its struggling industrial base into a defense industry of scale.
  • Joint European procurement is the goal, but not an end in itself. Despite NATO force posture requirements, there is still too little incentive to streamline the patchwork of European military structures. Defense procurement must become more flexible, faster, and more aligned among EU and NATO partners. However, absent a common debt mechanism, European security architecture will depend on national defense spending and defense contractors.

While Germany cannot straighten out these problems single-handedly, it can—and should—be the first mover. Ideally, the German armed forces will become a technology driver in a competitive European environment, capitalizing on defense research and development, start-up willpower, and effective exchange between public and private stakeholders. Military threats are unfortunately a central pillar of Europe’s geopolitics. Now, executing the European defense build-up is key to making the spirit of the Zeitenwende a new reality.

About the authors

Julia Friedlander is a contributor to the Atlantic Council and the chief executive officer of Atlantik-Brücke.

Robin Fehrenbach is a contributor to the Atlantic Council and the director of research and documentation at Atlantik-Brücke.

Jakob Flemming is a contributor to the Atlantic Council and the senior program & research manager at Atlantik-Brücke.

Related content

Explore the program

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

The post Waiting for the Big Bang: Executing the European defense build-up in Germany appeared first on Atlantic Council.

]]>
Natural gas has a small but important role in Africa’s energy transition https://www.atlanticcouncil.org/in-depth-research-reports/report/natural-gas-has-a-small-but-important-role-in-africas-energy-transition/ Tue, 23 Sep 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=874835 Limited access to electricity has long constrained both quality of life and economic growth across much of Africa. About 42 percent of the continent’s population still lives in homes without any access. While it is technically possible to rapidly increase African electrification rates through renewables, change on such a scale would require massive global investment that is not a realistic prospect in the foreseeable future. Africa’s untapped and associated gas reserves can provide part of the solution by supporting renewable energy in boosting electrification rates.

The post Natural gas has a small but important role in Africa’s energy transition appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Roughly 42 percent of Africa’s population lacks reliable access to electricity at home.
  • Using Africa’s sizeable untapped gas reserves to help electrify the continent is reasonable and fair, despite the need to cut emissions.
  • Electrifying the rest of the continent at the lowest possible climate cost within the next decade calls for renewables in most cases, and new gas-fired power plants in countries with gas and low electrification rates.

Limited access to electricity has long constrained both quality of life and economic growth across much of Africa. About 42 percent of the continent’s population still lives in homes without any access to national grids, mini-grids, or even standalone renewable systems.1 2 With 19 percent of the world’s population, Africa accounts for just 3.1 percent of global electricity demand.3 Indeed, the majority of people without access to electricity live in sub-Saharan Africa.4 This depresses living standards and stymies commercial and industrial development across the continent.

Average annual electricity consumption in Africa (excluding South Africa) was just 180 kilowatt-hours (kWh) in 2021, compared with 6,500 kWh in Europe and 13,000 kWh in the United States.5 Most people in sub-Saharan Africa consume less electricity in a year than an average US fridge.6 Power supplies in the region are not only inadequate, they are often unreliable, with outages a feature of life from Nigeria to South Africa. Sub-Saharan Africa also has the lowest per capita gas consumption of any region, at less than one-quarter of the global average,7 and accounts for just 4 percent of global gas demand.8

According to the United Nations’ Sustainable Development Goal 7, UN member states committed to achieving “access to affordable, reliable, sustainable and modern energy for all” by 2030. This target will not be reached by that date as the current pace of progress is nowhere near fast enough to connect 600 million African people in the next five years. Still, a growing number of African governments are pushing for universal access to electricity for their countries, and helping them succeed should be a global priority.

It is critical to tackle this challenge now while electrification efforts are being stepped up and over half the African population has access to electricity at home for the first time. Moreover, a significant increase in power generation will be needed to achieve universal electrification at a time of massive demographic growth. The United Nations forecasts that the population of sub-Saharan Africa will grow from 1.3 billion at present to 2.2 billion by 2054 and 3.3 billion by 2100.9 Power demand will expand even further with the adoption of electric vehicles and construction of new data centers.

It is technically possible to rapidly increase African electrification rates through renewables backed up with battery energy storage systems (BESS), hydroelectric schemes, and geothermal power (where available). Yet change on such a scale would require massive global investment that is not a realistic prospect in the foreseeable future, particularly given the recent drastic cuts to international aid budgets by some western governments.10

Africa’s untapped and associated gas reserves can provide part of the solution by supporting renewable energy in boosting electrification rates.11 Although gas-fired generation is typically more expensive than solar,12 it delivers the baseload, round-the-clock capacity needed to fuel a rapid increase in intermittent renewable energy production. What’s more, there is a substantial amount of gas expertise in Africa, as gas is the continent’s primary source of electricity, accounting for 43 percent of production in 2024.13

In response to the climate crisis, fossil fuel output will taper down, but some production will continue for many years. Emissions from gas-fired plants are at least half as high as those from coal, making gas a driver of climate change. Yet the African continent accounts for such a small proportion of global per capita emissions that new gas projects on the continent would be fair and justified where they would have a demonstrable impact on living standards and where failing to develop them would act as a brake on electrification efforts. Moreover, as this report will demonstrate, gas appears to be either a necessary or commercially viable option only in specific African countries.

Gas-to-power projects carry high upfront investment costs but are often easier to finance when attached to big export projects. The United States and Qatar, in particular, are investing heavily in new liquefied natural gas (LNG) production capacity to satisfy global demand, but European gas markets are keen to secure new sources of supply to displace piped Russian gas, and many Asian countries are switching from coal to gas-fired generation. As a result, there is scope for both new African LNG plants and pipelines under the Mediterranean Sea that could support power production in much of West Africa, while also generating export revenues for Nigeria.

Securing financing for African gas projects will be a crucial challenge, especially in light of the high capital costs for operating projects on the continent and investors’ reluctance to fund hydrocarbon schemes in recent years. However, the new African Energy Bank and the Trump administration’s support for oil and gas investment could make a considerable difference. US Secretary of Energy Chris Wright said in March that the United States would partner with African governments and companies to support the development of projects using natural gas and other energy technologies, including by providing capital.14 Indeed, the Trump administration acted quickly to approve $4.7 billion in funding from US Export-Import Bank for TotalEnergies’ Mozambique LNG scheme.15

This report will set out why it is reasonable for Africa to develop its own gas reserves to drive electrification, explain how gas can fit into a broader energy transition on the continent, examine which countries would benefit from developing gas projects, and discuss the relationship between gas exports and local consumption. It will conclude with recommendations for how all stakeholders can utilize the continent’s natural gas resources to promote electrification at the lowest possible climate cost.

What role should natural gas play in Africa’s energy transition?

Most African countries account for a tiny proportion of global emissions but desperately need improved power supplies

16

Developing new gas-fired power plants in Africa to boost living standards and promote industrial growth would help the continent achieve a just energy transition.17 While effort should be made to rein in greenhouse gas (GHG) emissions in Africa as elsewhere, the energy transition burden of each country should be based on its absolute per capita emissions rather than year-on-year changes in its emissions. The world’s poorest countries, including most African states, have played a very small role in driving climate change, and Africa is responsible for just 3.7 percent of carbon emissions from burning fossil fuels—a far lower per capita share than any other region.18 Per capita carbon emissions in 2021 stood at 1.04 metric tons/year in Africa, four times less than the global average of 4.69 metric tons/year19 and far lower than the US average of 14 metric tons/year.20

New African gas-fired power projects should be developed where they can help speed up much-needed electrification, particularly as new fossil fuel projects continue to be developed elsewhere. The United States plans to ramp up domestic oil production,21 while China began construction of 94.5 gigawatts (GW) of new coal-fired power plants last year.22 By contrast, South Africa—which has the biggest installed generating capacity on the continent—has a total generation capacity of just 63.4 gigawatts.23

In the United States, after years of negligible new gas-fired capacity, developers are building a string of gas plants, leaving some to wait up to seven years for delivery of gas turbines.24 A single Texas power company, NRG Energy, said on May 12 that it plans to acquire 13 GW of gas-fired generation capacity25—seven times the total generating capacity of Uganda.

It was anticipated that a series of planned terminals would boost US liquefied natural gas (LNG) export capacity from 90 million metric tons per annum (mtpa) to 200 mtpa26 even before President Trump lifted the ban on new projects. New gas-fired plants are also being developed in Europe, with 20 GW of new capacity planned in Germany by 2030.27 It is therefore difficult to expect African countries to refrain from developing projects when the big polluters are failing to do so.

Asking low-emitting, energy-poor countries to forgo gas development while wealthier countries continue to expand their production capacity is hypocritical. According to the World Economic Forum in 2020, tripling African power production using gas-fired plants would only add 1 percent to global emissions.28

Per capita emissions in most African countries are “lower than what is compatible with a 1.5C degree world, so even if they grow substantially, the continent would not exceed its fair share of emissions,” wrote a leading researcher on the need to assess Africa’s energy transition strategies on a country-by-country basis.29

It is possible to integrate more natural gas within a broadly low emissions power sector

It is difficult to overstate the energy poverty of most of sub-Saharan Africa. With some notable exceptions, particularly in South Africa and North Africa, most of the continent has constrained access to reliable power supplies. It is easy to argue that this energy poverty should be overcome by focusing entirely on clean energy. The continent could leapfrog gas use and expensive gas infrastructure, in favor of moving straight to green technologies, in the same way that it has in large part bypassed landline technology in favor of mobile telecommunications. Solar should certainly be the centerpiece of power strategies in most African countries, considering the continent represents 60 percent of the world’s solar potential,30 and yet it produced just 4 percent of all solar power in 2024.31

Africa also has attractive wind resources, although in more limited areas that include South Africa, Morocco, and Egypt. Geothermal energy is another very attractive contribution to any generation mix: It is a renewable source of energy that provides baseload energy because it is “always on.” However, it is available in only a few African countries, mainly along the line of the Great Rift Valley and most notably in Kenya.

BESS can store solar energy and then release it into grids for two to four hours to cover evening peak demand. Long duration energy storage (LDES) projects hold the promise of stabilizing longer-term fluctuations in intermittent power production.

Immediate and substantial investment is needed in these technologies, but they alone cannot achieve 100 percent electrification in many African countries in the near future. Solar power, for instance, may be cheaper than gas-fired capacity per unit of energy32 and will become even cheaper over time, but it does not produce power outside of daylight hours.

The BESS sector is at an early stage of development in Africa, as costs remain high and expertise low. As for LDES, the only commercially viable technology today is pumped storage hydro, which involves moving water between two reservoirs at different levels: The water is released downhill to drive turbines to generate electricity when it is most needed and then pumped back uphill during lower-cost periods when other technologies are productive. Pumped hydro storage helps to balance grids but is a net consumer of electricity and is technically feasible in only specific geographical areas.

A comprehensive rollout of BESS and LDES should make 100 percent clean energy in Africa possible one day, but most African countries will need a greater baseload power capacity to balance out intermittent sources of power production for a long time to come. Consequently, in the interim, they must be allowed to develop gas-fired generation capacity.

Key power sector terms:

  • Baseload technologies operate 24/7 except when they are undergoing maintenance. These include oil, coal, and gas-fired projects, geothermal power plants, and hydroelectric schemes, although output falls during periods of prolonged drought.
  • Intermittent technologies produce variable amounts of power: Solar power plants produce electricity only during the day and wind farms when the wind blows.
  • Battery energy storage systems (BESS) store surplus power, usually from solar projects during the daytime, to release it into the grid when needed, often in the evening.
  • Back-up power projects help maintain supplies when other forms of generation are lacking. These can include BESS, small-scale diesel generators, and even some gas-fired technologies that can be used only when required. However, building an expensive gas-fired plant for occasional use only is not commercially attractive without additional system payments. These payments are allocated to generators to reward them for being available to support the grid, in addition to each kilowatthour of actual electricity they produce, particularly during periods of peak demand.

More gas can complement the rollout of low emissions technologies. Developing new gas-to-power projects alongside renewables could help drive access to electricity in many African countries over the next decade. The renewables sector has taken off in a small number of African countries, led by South Africa, Egypt, and Morocco, with large projects currently in development elsewhere on the continent. Yet gas and renewables should not be viewed as an either-or choice: gas-fired projects can be paired with renewable energy and large hydro to provide grids with reliable power where renewable energy penetration is increasing.

Gas-fired plants could be used as back-up for solar and wind power, but this secondary role risks making construction commercially unviable in most markets. Financing is only likely to be secured for gas projects that provide baseload capacity;33 still, these plants could be downgraded to back-up in the longer term.

Replacing back-up diesel generators with gas-fired capacity offers the added benefit of reducing GHG emissions. At present, millions of African homes and businesses rely on diesel generators to provide electricity when their national grids fail to meet demand. These generators produce 74.14 kilograms of CO2 per million British thermal units (Btu) compared to 52.91 kilograms for gas-fired capacity.34

Fossil fuel power plants, whether gas, coal, or oil-fired, currently provide 75 percent of all electricity in Africa, with 25 percent coming from clean energy (7 percent from solar and wind and most of the remainder from hydro). And yet, 54 percent of new capacity added between 2020 and 2025 was clean energy.35 Coal-fired power plants are the second biggest power-generation technology in Africa (after gas), but the picture is skewed because of its dominant role in South Africa, which hosts 84 percent of African coal-fired capacity.36 Africa’s coal consumption has remained flat over the past two decades, and little new coal-fired capacity is planned, as highly polluting coal is increasingly overlooked.37

Hydro schemes provide round-the-clock electricity but are devastated by droughts and generally not classified as renewable energy projects because of the impact on local communities, flora, and fauna during construction and flooding.

Building a diverse generation mix is a strategic method of balancing out variations in power production. As a result, new gas sector investment should not be made at the expense of renewable energy investment and must be seen as one element of a generally low emissions generation mix.

The benefits of technological diversity, including natural gas, can be amplified by greater cross-border power integration. For example, building high-capacity transmission lines to connect neighboring national grids allows electricity to be moved from areas of surplus capacity to areas of shortage. This helps each area focus on its strengths and even out variations in production. Similarly, a prolonged drought in one country may not affect hydro reservoirs in other countries, while gas-fired plants can stabilize power supplies over a wider area. There is already evidence of cross-border efforts, with power pools­ (where neighboring states share power production to some extent) at various stages of development in Southern, East, and West Africa.

Increased gas use in Africa has many potential benefits

Improving access to electricity, including via gas-fired power plants, will help boost living standards and drive economic growth in Africa, especially for the poorest half of the population that currently lacks any access at all. Consider the enormous benefits of having electricity: Even very small amounts enable children to do their homework in countries where it is dark by 7:00 p.m., medicines to be safely stored at the necessary temperatures, and electronic devices to be charged.

Restricted access to electricity and natural gas hampers efforts to attract manufacturing and industrial investment. Rising labor costs are driving manufacturing offshoring from China to Southeast and South Asia but not yet to Africa, partly because the continent lacks adequate infrastructure. Even if the electrification of industrial processes using renewables is likely in the long term, relying on gas produces lower emissions than coal in industrial processes such as steel and aluminium smelting.

Natural gas is important in the production of nitrogen-based fertilizers, both as a source of energy and as a direct input. At present, African fertilizer production is inadequate to satisfy national and continental market demand at prices farmers can afford, with average use in the sub-Saharan region less than 20 kg/hectare, compared to the global average of 135 kg/hectare.38

Gas use can also yield important environmental benefits. In South Africa, unlike most other countries, synthetic fuels provide the bulk of its liquid fuel needs, with most synthetic fuel produced from coal but some from natural gas.39 Switching more of this production from coal to gas would cut emissions.

Using gas for cooking, often in the form of liquefied petroleum gas (LPG), can substitute for kerosene and biomass (such as wood fuel), which contribute to 3.2 million annual deaths from household air pollution and accidents worldwide.40 Biomass use also drives deforestation and reduces an environment’s ability to absorb carbon. In 2022, 970 million Africans, or 67 percent of the continent’s population, lacked access to clean energy for cooking.41

Switching to gas from coal improves air quality. Although natural gas produces roughly 50 percent of the GHG emissions of coal plants, it has other environmental benefits, particularly in terms of lower air pollution. Gas produces virtually no sulfur dioxide emissions or fine particulate matter,42 whereasparticulate matter from coal use results in 42,000 deaths a year in South Africa.43

Improved access to electricity, including from gas-fired plants, would support some climate change mitigation strategies, including water desalination plants, air conditioning, cold storage, and the concrete and steel used in resilient infrastructure.44 Finally, in the longer term, gas sector pipelines could be converted to transport green hydrogen—produced using renewable energy—to offer continued use by tapping a lower-emissions energy resource compared to natural gas.

On both climate and economic grounds, commercial outlets for gas that is currently flared are needed. Non-associated gas on hydrocarbon fields is only produced in order to be used, but gas is also associated with oil and other hydrocarbons, such as natural gas liquids, where it can be commercially marketed, reinjected to aid oil production, or flared to dispose of it. Flaring creates emissions without any commercial benefit and releases more than 350 million tons of CO2 worldwide, more than Egypt’s total emissions in 2023.45

In addition to ending gas flaring, the global warming impact of gas projects can be minimized by reducing methane leakage during LNG transport and through carbon capture, utilization, and storage (CCUS). CCUS involves storing carbon from gas-fired power plants and industrial facilities underground, or using it in commercial projects, including in synthetic fuel production.

The commercial rollout of CCUS is only starting to take off worldwide, and it will likely be many years, if ever, before its use is prevalent in Africa. All CCUS options require increased energy use, additional equipment, and state support on early-stage projects.

The ideal generation mix varies greatly among African countries

Decisions relating to the role of natural gas should be made on a country-by-country basis. Because conditions are not uniform across the continent, there is no single approach that should be implemented in all markets.

Some African countries have already launched universal electrification programs. Kenya’s push to hit the 2030 SDG 7 target is discussed later, while twelve countries, including Democratic Republic of Congo (DR Congo) and Nigeria, published detailed plans in January 2025 to connect more people to their respective grids.46 Yet the best route to achieving full connectivity varies from country to country.

Each country’s energy transition must be feasible within the context of its economy, geography, and natural resources. Rather than offer “unhelpful generalisations,” the international community must “embrace and support nuance and country-specific analysis,” as Youba Sokona, author and vice chair of the Intergovernmental Panel on Climate Change, said in 2022.47

If universal, reliable electrification can be achieved in the medium term without recourse to natural gas, then new gas-fired plants should be avoided given their relatively high life-cycle emissions. However, countries with relatively low electrification rates and significant gas reserves should be encouraged and supported in building gas-to-power projects.

Angola, Cameroon, Congo-Brazzaville, Mauritania, Mozambique, Nigeria, and Tanzania would all fall into this category. Gas-fired plants would be particularly useful in Nigeria, Angola, Gabon, and Congo-Brazzaville because they flare large amounts of gas. It would also apply to West African countries that can reap the benefits of the coastal gas pipeline between Nigeria and Morocco, which has been proposed to remedy the generally low electrification rates across the region.

Nigeria has enough gas to reach 100 percent electrification—hopefully in conjunction with more rapid renewables development—but gas industry growth has been hampered by attacks on gas infrastructure and low regulated domestic prices.

Algeria has achieved 100 percent electrification but could divert gas that is currently flared to provide additional generation capacity.

Flaring is a problem in Libya and Egypt as well, but financing new power plants in conflict-torn Libya would be difficult, while Egypt is struggling to balance gas exports with domestic requirements. Countries with existing upstream gas operations already have the infrastructure and expertise in place to support new gas-to-power projects. Investment there should focus on transmission connections between gas fields, power plants, and other industrial offtakers or buyers.

Ahead of the 27th Conference of the Parties to the United Nations Framework Convention on Climate Change (COP27), hosted by Egypt in 2022, academics from fifty institutions, including many in Africa, produced a paper calling on the Global North to stop thinking of the continent as a “homogenous collective” with similar energy needs and a common route to net zero.48 The research, published in Nature Energy, compared the situation in four African countries: Burkina Faso, Ethiopia, Mozambique, and South Africa.49 The researchers offered the following recommendations for balancing electrification with climate concerns in those countries:

  • Burkina Faso should opt for a combination of solar and diesel projects. The country has a limited power grid, high power costs, and restricted access to finance, so smaller-scale, local solar and diesel projects are favored in addition to improved cross-border transmission connections, rather than building expensive gas import infrastructure. With an electrification rate of just 20 percent, the country needs to focus on cheap and quick solutions.
  • Ethiopia can continue to rely on large hydro, having built 5,250 MW of dam projects over the past decade, with another 12,000 MW in the development pipeline.50 The hydro sector now provides 90 percent of its electricity and can be complemented by growing solar and wind power investment. Ethiopia can also use hydro schemes as batteries to compensate for variation in intermittent power production, so gas is unlikely to play a role here.
  • Mozambique should develop gas reserves for domestic supply alongside LNG projects to provide the baseload capacity needed to balance intermittent renewables production and increase the electrification rate from the current 44 percent.51 Providing that security challenges in the far northeast of the country are overcome, Mozambique is set to become one of the world’s biggest emerging LNG exporters, so dedicating a small proportion of gas for power and fertilizer production could significantly boost living standards. The government is backing new gas-fired capacity while banking on off-grid solar for rural electrification.
  • South Africa should combine solar and wind projects with BESS because it would be cheaper and faster than building gas-to-power plants to move away from king coal. The country already has one of the most developed renewables sectors on the continent and is currently developing its first utility-scale BESS projects.

It might be expected that South Africa would be an ideal candidate for gas sector investment. Coal provides 81.6 percent of its generation mix, so switching coal for gas would substantially cut emissions. South Africa produced 394 million metric tons of carbon from all fuel combustion in 2022, the most on the continent, 1.2 percent of the global total and a 40 percent increase over 2021.52 Fuel combustion emissions come from thermal power generation and internal combustion engine vehicles, with coal plants accounting for 83 percent.53

Previously developed South African gas-fired power plants have suffered from lack of gas feedstock, and domestic gas reserves are limited, so efforts to reduce emissions have focused on renewables. Power utility Eskom plans to build a 3,000 MW gas-fired power plant near Richards Bay backed by an LNG import terminal by 2030, with a smaller terminal planned for Ngqura. Yet, import projects have fallen through in the past, and gas is unlikely to play a big role in South Africa.

Research by the International Institute for Sustainable Development (IISD) in 2022 concluded that gas will not be needed for South African power sector within the next decade—in part because solar and wind power was 57 percent cheaper than gas-fired plants54 and short lead times for developing solar projects make them an attractive response to the country’s ongoing power supply crisis. South Africa also has 2,832 MW of pumped storage capacity out of national capacity of 63.4 GW to act as LDES.55 The IISD also found that coal-fired plants can provide back-up capacity in the medium term, while three-hour BESS facilities are 30 percent cheaper than simple cycle gas plants—the most suitable gas plants in this instance—for covering peak demand.56

Still, gas imports could play a growing role in South Africa’s synthetic fuels industry. Sasol, a South African producer of synthetic fuels, currently uses 185 petajoules (PJ) of gas a year, of which 160 PJ/yr is imported by pipeline from southern Mozambique. As these fields become exhausted, alternative sources of gas are needed, including recent discoveries of domestic gas.57

Kenya, like South Africa, is a country where gas-fired plants are unnecessary, and it is on track to achieve universal electrification by 2030, with the electrification rate rising from 37 percent in 2013 to 79 percent in 2023. Geothermal, hydro, wind, and solar power accounts for 90 percent of power production, with geothermal and hydro plants providing baseload capacity.58 Kenya’s 985 MW geothermal capacity is the fifth highest in the world.59 Plans to build coastal Kenyan gas-fired plants are intermittently proposed and shelved but such projects are optional rather than essential.

Should Africa focus on gas exports or intra-African demand?

More new gas reserves have recently been found in Africa than anywhere else in the world

Africa accounts for just 6.46 percent of global gas output, producing 265 billion cubic meters (bcm) in 2023, of which 115 bcm were exported out of the continent.60 This compares with global production of 4,100 bcm.61 Four countries—Algeria, Egypt, Libya, and Nigeria—account for 80 percent of Africa’s output. The International Energy Agency (IEA) estimates that African demand will grow by an average of 3 percent per year, reaching 187 to 246 bcm by 2030 and up to 437 bcm by 2050.62

Roughly 40 percent of natural gas discovered worldwide between 2015 and 2024 was in Africa, mainly in Mauritania, Mozambique, Namibia, Senegal, and Tanzania.63 Namibia is the latest country in Africa to join the list, with Shell and TotalEnergies making big offshore oil and gas finds. Routine gas flaring is banned under Namibian law, so the gas will either have to be reinjected or commercially marketed. With 246 bcm identified to date, the government of Namibia aims to implement a common gas plan across all fields, including for local power generation and petrochemical production.64

African gas is used on the continent for cooking and synthetic fuel production and in various industrial processes but mostly for power generation. The share of gas-fired capacity in the African generation mix has steadily increased from 20.82 percent in 2000 to 43.13 percent in 2024. In many cases, gas-fired power plants are connected to gas fields by dedicated pipelines, but Algeria, Egypt, South Africa, and Nigeria all have more comprehensive distribution networks that are capable of supplying gas to a high number of different customers, large and small. Oil and gas companies need long-term offtake supply contracts with local utilities to invest in downstream gas operations, but signing ten- or twenty-year contracts is a huge commitment for those utilities. Energy subsidies and regulated prices help reduce prices for consumers but deter investment. According to the International Gas Union, about 55 percent of Africa’s natural gas consumption is sold at prices below the cost of supply as governments try to make gas and power more affordable for consumers.

Financing for electrification is currently far from sufficient

Developing gas-to-power projects and associated gas transmission and power grid capacity is expensive. According to the IEA, Africa must double its annual power investment to $200 billion by 2030 to achieve universal electrification while meeting climate change pledges.65

African governments and utilities have limited access to financing for new gas and power projects, while capital costs for African projects are often up to three times those in other countries,66 so the sector urgently needs access to external sources of low-cost finance. Foreign investment is therefore key, whether from commercial investors, the multilaterals, development finance institutions (DFIs), or donors.

Gas-to-power projects in less wealthy countries may not generate enough income to justify construction. Moreover, long-term gas contracts can lock African power utilities into relatively high-cost thermal power at a time when solar energy costs are falling in the region with the best solar resources on the planet.

Environmental, social, and economic risk assessments need to be thorough because of the risk of asset stranding in what are mostly small markets. Although Mozambique and Senegal have large gas reserves to develop for exports, both countries are burdened by a high cost of capital and national debt—and low levels of experience in the sector—so they could be outcompeted by lower-cost exporters.67

Financing from the multilaterals and international banks for African oil and gas projects has become scarcer because of climate concerns, but a new source of funding was launched in June 2025. African Export-Import Bank (Afreximbank) and the Africa Petroleum Producers’ Organization set up the African Energy Bank with initial capital of $5 billion, although it was established to support the entire hydrocarbons sector rather than specifically gas-to-power projects.

Egypt has focused on gas

  • International engineering companies are prepared to develop large gas-fired plants in Africa under sufficiently attractive terms of investment. In 2018, Siemens and Egyptian partners Orascom Construction and Elsewedy Electric completed the world’s three biggest combined cycle gas-fired plants: Beni Suef, Burullus, and New Capital, which provided a total of 14.4 GW out of national capacity of 59 GW in 2022.68
  • Alongside a contract to build six power substations and other transmission infrastructure, they were built for the Egyptian Electricity Holding Company, which estimates that they save the country more than $1 billion a year.69 Siemens’s involvement was crucial to financing as it was able to secure loan agreements from two export credit agencies, Germany’s Euler Hermes and Italy’s SACE, to underpin loans from more than thirty international banks.70

African gas exporters favor LNG

The majority of Africa’s gas markets are small and fragmented and have relatively low regulated prices, so it is no surprise that exports drive most investment. Gas can be exported from Africa by pipeline or as LNG, which involves cooling gas to a concentrated, liquid state for sea transport. Such projects require the construction of expensive liquefaction plants in producing countries and regasification facilities in destination markets, but they are generally considered cheaper than piping gas over very long distances. They are also the most flexible form of export, as producers are not tied to specific export markets.

Algeria and Libya both export gas to Europe via subsea pipelines, while both—along with countries further south—also ship LNG. Nigeria, Equatorial Guinea, and Angola have traditional onshore LNG plants, but Africa has become a global center of floating LNG (FLNG) development, which entails placing LNG production vessels on offshore gas reserves.

FLNG projects are smaller than their onshore counterparts, but they avoid onshore security difficulties, can be moved to other locations if required, and enable the development of gas reserves that might be flared. Projects are already operating in Congo-Brazzaville, Mozambique, Senegal/Mauritania, and Cameroon. Eni is developing a second FLNG project offshore Congo-Brazzaville and planning a second project in Mozambique, while the UTM Offshore FLNG project is being planned for Nigeria’s deepwater Yoho field, where it would use gas that is currently flared.

A huge onshore project designed to host production for two different consortia has been partially built in northern Mozambique. Work was suspended in 2021 following militant attacks, but TotalEnergies and the other developers plan to restart work this year.71 Equinor and Shell hope to finalize arrangements on a huge project in southeastern Tanzania. Africa already contributes almost 10 percent of the global LNG supply,72 but if both of these projects are completed, it will make the southern Tanzania/northern Mozambique region a global engine of LNG production.73

With global gas demand rising, US and Qatari LNG production is accelerating, with 350 bcm expected to be added to the world’s 2024 output of 670 bcm by 2030.74 The scope for African LNG projects beyond those already underway, therefore, may be limited.75 As with gas-to-power projects, export schemes—whether piped or LNG plants—could stall because of lack of market capacity.

Piping Nigerian gas to Europe could benefit most of West Africa

In addition to their cost, long-distance, cross-border pipelines are difficult to develop due to the number of stakeholders involved—from the supplying to transit and receiving countries. At present, the most high-profile proposed projects in Africa are two rival schemes to pipe gas from the Niger Delta to Algeria and Morocco for onward transportation to Europe. These projects, however, are taking very different routes.

The Trans-Saharan Gas Pipeline (TSGP), under discussion since 2022, would run 4,000 km through Niger to Algeria. Backed by two state-owned oil companies, the Nigerian National Petroleum Company and Algeria’s Sonatrach, it would have capacity of up to 30 bcm per year. Although the project would connect big reserves with huge markets, the core challenge will be security in the face of a range of armed groups operating across the Sahel. Similar security concerns have deterred construction of the proposed Turkmenistan-India pipeline through Afghanistan and Pakistan since the 1990s.76

Nevertheless, efforts are ongoing, with Penspen energy consultants agreeing to update a feasibility study into the TSGP in 2025, nineteen years after completing its initial study.77 The desire of European nations to end their long-term reliance on Russian gas may make development more likely this time around.

The rival Africa-Atlantic Gas Pipeline (AAGP) would run around the West African coast and enable onshore connections to eleven countries between Nigeria and Morocco: Benin, Togo, Ghana, Cote d’Ivoire, Liberia, Sierra Leone, Guinea, Guinea-Bissau, Senegal, Gambia, and Mauritania. Gas could be supplied to all of the transit countries as well as European customers.

The challenge with AAGP will be reaching sales and transit agreements with so many countries—not to mention security issues, including on the final stretch through contested Western Sahara. Like the TSGP, this 6,000-km project would have a 30 bcm/year capacity.78 The governments of Morocco and Nigeria plan to form a special company to drive project development.

Abuja and the project developers must guarantee that supplies to the Nigerian market are not curtailed and ensure that gas is ring-fenced for domestic use at commercially viable prices. If the AAGP succeeds in providing gas feedstock to the eleven transit countries, this could make it the most important piece of infrastructure on the entire continent.

Gas exports can aid rather than block local consumption

Many question whether gas export projects divert production from African markets or help make domestic supply commercially viable. The answer largely comes down to the political will of host governments to demand that developers consider local as well as export needs. The oil and gas companies that develop LNG projects are attracted by export revenues and deterred from domestic markets by their often limited size and low regulated prices.

African governments, of course, are keen to see LNG projects developed. The planned Tanzanian79 and Mozambican80 schemes promise the biggest ever single investments into each country, delivering benefits in terms of taxes and royalties to job creation, but it is critical to ring-fence a portion of production for local distribution.

Choosing to export gas or use it for local supply is not a binary decision. The domestic requirements will be small in relation to export volumes and can help drive domestic power generation. Ensuring that gas production benefits local communities can also foster a sense of social and resource justice. For instance, developing LNG projects in northern Mozambique while leaving most locals without access to electricity would be neither just nor sensible given the region’s militant insurgency.

Several governments, including Nigeria, Tanzania, and Senegal, already require that some gas from export-focused projects be set aside for the domestic market. For instance, the Nigerian Upstream Petroleum Regulatory Commission has the ability to force upstream producers to supply the local market.”81

Occasionally, there is tension between export obligations and domestic supplies, even when the government is committed to both. Following new gas field discoveries, for example, Egypt’s government has been eager to supply the country’s LNG industry while satisfying growing domestic demand, including from the power sector. However, in response to rising domestic consumption, it has been forced to periodically block LNG production and rely on Israeli gas imports, dealing a blow to export revenues and triggering political criticism at home.82

Recommendations

The drive for electrification will continue in at least some African countries with or without increased global support. The whole of North Africa has achieved close to universal electrification, while Kenya and Ghana are among the countries making significant progress toward that goal. For countries making less progress, there is much that can be done to help speed up the process, including by supporting gas sector development where needed. The following principles should guide the development of the continent’s natural gas resources to promote electrification at the lowest possible climate cost:

  • Climate responsibility should be based on absolute per capita emissions, not on change over time. Apart from South Africa, Africa accounts for a tiny proportion of global GHG emissions.
  • The goal of achieving universal electrification should be at the core of energy transition strategies. Leaving hundreds of millions of Africans without access to electricity on climate grounds—when the rest of the world’s GHG emissions are so much higher than Africa’s—should not be acceptable.
  • The primary focus of financing should be on renewable energy development, not least on grounds of cost per kWh. Given its relatively high life-cycle emissions, new gas-fired capacity should be avoided if universal, reliable electrification can be achieved in the medium term without it. However, countries with low electrification rates and access to gas should be backed in building gas-to-power projects—along with projects that rely heavily on gas that is currently flared.
  • The views of each country’s residents must be taken into account. They understand what it means to use kerosene and biomass fuel and to lack access to electricity.
  • In terms of electrification, renewables and gas-fired power plants should be seen as complementary rather than competing. Gas-fired capacity can provide baseload capacity to support increased renewables’ penetration, while solar microgrid and standalone residential systems can supply off-grid rural areas.
  • Pathways to clean energy systems should be considered on a country-by-country basis.

The governments of industrialized countries

Governments in North America, Europe, the Gulf States, and East Asia, among other areas, need to step up support for the African energy transition, mainly in renewables but also in gas-fired capacity where appropriate. This would boost living standards on the continent while minimizing emissions, create stronger African trading partners, and improve political and security stability in the wider world.

The International Partners Group formed at COP26 in 2021 was conceived as the primary mechanism for providing the necessary international financing for the energy transition in developing countries. As part of their efforts, the group would create Just Energy Transition Partnerships (JETPs) between investors and host governments, but only four JETPs have been forged to date: with Indonesia ($20 billion), Senegal ($2.6 billion), South Africa ($11.6 billion), and Vietnam ($15.5 billion). The United States pulled out of the program, and additional JETPs are now considered unlikely.83

Still, the objective of coordinating development finance institutions (DFIs), the private sector, host governments, multilateral development banks, and philanthropists to work together on the issue is a sound one. New “country platforms”—where host communities have greater agency and more of the funding is provided as direct grants—are being attempted instead, but it is vital that gas remains part of the equation where conditions require it. Whatever arrangement or vehicle is used, comprehensive financing mechanisms must be put in place as soon as possible.

The United States has drastically cut its aid budget, but other countries can continue to contribute, either through their development budgets, DFIs (such as British International Investment [BII] and the German Investment Corporation), or sovereign wealth funds (SWFs). BII, for instance, is committed to improving energy access84 in Africa, and although it curtailed almost all investment in fossil fuels in 2020, it remains open to financing gas-fired projects where they support human development needs. It should be more explicit in specifying progress toward universal electrification among these needs, and other DFIs should follow suit.85

The European Union has various mechanisms for supporting African development, principal among them is NDICI-Global Europe, which aims to improve living conditions and political stability including through investment in the energy transition in coordination with EU member states and institutions.86 While the organization currently does not finance gas-fired projects, it should do so where gas-fired capacity is the best route to electrification.

Sovereign wealth funds and export credit agencies

Gulf governments and their SWFs are active investors in African development, with the United Arab Emirates committed to co-financing the $25 billion Africa-Atlantic Gas Pipeline from Nigeria to Morocco87 alongside the European Investment Bank, the Islamic Development Bank, and the OPEC Fund. The central project will export Nigerian gas to Europe, but the Gulf States and other members of the consortium could also help to finance spur pipeline connections to the West African transit states and gas-fired power plants in those countries.

Norway’s Government Pension Fund Global, one of the world’s biggest SWFs and which derives most of its income from the country’s oil and gas industry, is another potential investor. It has halted investment in coal projects but continues to invest heavily in hydrocarbons, as well as African renewable energy, and seeks to promote economic development through its investments.88 However, it does not appear at present to invest in African gas-fired power plants. Drawing on Norway’s expertise in the gas sector, the fund could further many of its interests by supporting such projects, and its actions and strategies are often followed by other institutional investors.89

Despite sizable cuts to the US aid budget, the world’s biggest economy can still play a major role. US Export-Import Bank (EXIM) recently approved a $4.7 billion loan for TotalEnergies’ Mozambique LNG project that will help attract pension and institutional funds “to support upstream gas development and associated infrastructure.”90 Such investment could be combined with support for Mozambican gas-fired power projects. Because EXIM’s support for the LNG project was rooted in helping US workers and businesses involved in the scheme, it might be inclined to participate in power projects developed by US firms.

The current US government is in favor of wider oil and gas development, so African gas-to-power projects may be able to benefit from US organizations with federal connections. There could also be a pathway to develop gas-fired power plants and other gas projects in exchange for access to critical minerals in infrastructure-for-resources deals. This could be a valuable negotiating tool with mining-rich DR Congo, for instance, where Chinese companies have largely failed to develop promised infrastructural projects.91 DR Congo has neighboring states with gas reserves both to its north and south, including in Cabinda.

Apart from EXIM, other export credit agencies have played a crucial role in financing African gas-to-power projects. Euler Hermes and SACE were key to developing Siemens’ three gas-fired power plants in Egypt, and their counterparts across the world could play a similarly vital role.

African governments and regional organizations

African governments, the African Union (AU), and the continent’s regional economic communities are key players in driving electrification, including gas-fired power. The AU and regional communities have a particular role in promoting cooperation between different states. Above all, they should support cross-border power transmission integration to help neighboring countries balance out variations in power production, thereby allowing gas-fired plants to supply a larger pool of customers and support more intermittent power production.

The Southern African Power Pool has been operating since 1995, but progress has been slow in other regions, especially with respect to making the West African Power Pool (WAPP) a reality. Nigerian and Ghanaian gas could help supply energy across the region, either piped gas feedstock or electricity via cross-border power interconnectors. Political mistrust and a lack of investment have held back development of the WAPP, while the project clings to its grand vision of many cross-border, high-capacity transmission links. However, transmission integration is more likely to happen by following a step-by-step process than by imposing an overarching plan from above.

The Economic Community of West African States, which oversees the WAPP, also needs to encourage neighboring governments, power utilities, and regulators to cooperate on the technical aspects of integration, such as permitting, regulatory capacity building, and grid operation. It is difficult to trade power across borders when neighboring countries have different electricity standards that make it burdensome to secure project permit approvals.

Academic institutions, think tanks, and research organizations

At present there is very little detailed, specific research on the best energy transition strategy for individual African countries. While more than 150 research groups model the German energy system and propose long-term pathways, there are often none taking the same approach to individual African countries, even those with large gas reserves, such as Mozambique and Senegal.92 Much more country-specific research is needed, including to assess whether falling renewables and battery storage costs could leave gas-fired assets stranded.

Research is also needed on where gas-fired generation could support renewables and where it would block them. There is a real risk that gas investments could crowd out renewables by locking up infrastructure and capital.93 Detailed research on the intersection of technology and economics, along the lines of studies conducted by National Renewable Energy Laboratory (NREL) and the Pacific Northwest National Laboratory (PNNL) in the United States, would be beneficial. These organizations focus on the US energy sector, but it would be helpful if they and their peers were to dedicate a small portion of their research efforts to energy-poor countries, not least because of the learnings they would gain for their own markets.

Conclusion

Difficult choices are called for when two worthwhile causes come into conflict with each other. With the United Nations estimating that the world is on course for an average temperature rise of 3.1C by the end of this century, it is incumbent on the international community to step up efforts to mitigate climate change.94 These efforts must include phasing out the vast majority of coal and oil and probably even natural gas projects.

Yet, to more fairly distribute the remaining emissions, developing new gas-fired power plants in Africa should be a top priority. Requiring African countries to abstain from gas development when more prosperous countries are forging ahead could easily appear to be climate colonialism.

Implementing these recommendations to allow gas to be a minor but significant part of Africa’s electrification efforts would yield big improvements in living standards in some of the poorest countries in the world. There would be clear benefits for the people of Africa but also for the wider world through economic development and increased stability.

About the author

Neil Ford is a freelance consultant and journalist specializing in African affairs and the global energy sector. His main areas of interest include African development, regional integration, boundary disputes, the energy transition, and African logistics. He produces reports for a range of organizations, including law firms, energy consultancies, and financial platforms.

With over twenty-five years’ experience as a journalist, he has worked for dozens of outlets, including African Business, the BBC, Platts, Jane’s, and Reuters, for whom he also writes renewable energy and energy transition white papers. After earning a BA in history and geography at Sunderland University and an MSc in African history at the University of Edinburgh, he completed a PhD at Edinburgh. His dissertation on the creation of Tanzania’s international boundaries involved research in twelve countries, including much of Eastern Africa. He was previously deputy editor of Charity Finance magazine and a senior analyst at World Markets Research Centre.

Related content

Explore the program

The Africa Center works to promote dynamic geopolitical partnerships with African states and to redirect US and European policy priorities toward strengthening security and bolstering economic growth and prosperity on the continent.

1    International Energy Agency, “SDG7 Database,” September 2023, https://www.iea.org/data-and-statistics/data-product/sdg7-database#access-to-electricity.
3    Ember, “Africa: Electricity Access Remains an Urgent Problem Across the Continent,” last updated June 13, 2025, https://ember-energy.org/countries-and-regions/africa/.
4    Ibid.
5    African Development Bank, “Light Up and Power Africa: A New Deal on Energy for Africa,” https://www.afdb.org/en/the-high-5/light-up-and-power-africa-%E2%80%93-a-new-deal-on-energy-for-africa.
6    International Gas Union, “Gas for Africa: Assessing the Potential for Energising Africa,” 2023, https://www.igu.org/press-releases/2023-gas-for-africa-report.
7    Wood Mackenzie, email message to author, June 24, 2025.
8    Ibid.
9    United Nations, “Global Issues: Population,” last accessed July 9, 2025, https://www.un.org/en/global-issues/population.
10    Organisation for Economic Cooperation and Development, “Cuts in Official Development Assistance,” June 26, 2025, https://www.oecd.org/en/publications/cuts-in-official-development-assistance_8c530629-en/full-report.html.
11    Associated gas is natural gas found alongside crude oil that can be produced for commercial use or reinjected to aid oil production but which is sometimes (wastefully) flared or burned off.
12    International Energy Agency, “Rapid Rollout of Clean Technologies Makes Energy Cheaper, Not More Costly,” May 30, 2024, https://www.iea.org/news/rapid-rollout-of-clean-technologies-makes-energy-cheaper-not-more-costly.
13    “Africa: Electricity Access Remains an Urgent Problem.”
14    EnergyNet, “U.S. Secretary of Energy Chris Wright Outlines Trump Administration Approach to Energy Development in Africa,” March 7, 2025, https://www.poweringafrica-summit.com/industry-news/us-secretary-energy-chris-wright-outlines-trump-administration-approach-energy-development-africa.
15    NJ Ayuk, “Trump’s Second Term: A Rare Opportunity for Real African Energy Independence,” March 31, 2025, https://energychamber.org/trumps-second-term-a-rare-opportunity-for-real-african-energy-independence/.
16    This section makes use of the following article written by the author: “If the International Community Wants to Curb Fossil Fuel Emissions, It Must Make Africa a Serious Clean Energy Offer,” Africa Source, March 20, 2025, https://www.atlanticcouncil.org/blogs/africasource/if-the-international-community-wants-to-curb-fossil-fuel-emissions-it-must-make-africa-a-serious-clean-energy-offer/.
17    A just energy transition is the process of transitioning to a low-carbon economy in a way that is fair to all, including those negatively impacted by the decline of fossil fuel production.
18    International Energy Agency, “How Much CO2 Do Countries in Africa Emit?,” last accessed July 9, 2025, https://www.iea.org/regions/africa/emissions.
19    “Gas for Africa: Assessing the Potential,” 31.
20    International Energy Agency, “Global Energy Review: CO2 Emissions in 2021,” March 2022, https://www.iea.org/reports/global-energy-review-co2-emissions-in-2021-2.
21    Shariq Khan, “Oil Settles Down after Trump Repeats Pledge to Boost US Supply,” Reuters, February 6, 2025, https://www.reuters.com/markets/commodities/oil-pares-losses-after-saudi-price-increase-2025-02-06/.
22    Qi Qin and Christine Shearer, “When Coal Won’t Step Aside: The Challenge of Scaling Clean Energy in China,” February 13, 2025, https://energyandcleanair.org/publication/when-coal-wont-step-aside-the-challenge-of-scaling-clean-energy-in-china/.
24    Jared Anderson, “US Gas-Fired Turbine Wait Times as Much as Seven Years; Costs Up Sharply,” S&P Global, last accessed June 30, 2025, https://www.spglobal.com/commodity-insights/en/news-research/latest-news/electric-power/052025-us-gas-fired-turbine-wait-times-as-much-as-seven-years-costs-up-sharply.
25    Ibid.
26    Reuters, “US LNG Projects Boosted by Trump’s Export Permit Restart,” January 21, 2025, https://www.reuters.com/business/energy/us-lng-projects-boosted-by-trumps-export-permit-restart-2025-01-21/.
27    Enerdata, “Germany Plans to Develop 20 GW of Gas Power Plant Capacity by 2030,” April 11, 2025, https://www.enerdata.net/publications/daily-energy-news/germany-plans-develop-20-gw-gas-power-plant-capacity-2030.html.
28    Mark Thurber and Todd Moss, “12 Reasons Why Gas Should Be Part of Africa’s Clean Energy Future,” World Economic Forum, July 23, 2020, https://www.weforum.org/stories/2020/07/12-reasons-gas-africas-renewable-energy-future/.
29    Philipp Trotter, honorary research associate at the Smith School of Enterprise and the Environment, University of Oxford, email message to author, July 7, 2025. 
30    International Energy Agency, “A New Energy Pact for Africa,” July 13, 2023, https://www.iea.org/commentaries/a-new-energy-pact-for-africa.
31    “Africa: Electricity Access Remains an Urgent Problem.”
32    “Rapid Rollout of Clean Technologies Makes Energy Cheaper.”
33    Mostefa Ouki, senior research fellow, Oxford Institute for Energy Studies, email message to author, June 30, 2025.
34    U.S. Energy Information Administration, “Carbon Dioxide Emissions Coefficients by Fuel,” September 18, 2024, https://www.eia.gov/environment/emissions/co2_vol_mass.php.
35    “Africa: Electricity Access Remains an Urgent Problem.”
36    Ibid.
37    Ibid.
38    Samuel Njoroge et al., “The Impact of the Global Fertilizer Crisis in Africa,” Growing Africa, August 8, 2023, https://growingafrica.pub/the-impact-of-the-global-fertilizer-crisis-in-africa/.
39    Enerdata, “South African Energy Information,” https://www.enerdata.net/estore/energy-market/south-africa/.
40    World Health Organization, “Household Air Pollution,” October 16, 2024, https://www.who.int/news-room/fact-sheets/detail/household-air-pollution-and-health.
41    Akinwumi Adesina, keynote speech.
42    International Energy Agency, “The Environmental Case for Natural Gas,” October 23, 2017, https://www.iea.org/commentaries/the-environmental-case-for-natural-gas.
43    Jamie Kelly et al., “Unmasking the Toll of Fine Particulate Pollution in South Africa,” June 3, 2025, Centre for Research on Energy and Clean Air, https://energyandcleanair.org/publication/unmasking-the-toll-of-fine-particle-pollution-in-south-africa/.
44    Thurber and Moss, “12 Reasons Why Gas Should Be Part of Africa’s Clean Energy Future.”
46    World Bank, “Heads of State Commit to Concrete Plans to Transform Africa’s Energy Sector, with Strong Backing from Global Partners,” press release, January 28, 2025, https://www.worldbank.org/en/news/press-release/2025/01/28/heads-of-state-commit-to-concrete-plans-to-transform-africa-s-energy-sector-with-strong-backing-from-global-partners.
47    Yacob Mulugetta et al., “Africa Needs Context-Relevant Evidence to Shape Its Clean Energy Future,” Nature Energy 7 (October 2022): 1015-22, https://www.nature.com/articles/s41560-022-01152-0.
48    Ibid.
49    Ibid.
50    International Trade Administration, “Ethiopia Energy Sector Opportunities,” July 5, 2024, https://www.trade.gov/market-intelligence/ethiopia-energy-sector-opportunities-0.
51    GET.transform, “Mozambique Country Window: Energy System Transformation Outlook,” August 14, 2025, https://www.get-transform.eu/wp-content/uploads/2024/08/GET.transfrom-Mozambique-ESTO-Aug-2024.pdf.
52    International Energy Agency, “Energy System of South Africa,” IEA, last accessed June 30, 2025, https://www.iea.org/countries/south-africa.
53    International Energy Agency, “How Much CO2 Does South Africa Emit?,” last accessed June 30, 2025, https://www.iea.org/countries/south-africa/emissions.
54    International Institute for Sustainable Development, “Investing in Gas-Fired Power Would Likely Be a ‘Costly Mistake’ for South Africa,” press release, March 31, 2021, https://www.iisd.org/articles/press-release/investing-gas-fired-power-would-likely-be-costly-mistake-south-africa.
55    Wilhelm Karanitsch, “South Africa: Enlight the Rainbow Nation,” Andritz, https://www.andritz.com/hydro-en/hydronews/hydropower-africa/southafrica.
56    “Investing in Gas-Fired Power Would Likely Be a ‘Costly Mistake’ for South Africa.”
57    Wendell Roelf, “Africa Energy Sees First Output from South Africa’s Largest Gas Field by 2033,” Reuters, June 10, 2025, https://www.reuters.com/business/energy/africa-energy-sees-first-output-south-africas-largest-gas-field-by-2033-2025-06-10/.
58    International Energy Agency, “Kenya’s Energy Sector Is Making Strides toward Universal Electricity Access, Clean Cooking Solutions and Renewable Energy Development,” April 14, 2025, https://www.iea.org/news/kenya-s-energy-sector-is-making-strides-toward-universal-electricity-access-clean-cooking-solutions-and-renewable-energy-development.
59    Carlo Cariaga, “ThinkGeoEnergy’s Top 10 Geothermal countries 2023,” ThinkGeoEnergy, January 8, 2024, https://www.thinkgeoenergy.com/thinkgeoenergys-top-10-geothermal-countries-2023-power-generation-capacity/.
60    Vincent Rouget, “Africa Risks Missing Out on the Global Scramble for Gas,” Control Risks, August 20, 2024, https://www.controlrisks.com/our-thinking/insights/africa-risks-missing-out-on-the-global-scramble-for-gas.
61    International Gas Union, “Global Gas Report 2024 Edition,” August 27, 2024, https://www.igu.org/igu-reports/global-gas-report-2024-edition.
62    Argus, “Africa Pushes Domestic Gas Role in Transition,” October 25, 2024, https://www.argusmedia.com/en/news-and-insights/latest-market-news/2622205-africa-pushes-domestic-gas-role-in-transition.
63    Ibid.
64    Ron Bousso, America Hernandez, and Wendell Roelf, “Gas May Dash Big Oil’s Namibian Dreams,” Reuters, November 7, 2024, https://www.reuters.com/business/energy/gas-may-dash-big-oils-namibian-dreams-2024-11-07/.
65    International Energy Agency, “Financing Clean Energy in Africa,” September 2023, https://www.iea.org/reports/financing-clean-energy-in-africa.
66    Wood Mackenzie, email message to author, June 24, 2025.
67    Philipp Trotter, email message to author, July 7, 2025.
68    U.S. Energy Information Administration, “Egypt,” August 13, 2024, https://www.eia.gov/international/analysis/country/egy.
69    Siemens, “Completion of World’s Largest Combined Cycle Power Plants in Record Time,” press release, July 24, 2018, https://press.siemens.com/global/en/pressrelease/completion-worlds-largest-combined-cycle-power-plants-record-time.
70    “The Egypt Megaproject.”
71    Ecofin Agency, “Total Plans to Restart Mozambique LNG Project by August 2025,” May 21, 2025, https://www.ecofinagency.com/news-industry/2105-46925-totalenergies-plans-to-restart-mozambique-lng-project-by-august-2025.
72    Wood Mackenzie, email message to author, June 24, 2025.
73    Nidhi Verma and Shariq Khan, “Tanzania Hopes to Conclude Talks for LNG Project by June,” Reuters, February 11, 2025, https://www.reuters.com/business/energy/tanzania-hopes-conclude-talks-lng-project-by-june-2025-02-11/.
74    J.P. Morgan, “What Is Liquefied Natural Gas, and Why Is It So Important?,” February 20, 2025, https://www.jpmorgan.com/insights/global-research/commodities/liquefied-natural-gas.
75    Mostefa Ouki, email message to author, June 30, 2025.
76    Syed Fazi-e-Haider, “Turkmenistan Resumes Work on TAPI Pipeline Despite Geopolitical Hurdles,” Eurasia Daily Monitor, September 19, 2025, https://jamestown.org/program/turkmenistan-resumes-work-on-tapi-pipeline-despite-geopolitical-hurdles/.
77    Penspen, “Penspen to Deliver Feasibility Study Revalidation for Trans-Saharan Gas Pipeline Project,” March 25, 2025, https://www.penspen.com/news/penspen-trans-saharan-gas-pipeline-project-feasibility/.
78    Sara Zouiten, “Nigeria-Morocco Gas Pipeline: Feasibility Study, Route Finalized,” Morocco World News, May 13, 2025, https://www.moroccoworldnews.com/2025/05/199893/nigeria-morocco-gas-pipeline-feasibility-study-route-finalized/.
79    Marc Howard, “Is a Tanzania LNG Breakthrough Near?,” African Energy, November 14, 2024, https://www.africa-energy.com/news-centre/article/tanzania-lng-breakthrough-near.
80    Simon Nicolas, “List of Reasons Not to Finance TotalEnergies’ Mozambique LNG Project Grow,” Institute for Energy Economics and Financial Analysis, February 12, 2025, https://ieefa.org/resources/list-reasons-not-finance-totalenergies-mozambique-lng-project-grows.
81    Oil & Gas Laws and Regulations Nigeria 2025,” International Comparative Legal Guides, February 21, 2025, https://iclg.com/practice-areas/oil-and-gas-laws-and-regulations/nigeria.
82    Ellen Wald, “As Middle East Tensions Simmer, the World Fixates on the Wrong Energy Market Risks,” Atlantic Council, September 17, 2024, https://www.atlanticcouncil.org/blogs/energysource/as-middle-east-tensions-simmer-the-world-fixates-on-the-wrong-energy-market-risks.
83    Vivian Chime, “Why Rich Countries Are ‘Reluctant’ on Additional JETP Coal-to-Clean Deals,” Climate Home News, December 6, 2024, https://www.climatechangenews.com/2024/12/06/why-developed-countries-are-reluctant-on-additional-jetp-coal-to-clean-deals/.
84    British International Investment, “BII Affirms Support of Mission 300 to Increase Energy Access in Africa,” January 31, 2025, https://www.bii.co.uk/en/news-insight/news/bii-reaffirms-support-of-mission-300-to-increase-energy-access-in-africa/.
85    British International Investment, “Announcing Our New Fossil Fuel Policy and Guidance on Natural Gas Power Plants,” December 12, 2020, https://www.bii.co.uk/en/news-insight/news/announcing-our-new-fossil-fuel-policy-and-guidance-on-natural-gas-power-plants/.
86    Eliza Zaleska, “EU Development Programs in Africa, Key to Reducing Irregular Migration?,” The Diplomat in Spain, March 20, 2025, https://thediplomatinspain.com/en/2025/03/20/eu-development-programs-in-africa-key-to-reducing-irregular-migration.
87    Daniel Onyango, “UAE Joins Funding for $25 Billion Nigeria-Morocco Gas Pipeline,” Pipeline Technology Journal, May 7, 2025, https://www.pipeline-journal.net/news/uae-joins-funding-25-billion-nigeria-morocco-gas-pipeline.
88    Reclaim Finance, “Breaking Bonds: The Norwegian Sovereign Wealth Fund’s Stake in Oil and Gas Debt,” February 6, 2025, https://reclaimfinance.org/site/en/2025/02/06/breaking-bonds-the-norwegian-sovereign-wealth-funds-stake-in-oil-and-gas-debt.
89    Anita Margrethe Halvorssen, “How the Norwegian SWF Balances Ethics, ESG Risks, and Returns,” Oxford Academic, May 2023, https://academic.oup.com/book/46709/chapter/410253097.
90    Export-Import Bank of the United States, “EXIM Board of Directors Votes to Proceed with $4.7 Billion LNG Equipment and Services Transaction After Four-Year Delay,” press release, March 19, 2025, https://www.exim.gov/news/exim-board-directors-votes-proceed-47-billion-lng-equipment-and-services-transaction-after.
91    Gracelin Baskaran, “Building Critical Minerals Cooperation Between the United States and Democratic Republic of the Congo,” Center for Strategic & International Studies, March 25, 2025, https://www.csis.org/analysis/building-critical-minerals-cooperation-between-united-states-and-democratic-republic-congo.
92    Philipp Trotter, email message to author, July 7, 2025.
93    Ibid.
94    UNEP Copenhagen Climate Centre, “Emissions Gap Report 2024,” https://unepccc.org/emissions-gap-reports/.

The post Natural gas has a small but important role in Africa’s energy transition appeared first on Atlantic Council.

]]>
The critical minerals boom is an opportunity to integrate public health into mining operations https://www.atlanticcouncil.org/in-depth-research-reports/report/the-critical-minerals-boom-is-an-opportunity-to-integrate-public-health-into-mining-operations/ Tue, 23 Sep 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=874808 Africa is central to the global push for cleaner energy, including the continent's stocks of critical minerals that power green-energy technologies. But a race to extract more minerals poses public health risks, from the occupational hazards miners suffer to new disease outbreaks in mining camps. There’s a better course for investors and African governments.

The post The critical minerals boom is an opportunity to integrate public health into mining operations appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Surging global interest in critical minerals presents a rare opportunity to fully embed public health protections into mining operations.
  • Mining companies that invest in disease surveillance, health infrastructure, and pandemic preparedness protect their bottom line and their social license to operate.
  • Development corridors like the Lobito Corridor can serve as testing grounds for cross-border health cooperation and integrated approaches to mining regulation.

As the global critical minerals race heats up, resource-rich African countries once again face a double-edged opportunity to harness a wave of investment and economic opportunity in the mining sector, while avoiding resource-curse pitfalls and advancing public health.

Global demand is booming for cobalt, copper, lithium, and other minerals important for the transition away from fossil fuels, and as a result, Africa is central to the global push for cleaner energy and supply chain diversification. But realizing the full potential of this moment requires more than just mineral extraction: It requires intentional and creative solutions that elevate public health as a strategic priority for investors, mining companies, and African governments.

From occupational hazards to infectious disease outbreaks, the African mining sector has a checkered public health legacy. But in this new report, Rebecca Katz, director of Georgetown University’s Center for Global Health Science and Security, shows that the current moment is a chance to change that. The wave of geopolitical attention and capital investment presents opportunities to strengthen health systems, surveillance, and regional cooperation across the continent. Realizing these benefits will require deliberate action and to ensure such projects deliver on their full promise, public health should be prioritized as a core consideration, not a peripheral concern.

The global race to secure critical mineral supply chains has drawn strategic attention and amid this shifting geopolitical landscape, public health represents one potential avenue through which new entrants might differentiate themselves from incumbents.

In addition to providing recommendations for key stakeholders, this report explores the intersection of mining and public health in Africa, spotlighting the Lobito Corridor and other prominent mining-driven development corridors and their implications for public health.

Related content

Explore the program

The Africa Center works to promote dynamic geopolitical partnerships with African states and to redirect US and European policy priorities toward strengthening security and bolstering economic growth and prosperity on the continent.

The post The critical minerals boom is an opportunity to integrate public health into mining operations appeared first on Atlantic Council.

]]>
A three-pillar strategy for institutional reform in Central and Eastern Europe https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/a-three-pillar-strategy-for-us-democracy-assistance-in-central-and-eastern-europe/ Mon, 22 Sep 2025 16:26:43 +0000 https://www.atlanticcouncil.org/?p=868911 This paper is the first in the Freedom and Prosperity Center's "Future of Democracy Assistance" series, which analyzes the many complex challenges to democracy around the world and highlights actionable policies that promote democratic governance.

The post A three-pillar strategy for institutional reform in Central and Eastern Europe appeared first on Atlantic Council.

]]>

Bottom lines up front

  • US democracy assistance in Europe must be revitalized and adapted to region-specific challenges, countering external interference from Russia and China while strengthening civic engagement and public trust.
  • Supporting independent legal institutions and the rule of law ensures accountability, prevents state capture, and protects democratic norms.
  • Protecting political processes—including free, fair, and competitive elections—reinforces pluralism, deters manipulation, and strengthens transatlantic security and stability.

This issue brief is part of the Freedom and Prosperity Center’s “The future of democracy assistance” series, which analyzes the many complex challenges to democracy around the world and highlights actionable policies that promote democratic governance.

Introduction: A region undergoing transformation

Since the third wave of democratization—the global surge of democratic transitions beginning in the mid-1970s—Europe has often been regarded as a leader in liberal democracy. In its 2024 Democracy Index, the Economist Intelligence Unit ranks Western Europe as the highest-scoring region worldwide, with a regional average of 8.38—making it the only territory to record a net improvement in democratic performance during the latest cycle. However, this snapshot only captures part of Europe’s democratic environment and can be misleading, given the complex challenges confronting other European subregions.

Over the past fifteen years, Europe has faced a “polycrisis”—including the eurozone crisis, the migration crisis, climate change, the COVID-19 pandemic, and the Russia-Ukraine war—all of which have strained democratic institutions and weakened public cohesion.

Europe faces two primary authoritarian adversaries: Russia, which employs election interference, military aggression, and other forms of destabilization, and China, which wields influence through commercial trade deals, loans, and strategic alliances. Populism, polarization, and the erosion of public consensus on defending Ukraine further undermine democratic safeguards against authoritarian trends in Central and Eastern Europe. Election manipulation, economic coercion, and disinformation campaigns intensify this democratic backsliding. Without increased US support, the integrity of elections and the peaceful transfer of power are at risk, threatening the security and sovereignty of NATO and the European Union (EU).

The need for a revitalized, regionalized US
democracy assistance approach

Given these threats, US democracy assistance remains essential for Western security—but it must evolve. It should reflect regional dynamics and address both internal and external pressures, while also going beyond military force to build pathways for multilateral donors, private sector actors, and civil society networks to complement efforts when the United States can only provide limited support. The role of non-governmental organizations (NGOs), European Union institutions, transatlantic alliances, and independent media donors will be vital in safeguarding electoral integrity and civil society protections in countries where US influence is limited.

In Eastern Europe, this means combining military aid with soft-power tools, such as electoral assistance, rule of law measures, and civic education support. In Central Europe, these same priorities are crucial for ensuring free and fair elections, safeguarding political competition, and protecting voters.

A revitalized, context-specific plan for democracy assistance is necessary to protect US interests and reinforce European democratic security. Such a plan must prioritize three pillars: people, the rule of law, and political processes. These pillars encompass key objectives such as judicial independence, protection of civil society and journalists, election integrity, and other critical mechanisms for democratic growth.

Supporting democratic development abroad strengthens US security, prosperity, and influence, while also bolstering market diversification, NATO stability, and the United States’ status as a global power. To undervalue this soft-power tool is to risk long-term political instability, violence, and economic disparity for both the United States and its European allies.

The fight for democracy and sovereignty in Ukraine, Moldova, and Georgia

Eastern Europe remains a primary focus of Russia’s military aggression. Moscow’s 2022 invasion of Ukraine has strained regional resources, distorted democratic processes, and deepened divisions between pro-European and pro-Kremlin leaders. Amidst its violent imperialist policies, Moldova, Georgia, and Ukraine applied for EU candidacy in early 2022; the EU granted Moldova and Ukraine candidate status that June—but deferred Georgia’s status transition until December 2023—pending democracy-focused reforms.

Ukraine

Ukraine’s military successes against Russia illustrate the connection between democracy and sovereignty. Western donors have provided resources to improve Ukraine’s anti-corruption efforts, judicial reforms, municipal support, and public transparency. This assistance has enabled Ukraine to significantly bolster its countermeasures against Russian hybrid tactics, including disinformation campaigns, cyberattacks, and direct military action.

Ukraine was granted EU candidate status in June 2022 and has continued implementing policies for future integration with the support of the €50 billion Ukraine Facility (2024-2027). While a presidential election remains contingent upon a negotiated settlement of the war, the nation’s ongoing transparency and anti-corruption policies are sustained by both leadership and public support, enabling consensus for sovereignty and democracy.

Ukraine’s alignment with Europe is also reflected in public opinion. As of 2025, 54 percent of European citizens polled support providing arms to Ukraine. Europeans generally continue to favor increased military assistance. However, public support for Ukraine has declined because of war fatigue, inconsistent US policy, disinformation, and nationalist positions on foreign aid and migration. It is therefore in the United States’ interest to provide consistent support for Ukraine while also encouraging increased European contributions. Doing so will help ensure that Ukraine’s sovereignty and democratic institutions are sustained while reducing Europe’s dependence on US support and strengthening prospects for long-term assistance.

Moldova

Moldova remains one of Russia’s top destabilization targets, vulnerable to both military escalation and hybrid threats. Democratic backsliding is largely driven by economic insecurity and weakened institutional trust. According to a recent Eurobarometer poll, 46 percent of Moldovans identify inflation and the cost of living as their top concern, and 63 percent say they do not trust the national government. Such vulnerabilities are routinely exploited by Russia through disinformation and vote manipulation.

Moldova’s 2024 presidential election highlighted the intersection of Russian influence and domestic corruption. Moldovan authorities allege that approximately $39 million was transferred from Russia by fugitive oligarch Ilan Shor into thousands of local accounts to fund vote-buying, disinformation campaigns, and bribery of public officials. Despite these efforts, the election showed meaningful progress; election monitoring by the International Republican Institute (IRI) reported voter turnout reaching 1.7 million–a 10 percent increase from 2020. This trend coincided with improvements in voter mobilization, transparency, and polling oversight, demonstrating the potential for success through the collaboration of US democracy assistance, national governments, and civil society.

Moldova’s EU-oriented government has been instrumental in advancing its sovereignty and development as an EU candidate. However, with the fall 2025 parliamentary elections approaching, Russia is escalating efforts to empower oligarchic forces and polarize voters using economic pressures and disinformation campaigns. This situation requires sustained US democracy assistance—particularly in voter education, anti-corruption monitoring, and political party development.

Georgia

Georgia’s EU candidacy was delayed due to signs of democratic regression; the Georgian Dream party has since escalated these trends by moving closer to Moscow—weaponizing the Kremlin’s influence through energy dependence and economic ties as well as by using domestic tools for elite capture and political repression. Russia currently occupies 25 percent of Georgian territory, and its hybrid interference tactics increasingly undermine Georgia’s sovereignty and European Union integration.

The 2024 elections reflected this shift, marked by voter intimidation, regulatory flaws, and a misuse of state resources that disadvantaged opposition parties. These systemic flaws reinforce state capture and erode trust in democratic institutions. Recent IRI polling found that 54 percent of Georgians believe the country is on the wrong track, alongside a steady decline in the public’s belief that ordinary citizens can influence political decisions. 

While public disillusionment with the political system is growing, strong support for EU integration persists: approximately two-thirds of Georgians continue to support EU membership, even at the cost of cutting trade ties with Russia. However, this pro-democracy sentiment is increasingly at odds with the government’s efforts to restrict foreign-backed civic engagement. In May 2024, the Georgian Dream party passed a Kremlin-inspired “foreign agents” law, targeting NGOs and media outlets that receive foreign funding. The law labels these groups as entities that serve foreign interests, effectively criminalizing civil-society activity and directly undermining US and EU democracy assistance efforts.

This deliberate restriction of civic space underscores the urgent need for sustained US engagement. To remain effective, democracy assistance must adapt by emphasizing election monitoring, targeted civil society protection, and diplomatic pressure to revoke authoritarian legislation. Applying pressure on Georgia’s institutions while empowering civil society groups is not only an opportunity to support a willing, pro-Western society, but also essential to securing Europe’s eastern frontier.

Competing values and the question of European unity—Romania, Hungary, Slovakia, and Poland

Central Europe is increasingly vulnerable to democratic erosion, driven by both internal fragmentation and escalating Russian interference. The Kremlin has refined its soft-power strategies, targeting the region’s political institutions, public trust, and national cohesion through disinformation and narrative manipulation.

Poland

Poland’s democratic growth showcases the balance between security and democracy. While it is a member of the EU and NATO, along with a firm supporter of Ukrainian sovereignty, it has struggled to maintain protection for its independent media, electoral processes, and judiciary. The re-election of the Law and Justice Party (PiS), a right-wing nationalist party, marked a further prioritization of military spending and conservative migration policies. In the 2025 Eurobarometer polls, only 7 percent of participants stated that they considered threats to democracy as a priority for Poland, while 36 percent said rising prices, inflation, and the cost of living should be a top priority, and 26 percent cited security and defense as a top priority.

In the 2025 presidential election, Russia deployed “Operation Doppelgänger,” which involved more than ten thousand coordinated social media bot accounts designed to heighten fears regarding migration and security. Furthermore, Russian-influenced media outlets prioritized pro-Russian sentiment, such as that the war represented President Vladimir Putin’s ability to lead and serve as a strong politician. While this interference did not impact Poland’s election as drastically as Moldova or Georgia, Poland’s unity is vital for EU stability. A Eurosceptic Poland is a case that must be monitored and prioritized in democracy assistance efforts, especially amidst falling trust in its national government and a lack of investment in democracy programs.

Hungary

Hungary has disrupted EU decision-making throughout the Russia-Ukraine war. Hungarian Prime Minister Viktor Orbán—in power since 2010 and known for his nationalist and Kremlin-friendly policies—has institutionalized democratic backsliding, turning Hungary into the EU’s most overtly pro-Russian member state. His administration continues to suppress judicial independence, weaken checks on executive power, and suppress civil society. Orbán has fostered close ties with the Kremlin, echoing Russian anti-liberal narratives and openly challenging EU consensus on sanctions and Ukraine’s aid. Hungary now serves as a platform for Moscow’s ideological influence, undermining the EU’s decision-making process from within.

While Hungary’s government isolates itself from the EU, citizens continue to support EU alignment. In the most recent Eurobarometer polls, 69 percent of participants expressed attachment to the EU, and 81 percent expressed attachment to Europe. These pro-European sentiments are further reflected in public views towards Ukraine: 73 percent agree with the EU’s decision to welcome refugees and asylum seekers displaced by the Russia-Ukraine war, and 63 percent support humanitarian and financial assistance to Ukraine.

While democratic growth is extremely limited due to policies against NGOs and civil society rights, it is necessary to maintain education and political party empowerment to counteract anti-Europe narratives, which indirectly taint information in Poland, Slovakia, Georgia, and other vulnerable democracies. Recent European Parliament elections resulted in Fidesz, Orbán’s ruling party, recording its worst performance to date, marked by a shift towards the centrist and pro-European opposition movement Tisza. US democracy assistance must prioritize political parties such as Tisza and related mobilization efforts to prepare for the 2026 Hungarian National Parliament elections, which will both determine Hungary’s future role in the EU and its alignment with Russia.

Romania

Romania has experienced heightened Russian pressures due to instability from the COVID-19 pandemic and the Russia-Ukraine war. Both have weakened public opinion and eroded trust in government institutions and independent media. Since 2023, Russian information campaigns have targeted economic insecurity—which 40 percent of survey participants identified as Romania’s top policy issue—and leveraged the country’s anti-colonialist history to portray the West as a colonizer. As early as 2023, these narratives entered presidential campaigns and were amplified by Hungary and Poland. Furthermore, such messaging has encouraged the idea of a potential territorial acquisition in Ukraine if it were defeated. Similar external propaganda efforts are underway in Hungary and Poland.

Russian-backed cyber campaigns interfered in the 2024 elections, amplifying support for pro-Russian candidate Călin Georgescu. Sophisticated disinformation tactics polarized the electorate and eroded public confidence in democratic institutions. Romania’s earlier delay to sanction Russia and support Ukraine weakened regional solidarity. However, the recent election of centrist reformer Nicușor Dan signals an enduring commitment among Romanian voters to EU values and Western alignment that must be supported by the US and its European allies.

Slovakia

Slovakia, also a member of the EU, has historically maintained steady democratic growth. Recently, however, it has ceded to Russia’s influence under Prime Minister Robert Fico. Re-elected on a populist, anti-Ukraine platform, Fico has aligned with Hungarian Prime Minister Viktor Orbán in rejecting EU foreign-policy coordination. His government has weakened independent institutions, pressured journalists, and used state mechanisms to consolidate power. Fico’s alignment with Moscow’s authoritarian practices—including efforts to diminish judicial independence and press freedom—undermines both EU governance standards and NATO’s strategic posture on its eastern frontier.

While Slovakia’s citizens remain united in their support of the EU and continued security support cooperation against Russia, internal democratic backsliding makes meaningful action increasingly difficult. In Eurobarometer surveys, 65 percent of Slovak participants expressed distrust in the national government. Furthermore, although rising prices, inflation, and the cost of living remain the top domestic concerns—as seen amongst other nations in the region—Slovaks show a stronger desire for peace and stability than for greater economic opportunities.

Slovakia is extremely vulnerable to external influence and Russian interference. As polls show, citizens feel that the nation’s security and the continued stability of the EU are in jeopardy. Prioritizing public empowerment for future elections and maintaining the separation of powers will be critical to prevent further democratic decay.

The cases of Eastern and Central Europe highlight the evolving and region-specific threats to democracy across EU and non-EU nations. From external manipulation to internal erosion, each country faces unique challenges shaped by historical legacies, political elites, public sentiment, and geopolitical positioning. However, a common trend persists: democratic backsliding is not only a domestic governance issue but also a regional security concern that directly impacts the EU and NATO. To address these multidimensional threats, US democracy assistance must evolve into a proactive, structured approach that stabilizes democratic institutions before global crises escalate. The following three-pillar strategy—centered on people, the rule of law, and political processes—provides a long-term framework for sustained political engagement and targeted government reform.

A revitalized approach to democracy assistance

US democracy assistance should embrace three pillars: people, the rule of law, and political processes. These pillars can be broken down into thematic priorities—anti-corruption measures, protection of independent media, and strengthening institutional integrity—all of which increase national capacity for democratic reform and resilience.

Fostering people-centered strategies

Democracy can only be sustained with an informed, engaged, and mobilized citizenry. In the face of Moscow’s interference—which exploits economic instability and global propaganda networks—incorporating people-focused objectives is vital to strengthening the EU, NATO, and Europe as a whole.

Application examples

In Georgia, this strategy would involve expanding legal protections and resources for civil society organizations. Such measures would counteract increasingly repressive policies, including the foreign agents law, and reinforce governance accountability mechanisms. Expanded trade cooperation between the US and Georgia may further leverage diplomatic relations to incentivize greater Western alignment and reduce Russian influence and Chinese economic expansion

Moldova’s economic struggles present opportunities for deeper collaboration between civil society and democratic institutions. US democracy assistance should support citizen mobilization through civic training initiatives, structured government dialogue, and job creation programs, while also enhancing election monitoring, mobilization efforts, and public trust. Prioritizing civic education in low-income areas will help reduce susceptibility to economic coercion in future elections.

In Hungary and Slovakia, the current political climate demands continued support for opposition parties and grassroots media outlets to prepare for upcoming elections. Fidesz’s underwhelming performance in recent EU elections signals an opening for opposition gains, yet youth disengagement and state-controlled media capture under Orbán and Fico make preserving democratic processes increasingly challenging.

Educating and empowering citizens to participate in political processes and democratic initiatives not only strengthens civic engagement but also builds public trust in governance. However, these efforts can succeed only if legal systems remain independent and impartial, ensuring that civic efforts are protected amidst political dysfunctions. Accordingly, US assistance must focus on bolstering the rule of law to institutionalize democratic norms and ensure accountability.

Supporting the rule of law

Legal institutions are often the first to be dismantled in times of democratic backsliding or conflict. To prevent state capture and the enactment of illiberal laws, the United States must support transparent and independent judicial systems.

Application examples

Ukraine has prioritized government accountability and anti-corruption measures throughout the war. As the United States provides a large amount of Ukraine’s defense assistance, it may be more feasible to further leverage EU financial contributions to expand legal counsel training, strengthen judicial independence, and enhance judicial-vetting programs. Collaboration in this pillar could pair EU funding with US expertise, drawing on resources of the American Bar Association and other professional legal organizations.

Slovakia, Romania, and Moldova are experiencing heightened political vulnerability within their party systems, underscoring the need for judicial independence to safeguard the separation of powers. Comparable to reforms in Ukraine, this would involve legal training for reform-minded judges, prosecutors, and opposition lawmakers. In Moldova and Romania, strengthening the rule of law is essential to prevent oligarchic re-entrenchment in future election results and executive transitions. In Slovakia, such initiatives would counter expanded executive control and complement civil society efforts to monitor corruption and advocate for judicial independence.

Bolstering the rule of law ensures that election outcomes reflect the will of the people and uphold democratic integrity. However, to sustain electoral contestation and fairness, the United States must also invest in protecting democratic processes.

Safeguarding political processes

Democratic political processes involve free, fair, and competitive elections, supported by robust pluralism. To support future electoral integrity, the risks of manipulation and vote-rigging must be minimized through increased monitoring, civic mobilization, and independent media engagement.

Application examples

The upcoming parliamentary elections in Moldova and local elections in Georgia will be decisive for democratic consolidation in Eastern Europe. The IRI’s work in Moldova—from national polling and electoral monitoring to voter support—was successful in counteracting Russia’s vote-buying campaigns. Continued investment in coalition building, electoral risk assessment, and fieldwork in both countries will ensure that the people’s voices are truly heard and accurately represented in their political systems. Moldova’s upcoming parliamentary elections will be especially vulnerable to interference from Moscow-backed actors seeking to restore control through their previous oligarchic networks.

Romania and Poland require similar assistance to maintain electoral integrity. To maintain pro-European and pro-EU majorities, the United States should expand resources for local, independent media organizations to counter Russian disinformation operations—such as Operation Doppelgänger—and to raise public awareness of foreign propaganda tactics.

Strategic implications for the United States

A majority of countries in Eastern and Central Europe will hold national elections within the next two years. US democracy assistance must play an active role in supporting electoral integrity through monitoring, mobilization, and civic education. These efforts should be expansive and inclusive, with particular attention to diaspora communities and rural populations who are more vulnerable to disinformation and disenfranchisement. Without free and fair elections—followed by peaceful, democratic transfers of power—states will remain vulnerable to democratic backsliding, Russian influence, and anti-European and anti-Western narratives

A three-pillar strategy—centered on people, the rule of law, and political processes—provides a pragmatic and effective framework for revitalizing US democracy assistance across Eastern and Central Europe. By investing in democratic resilience, the United States strengthens civic institutions, accountable governance, and electoral credibility, while reinforcing its global leadership at a time of intensifying authoritarian threats. These efforts directly serve US strategic interests by bolstering transatlantic security, expanding economic partnerships, and countering both Russian aggression and China’s growing influence. The EU remains central to the West’s collective security, and sustained US engagement is essential to preserve the global democratic order and shape the future of international cooperation.

about the authors

Stephen Nix is the senior director for Europe and Eurasia at the International Republican Institute.

Megan Tamisiea is a researcher with an M.A. in Democracy and Governance from Georgetown University.

Related content

The future of democracy assistance

This paper series provides an in-depth look at the many complex challenges to democracy around the world and highlights actionable policies that promote democratic governance.

Trackers and Data Visualizations

Jun 15, 2023

Freedom and Prosperity Indexes

The indexes rank 164 countries around the world according to their levels of freedom and prosperity. Use our site to explore twenty-eight years of data, compare countries and regions, and examine the sub-indexes and indicators that comprise our indexes.

Explore the program

The Freedom and Prosperity Center aims to increase the prosperity of the poor and marginalized in developing countries and to explore the nature of the relationship between freedom and prosperity in both developing and developed nations.

The post A three-pillar strategy for institutional reform in Central and Eastern Europe appeared first on Atlantic Council.

]]>
Expanding Syria’s multilateral development bank engagement https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/expanding-syrias-multilateral-development-bank-engagement/ Mon, 22 Sep 2025 14:30:00 +0000 https://www.atlanticcouncil.org/?p=875151 Estimates of Syria’s post-civil war cost of rebuilding range from $250 billion to $400 billion. To help finance reconstruction and development, Syria’s transitional government should expand its partnerships with international financial institutions (IFIs) and multilateral development banks (MDBs), as these institutions can play a key role in mobilizing global capital.

The post Expanding Syria’s multilateral development bank engagement appeared first on Atlantic Council.

]]>
Summary

Estimates of Syria’s post-civil war cost of rebuilding range from $250 billion to $400 billion. This sum is beyond what Syria’s internal resources can generate and will require mobilization of significant outside public and private investment. Syria must articulate a realistic but ambitious national strategy for economic reconstruction and development, and it must align donor and investor projects with that strategy. To help finance reconstruction and development, Syria’s transitional government should expand its partnerships with international financial institutions (IFIs) and multilateral development banks (MDBs), as these institutions can play a key role in mobilizing global capital. The presence of MDBs alone will not be determinative of the success of Syria’s development strategy; other factors such as internal political stability and external economic relations are more important. However, MDB operations in Syria can be a development force multiplier, increasing investment and expanding the technical capacity of both the public and private sectors. MDBs have a greater capacity for investment in high-risk countries, such as Syria as it emerges from civil war. Their presence as public institutions can help mitigate unobservable and unquantifiable risks (such as political risks) for other private-sector participants. Equally important, MDBs provide technical assistance to both the public and private sectors through funding of education, training, technology transfer, and broadening of external partnerships.

Syria currently has memberships with five IFIs and MDBs, including two global and three regional institutions: the World Bank Group, the International Monetary Fund (IMF), the Arab Monetary Fund (AMF), the Arab Fund for Economic and Social Development (AFESD), and the Islamic Development Bank (IDB). The European Investment Bank (EIB), the investment arm of the European Union (EU), was previously active in Syria and has recently indicated its intention to resume operations there in line with EU policy.

Syria is eligible to join three more MDB institutions: the European Bank for Reconstruction and Development (EBRD), the Asian Infrastructure Investment Bank (AIIB), and the New Development Bank (NDB). The transitional government of Syria (TGS) should immediately seek membership in the EBRD and the AIIB. Membership in the NDB is aligned to the expansion of the BRICS (Brazil, Russia, India, China, and South Africa) bloc of nations. Syria is not a member of the BRICS bloc and is unlikely to join in the foreseeable future.

Economic strategy

The TGS is trying to organize the physical reconstruction of the country while rebuilding state institutions that provide essential public services. Syria is emerging from six decades of dictatorship by the Assad family and a horrific fourteen-year civil war (2011–2024) that killed more than six hundred thousand Syrians and displaced about 13 million, more than half of the total population. Syria’s economy shrank by an estimated 85 percent from its pre-civil war levels, and the estimated cost of rebuilding ranges from $250 billion to $400 billion. Syria must build a dynamic, competitive economy to lift Syrians out of poverty. This will require significant investment, beyond what can be generated from internal resources.

The development of Syria’s economic strategy is the responsibility of the TGS and is beyond the scope of this analysis. However, some strategic issues need to be reviewed as we outline the role of MDBs in Syria’s reconstruction and development. Syria’s regional integration, particularly with the Gulf Cooperation Council (GCC) countries and Turkey, is just as important as Syria’s global integration. Syria has considerable economic potential, which differs from other countries in the region. It has an educated population, and its wage levels and exchange rates have not been artificially inflated by oil income (the so-called “Dutch disease”) because Syria is not an oil-exporting nation. Syria has significant potential to develop its agriculture and industrial base. Its ports on the Mediterranean are underdeveloped but well positioned to serve Syria’s development and, potentially, to integrate Syria economically with Iraq and the GCC countries.

Geography

Syria is located at the western terminus of Asia and is a central part of the land bridge between Europe, Asia, and Africa. Syria’s location has made it a target of external actors, notably Israel and Iran, seeking to dominate the country for their own destructive interests.

Most of Syria’s population and previous development are concentrated in the western corridor, north to south from the Turkish border to the Jordanian border through the cities of Aleppo, Hama, Homs, and Damascus. However, the development of Syria’s east-west corridors, from the Mediterranean coast through the cities of Aleppo, Raqqa, Hasaka, and Deir Ez-Zour, and onward to the Iraqi border, is of equal importance and represents an important economic opportunity. Syria’s Mediterranean ports—Latakia, Tartus, and Baniyas—can be further developed to service Syria’s needs, and Iraq’s as well. Syria’s best agricultural lands, and the majority of its water and oil resources, lay along this east-west corridor. Aleppo is the home of Syria’s textile industry and the northern plains stretching east of the city are the heart of its cotton production. The region accounts for a significant share of Syria’s production of agricultural output (wheat, pulses, olives, and livestock). The development of the east-west corridor regions is critical to Syria’s internal political reintegration and would complement regional economic projects such as Turkey’s links to Central Asia via the Caucasus and Iraq’s Development Road project linking Turkey to the Grand Faw Port project on the Arabian Gulf. Syria could be positioned as a western terminus for trade from and with other Asian countries, and Syrian exporters can certainly benefit from those transport links. MDBs can help Syria expand and modernize the transportation, energy, and technology infrastructure needed to take full advantage of its location.

Human capital

Syria has modest oil and gas resources and is currently a net importer of both. The TGS cannot rely upon oil export revenues to finance the country’s reconstruction and economic development. However, that means Syria does not suffer from the “natural resource curse” common in other regional economies that are reliant upon oil and gas exports. Oil and gas export revenues can lead to exchange rate appreciation—which, in turn, impairs the development of export-oriented manufacturing sectors.

Syria’s wealth is in its educated workforce. This is best reflected in its diaspora, which is globally successful in multiple industries across multiple continents and regions (the GCC, Europe, North America, South America, and West Africa). Syrians have long prized educational attainment, and the country has a large pool of skilled and semi-skilled labor that needs meaningful employment. Syria has been a net exporter of human capital for several generations, and this accelerated rapidly during the civil war as the country lost much of its middle class and intelligentsia. MDBs can play a useful role in addressing this by providing financing and technical assistance for the reconstruction and expansion of all levels of Syria’s educational infrastructure.

Building Syria as an economic hub

Foreign Minister Asaad al-Shaybani cited Singapore as an economic example for the new Syria at the Davos Summit in January 2025. This was an interesting choice because Singapore is an open economy that has developed into a regionally and globally significant trade, investment, and manufacturing hub. Syria has a favorable geographic location, spanning from the Mediterranean to Iraq and Jordan, and there are clear synergies Syria can achieve if it develops its transport and infrastructure links with its immediate neighbors. It has an educated population, with wages that are relatively low compared to those in the GCC or its immediate neighbors. The Syrian diaspora is globally successful and eager to invest, as are investors from the GCC. The country has agricultural and industrial potential that can be developed.

Other countries in the region, such as Jordan and Egypt, have similar—though not identical—resource endowments and similar levels of human capital development. However, for a variety of reasons beyond the scope of this analysis, they have not developed into globally competitive manufacturing or technology hubs. Because Syria must be rebuilt almost from the ground up after fourteen years of civil war and the overthrow of the Assad regime, there are fewer entrenched political and economic interests to block the country’s development. The Syrian people have a real opportunity to develop and implement the best available technologies, education, public administration practices, and infrastructure.

To exploit these advantages, Syria needs

  • infrastructure investment in its ports, transportation, and energy production;
  • reconstruction and expansion of its education system;
  • building of public-sector capacity to deliver essential services and ensure transparency and rule of law;
  • creation of a regulatory system that ensures competitive markets; and
  • building of Syrian firms that can compete in regional and international markets.

MDBs can play an important part in developing Syria by mobilizing investment capital and providing the technical assistance needed by both the public and private sectors.

The potential role of MDBs

MDBs can assist Syria’s reconstruction and economic development through direct investment and provision of technical assistance to enhance local administrative capacity.

Direct investment: Private financial institutions will be reluctant to invest in high-risk countries, such as Syria as it emerges from civil war. MDBs have greater capacity than private financial institutions to mitigate these types of unobservable and unmeasurable risks. MDBs have an in-country presence and an ongoing relationship with host country authorities, providing them with an information advantage when it comes to assessing and mitigating country political and financial risks. MDBs provide public budget support and policy reform advice, as well as supporting government and corporate capacity building. Their presence in a project can provide a political umbrella to deter adverse events because MDBs are in a better position to influence a host government’s potentially adverse decisions. The presence of an MDB helps to reassure private investors and encourage their participation in project financing.

Technical assistance: MDBs engage with local and national governmental authorities and provide key technical assistance that helps to enhance local administrative capacity. For example, the TGS faces an important political and national security challenge in the disarmament, demobilization, and reintegration (DDR) of fighters from the various armed groups that participated in the struggle against the Assad regime. MDBs, such as the World Bank, can play a useful role in advising and funding DDR programs. Another example would be the World Bank’s well-regarded technical assistance program (the Stolen Asset Recovery Initiative (StAR)), which works with partner countries that seek to recover stolen assets. This program could help the TGS recoup the billions stolen by the Assad family and Assad regime officials.

Diversification benefits

Syria will benefit from becoming a member country in more MDB institutions. Membership can insulate Syria from changes in resource availability or changes in political relationships with donor nations. The specific benefits include the following.

  • More sources of financing: Syria’s overall borrowing capacity is constrained by its debt-carrying capacity, which is presently quite limited. Nonetheless, it is still useful for the TGS to have access to a greater number of sources for funding and technical assistance.
  • Differing institutional expertise: Each MDB has its own areas of expertise that are unique to that institution. The EBRD has successful programs to help finance growth of small and medium enterprises (SMEs), private infrastructure, and municipal finance. The AIIB has executed successful projects in renewable energy, digital and information technology infrastructure, and transportation.

By becoming a member of more MDB institutions, the TGS can draw upon each of these institutional areas of expertise, as appropriate to Syria’s development needs.

Additional potential MDB partner institutions

EBRD

The EBRD was established in 1989 to address the transition needs of the nations of Central and Eastern Europe as they emerged from communist rule. Its headquarters are in London and, following the Arab Spring in 2010, it expanded its area of operations to encompass the countries of Western Asia and North Africa, supporting democratization and economic development in those regions. The EBRD is currently active in Turkey, Jordan, and Lebanon.

Accession to the EBRD as a member nation requires an affirmative vote by two-thirds of governors, representing at least three-quarters of members’ total voting power. The United States is the largest single shareholder, with 9.2 percent of shares, followed by the United Kingdom, France, Germany, and Japan, with 8.9 percent each.

The EBRD’s purpose, as reflected in its founding documents, is to support “multiparty democracy, pluralism and market economics.” EBRD operations focus on former Soviet bloc countries’ transition from a communist state-owned economic model toward market-based economics. That mission remains, even as the EBRD’s area of operations has expanded to include countries in Western Asia and North Africa that, like Syria, have a legacy of state ownership of key sectors of the economy. The EBRD’s mission differs from that of other development banks, such as the World Bank, in that it focuses less exclusively on poverty alleviation and more directly on economic transition and political governance.

Since its inception, the EBRD has invested more than €210 billion in more than 7,500 projects. It undertook 584 projects in 2024, investing €16.6 billion. EBRD investment in green economy projects accounted for 58 percent of the total financing provided in 2024.

The EBRD has a reputation for expertise in several areas directly relevant to Syria. It has programs for financing and advising SMEs, local financial institutions, agribusiness, sustainable energy, and municipal infrastructure. The TGS will need to reach out to ascertain the level of shareholder support for its membership. But Syria’s membership in the EBRD would dovetail with stated US, UK, and EU objectives of stabilizing Syria’s economy and promoting stable governance.

AIIB

The AIIB is the newest MDB, beginning operations from its headquarters in Beijing in 2016. Its mission is the financing of infrastructure on the Asian continent, with an emphasis on projects that are sustainable and technology enabled, and that promote regional connectivity. Sponsored by China (which holds the most shares), the AIIB has grown to 110 members. The United States and Japan have declined to seek membership, but many European nations have joined the institution. Several of Syria’s immediate neighbors (Iraq, Jordan, and Turkey) are already members of the AIIB, and Lebanon is a prospective member. Accession by new members must be approved by a special majority vote of the AIIB Board of Governors, which represents a majority of the institution’s voting power.

The AIIB emphasizes four thematic priorities, including

  • green infrastructure;
  • connectivity and regional cooperation;
  • technology-enabled infrastructure; and
  • private capital mobilization.

The AIIB financed 303 projects between 2016–2024, with a cumulative investment of $58.9 billion. The sector breakdown of the projects is summarized in the chart shown here.

The AIIB’s track record on infrastructure finance and its emphasis on regional connectivity are directly applicable to Syria. The AIIB’s priorities emphasize the importance of connectivity as a pathway to economic development. For example, the AIIB is co-financing $250-million expansion of rail links between eastern Turkey and the Caucasus. Regional economic powers in Western Asia (e.g., Turkey, Saudi Arabia, and Qatar) have proposed plans for the development of cross-border infrastructure and integration. Syria’s participation in these plans, through the development of its infrastructure, will in turn advance regional integration efforts. The AIIB can be a useful financing partner in these efforts.

Aligning assistance with development priorities

Since December 2024, there is considerable political and economic excitement about the potential of a stable, rapidly developing Syria. A large measure of this excitement was generated by the United States, which has pressed ahead with easing of sanctions to give Syria a chance to emerge from the catastrophic Assad era. European countries have similarly eased sanctions, and most regional powers—with the notable exceptions of Israel and Iran—have moved quickly to shore up Syria politically and economically. A rush of donors and investors have announced new projects and publicized the signing of investment memoranda. However, there is a risk that these initial projects will conflict with, or potentially undermine, progress on less glamorous but more pressing tasks such as unifying military control, establishing basic national security from internal and external threats (which are often interrelated), rebuilding public administration and essential services, and aiding returning Syrian refugees to start reconstruction.

The TGS must assert clear priorities in reconstruction and development and ensure that assistance and investment align with the country’s development priorities. The TGS can benefit from the various MDB institutions’ differing areas of expertise, aligning each one with specific development goals. For example, despite the easing of sanctions, Syrian banks face immediate challenges in reestablishing correspondent relationships with outside banks because of concerns about anti-money laundering and countering the financing of terrorism (AML/CFT) risks. Until Syrian banks can reestablish those correspondent relationships, it will be difficult for the country to secure the promised investment inflows.

In the immediate term, the IMF, World Bank, and Financial Action Task Force (FATF) via its regional body, the Middle East and North Africa Financial Action Task Force (MENAFATF), are the most logical partners to help address AML/CFT risks in the banking sector. FATF is the standard-setting body, and the IMF and World Bank both provide significant policy support to many countries to assess their compliance with relevant AML/CFT standards. The urgency of addressing AML/CFT risks is compounded by the fact that the TGS is attempting to suppress drug trafficking, much of which is linked to former regime officials. Blocking drug traffickers’ access to both Syrian and global financial institutions is an important step that the TGS can take on national security grounds, and is also crucial for rebuilding local and global confidence in the Syrian financial system.

In the medium term, the TGS can leverage the expertise of MDB institutions like the EBRD, which has significant experience in executing local currency credit facilities, using local banks as partner institutions. The EBRD has used such facilities to build the capacity of local financial institutions and to extend credit to underserved economic sectors, especially SMEs. That experience could be usefully replicated in Syria.

There are numerous other examples of how MDBs can be useful partners in executing Syria’s development priorities. Expanding relationships with these institutions would give the TGS more options for accomplishing those priorities.

Next steps

The TGS should seek membership in both the AIIB and the EBRD but might prioritize moving forward with membership in either of these MDBs, based on its assessment of reconstruction and development needs. The AIIB has an institutional focus on regional connectivity, which complements the heightened investor interest in various projects to reintegrate and reconnect the Syrian economy within the region. The EBRD has a demonstrated track record in local financial sector development, agribusiness, and municipal infrastructure finance, which are clear priorities in Syria’s reconstruction. Accession to the EBRD can be a lengthier process because of the requirement for shareholders representing three-quarters of the institution’s capital to approve, versus the majority approval required by the AIIB shareholders. The TGS should begin diplomatic outreach to the primary shareholders of these MDBs and inform them of its interest in accession to membership. The TGS should concurrently reach out directly to the EBRD and AIIB to notify these institutions of Syria’s desire to begin the process of accession to membership.

About the author

Basil Kiwan is a contributor with the Atlantic Council, and a former financial regulation specialist at the Federal Deposit Insurance Corporation. He previously served at the US Treasury Department on a variety of international economic policy issues.

Related content

Explore the program

Housed within the GeoEconomics Center, the Economic Statecraft Initiative (ESI) publishes leading-edge research and analysis on sanctions and the use of economic power to achieve foreign policy objectives and protect national security interests.

The post Expanding Syria’s multilateral development bank engagement appeared first on Atlantic Council.

]]>
Secure supply chains for the US run through its closest neighbors https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/secure-supply-chains-for-the-us-run-through-its-closest-neighbors/ Fri, 19 Sep 2025 13:00:00 +0000 https://www.atlanticcouncil.org/?p=874535 Central America and the Dominican Republic are emerging as key partners for US economic security. Strengthening rule of law, workforce skills, and trade frameworks can secure lasting, mutually beneficial economic integration.

The post Secure supply chains for the US run through its closest neighbors appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Central America and the Dominican Republic buy more from the United States than they sell to it, and forty percent of US trade flows through the region via the Panama Canal.
  • Investing in this trade relationship is worthwhile for the US, and it can use tariff exemptions and a higher annual equity cap for development finance to do so.
  • Central America and the Dominican Republic should improve the rule of law and invest in a skilled workforce as they seek to deepen their integration to US supply chains.

Central America and the Dominican Republic are often viewed in Washington primarily through the lens of migration and development assistance. Yet this framing overlooks a transformation: the subregion is outpacing broader Latin American growth, has built competitive manufacturing capacity, and hosts critical infrastructure for US trade. In an era of geopolitical rivalry, supply chain disruptions, and US efforts to reduce dependence on China, Central America and the Dominican Republic emerge as vital partners for advancing US economic security.

  • Central America and the Dominican Republic can enhance US supply chain resilience. Recent shocks—from the COVID-19 pandemic to Russia’s war in Ukraine—have underscored the dangers of concentrated, offshore supply chains. While reshoring to the United States alone risks inefficiencies and higher costs, strategic nearshoring offers resilience and competitiveness. CA-DR economies provide the United States with manufacturing complementarities, especially in labor-intensive stages of production, while US firms retain higher-value activities such as research, design, and branding. This dynamic, known as the “smiling curve,” shows that partial offshoring can in fact expand US jobs and exports.
  • The subregion already plays a pivotal role in key industries. Costa Rica and the Dominican Republic are leading exporters of medical devices, supplying roughly 13 percent of US imports in 2023. Honduras has become a top supplier of insulated wire, while Dominican free trade zones manufacture critical electronics components. Beyond advanced industries, CA-DR is also a major agribusiness supplier, providing products like bananas, tropical fruits, and coffee that the United States does not produce domestically.
  • Trade ties reinforce US economic security. Unlike Asian supply chains dominated by Chinese inputs, CA-DR production heavily relies on US inputs, particularly in textiles, where US yarn and fabrics sustain more than 400,000 American jobs. The United States enjoys a trade surplus with CA-DR, a rarity in global trade, and these flows are underpinned by the CAFTA-DR free trade agreement, which guarantees fair treatment, investment protections, and legal stability.
  • Infrastructure is a strategic frontier. Forty percent of US trade passes through the Panama Canal, and several of Washington’s most critical regional ports are in CA-DR. While Chinese investment in the subregion remains modest, projects in Honduras, El Salvador, and Panama reveal Beijing’s growing interest in ports and logistics corridors. Left unchecked, such influence could threaten US access to strategic trade routes and undermine long-term security.
  • Policy recommendations call for action on both sides. Washington should expand development finance tools, modernize CAFTA-DR to USMCA standards, and create a regional supply chain security framework. CA-DR governments must strengthen rule of law, improve business environments, and invest in workforce development to meet industry needs. Together, these measures can solidify CA-DR as a reliable partner in building resilient, competitive, and secure supply chains for the United States.

View the full issue brief

About the authors

José Manuel Restrepo is former minister of trade and industry and former minister of finance of Colombia, and a nonresident senior fellow at the Adrienne Arsht Latin America Center.

Martín Cassinelli is assistant director at the Adrienne Arsht Latin America Center of the Atlantic Council.

Related content

Explore the program

The Adrienne Arsht Latin America Center broadens understanding of regional transformations and delivers constructive, results-oriented solutions to inform how the public and private sectors can advance hemispheric prosperity.

The post Secure supply chains for the US run through its closest neighbors appeared first on Atlantic Council.

]]>
Preparing US industry for a more competitive world https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/preparing-us-industry-for-a-more-competitive-world/ Wed, 17 Sep 2025 20:29:48 +0000 https://www.atlanticcouncil.org/?p=875169 US companies must stay the course on decarbonization to ensure long-term global competitiveness—or risk being left behind as the world’s other major economies continue to prioritize sustainability.

The post Preparing US industry for a more competitive world appeared first on Atlantic Council.

]]>

Bottom lines up front

  • The drivers behind industrial decarbonization on a global scale represent the “new normal.”
  • A durable and competitive industry will be unable to avoid sustainability as a key, if not paramount, criterion. US industry must retain the mindset of building for tomorrow regardless of the politics of today.

Table of contents

I. Introduction

In 2024, the Atlantic Council commenced a research series centered on the future of US industry in a decarbonizing world. This project considered if and how US policy might support a more sustainable, efficient and effective industrial base. Its goal was to assess how the United States could remain competitive in a global market where friends and competitors are increasingly motivated to invest in decarbonization and incentivizing domestic companies to produce lower carbon products. This project particularly focused on how the US industrial base might respond to these developments without the expectation of new major budget expenditures. In other words, what constitutes durable competitiveness?

The project involved multiple workshops including the perspectives of dozens of stakeholders throughout the public and private sectors, and ultimately produced two major research reports: Reducing US industrial emissions under budgetary uncertainty (published November 2024) and Building for tomorrow: Preparing US industry to compete in a lower-carbon global economy (published June 2025). 

Though we published these pieces in disparate political contexts, each analysis offered perspectives on the unique challenges to enhancing sustainable competitiveness in each of the sectoral pillars of US industry. The second paper prioritized what actions might be taken to address them. Fundamentally, we argued that the United States should maintain, and ideally expand, its industrial decarbonization toolkit as a matter of both economic competitiveness and geostrategic interest given the resurgent importance of industrial policy throughout the world. 

Since the publication of the second report, however, the wider context around US industrial and energy policy has shifted further. The second Trump administration has, at the executive level alone, introduced policies intended to bolster the role of fossil fuels, including coal, while also initiating efforts to reverse  climate analyses foundational to US policy on the subject since the Obama administration (notably the Endangerment Finding), and thus reshape how the US government crafts related regulations and policy decisions. At the legislative level, meanwhile, the recent passage of the administration-endorsed budget reconciliation law (One Big Beautiful Bill Act) saw substantive curtailments of several federal incentives for clean energy, clean fuels, and emerging technologies—programs previously identified in our research as significant to ongoing sustainability developments in major industries like iron, steel, chemicals, aviation and more.

Amid such a seismic shift, it is tempting to question if furthering US industrial decarbonization remains a plausible or even a valuable objective—or, if a reversion to business as usual prior to the emergence of a (now lost) political consensus on the importance of this issue is the only realistic option left. 

We approach this question from a different perspective: rather than call for the return of business as usual, we argue that the drivers behind industrial decarbonization on a global scale represent the “new normal,” and US companies must stay the course to ensure both the durability and long-term competitiveness of the country’s industrial sector. Regardless of endlessly shifting events in Washington, DC, the challenge of durable competitiveness always was—and remains—a global issue. The present moment represents a turning point in which the United States can still assert leadership in a rapidly changing industrial space, or risk being left behind as others take the proverbial wheel and craft the future of industry without us. Because industrial sustainability will matter in 2030, 2040, and 2050, it matters all the more in 2025. Put simply, we are still building for tomorrow. 

II. Durable competitiveness goes global

Why is durable competitiveness, enabled by industrial decarbonization, still important despite a changed political and geopolitical context? We contend that four major trends affirm that these issues are only increasing in importance when understood within a wider lens. 

A. Competitors are moving ahead of the United States—and setting future terms of engagement 

A key point that emerged from our prior analysis was the degree to which industrial decarbonization efforts, coupled with the adoption of low-emission and emerging fuel sources, have become part of strategic goals in multiple major economies. These include those of US partners, such as the European Union (EU), but also (perhaps especially) competitors like China. This has not necessarily occurred for altruistic or environmental reasons, but rather as a response to wider conditions. Since the mid-2010s, surging economic protectionism, resource nationalism, and efforts to de-link and deglobalize the major economies have forced policymakers the world over to redefine economic and energy security in the modern age. The apparent acceptance of 15 percent broad tariffs in the Trump administration’s most recent trade agreements (apart from separate, punishing sectoral tariffs) is only the latest example affirming that such protectionism is now understood as a normal facet of international economic relations. 

For energy importers—like the EU, China, Japan, South Korea, and India—dependence on conventionally traded fossil fuels sourced from foreign suppliers enhances the appeal of homegrown energy. Each of these countries place high economic and political importance on domestic production in one or more of the traditional industrial sectors, such as steelmaking; in turn, these sectors have historically relied on a mixture of domestic and/or imported fossil fuels. This context makes fuel diversification and improving efficiency in the industrial sectors more appealing. Examples of such policies, still being pursued in other major economies, include the EU’s Net-Zero Industry Act, the United Kingdom’s Invest 2035 plan, Japan’s Green Growth Strategy, and South Korea’s Framework Act on Carbon Neutrality and Green Growth among dozens of regional, sectoral, and fuel-specific (e.g., hydrogen and ammonia) programs. 

For countries that enjoy domestic energy abundance, like the United States, this consideration may seem less urgent—but these industrial decarbonization technologies are themselves a growing source of industrial production growth, export revenue, and employment. China already dominates the global solar and wind sectors and has a growing edge in electric vehicles—clean technology exports together worth $177 billion for China’s economy in 2024. Much the same pattern is underway with heat pumps (40 percent sold globally in 2023 were manufactured in China), electrolyzers (China boasts two-thirds of global manufacturing share) and low-emission steel and aluminum (China controls 32 percent and 62 percent of manufacturing capacity respectively). The Chinese government bet—correctly—that improving and reducing costs for now-mature low-carbon technologies would facilitate their adoption in markets where they were previously unaffordable. Once a degree of cost parity with traditional fuels was achieved, their other advantages (namely, offering a fast-track homegrown energy supply) would enable rapid scaling of demand. With an estimated $2.2 trillion in investment this year alone targeted at low-emissions fuels and infrastructure (double that of coal, oil, and gas combined), there remains a clear direction of travel, and the next generation of decarbonization technologies stands to benefit. Now, China is preparing to once again build and sell the future toolkit to the world even as the United States walks back its own incentives and credits for similar products. Those skeptical of a push for US industrial decarbonization may see little near-term gain for US economic interests—but on the longer horizon, there may be a great deal to lose indeed. 

Another factor is the proliferation of emissions trading systems (ETSs) and border carbon adjustment (BCA) measures. These measures are already shaping the future of international trade. Our prior analysis noted the profound galvanizing impact that the arrival of the EU’s Carbon Border Adjustment Mechanism (CBAM) has had for other economies to adopt similar measures in order to retain that market access without penalties. Crucially, the EU system will begin with regulating high-emissions intensity, heavy industrial products. An updated report from the International Emissions Trading Association (IETA) assesses that the global forward march of such programs continues even in 2025: thirty-eight ETSs are in force, covering 58 percent of global emissions. Seventeen members of the Group of Twenty (G20) have an existing or planned ETS system, while carbon pricing is being installed or expanded in major economies including Brazil, India, and Turkey in response to the incoming European penalties for suppliers in countries that lack such mechanisms. Brazil, host to the United Nations Climate Change Conference, COP30, later this year, is reportedly preparing an “international climate coalition” proposal for that convening, which would inaugurate a climate club of countries that charge foreign imports an emissions fee.

All of this has occurred amid significant changes in the global trading system, driven in part by the Trump administration’s stated goal of rebalancing trade. However, the Trump administration has not yet achieved significant changes to the European Union’s policies such as border adjustment, carbon pricing, or its emissions trading scheme. The EU, for its part, has pursued internal simplification and rationalization measures upon its CBAM’s entry into force, but such sharpening of parameters was perhaps inevitable in the inaugural program. For now, the EU’s border adjustment plan and related efforts, such as its methane requirements for imported fuels and products, are fast becoming a reality of doing business. 

The United States retains the ability to engage on these fronts, but others appear to be setting rules of engagement. In the realm of border adjustment, there remains an intriguing opportunity to unify interests in industrial decarbonization and efficiency improvement within the Trump administration’s stated trade agenda—both encouraging positive emissions outcomes and producing new revenues. We recommended previously that Congress might adopt its own version of a US carbon border adjustment aligned with both aims; indeed, given US industry’s existing emissions intensity advantages in key sectors like steel-making, such an approach could benefit domestic producers while incentivizing improvements in other countries. The PROVE IT Act and Foreign Pollution Fee remain excellent starting points. But the future of industrial sustainability is being written in real time while the United States is all but absent from the conversation. Should the United States wait years to re-enter this dialogue, it may find itself on the outside looking in—and US industry less agile and competitive as a direct result.  

B. Private sector companies face evolving risks and incentives to pursue lower-emissions intensity and greater efficiency

An oft-repeated assurance from the Trump administration has been that its deregulatory actions will ultimately produce immense benefits for US industry and manufacturing. The argument is two-fold: First, undoing burdensome regulations (for example, weakened EPA oversight of methane emissions in the upstream oil and gas sector) will enable expanded production of domestic energy and thus reduce costs for industrial consumers. Likewise, industry will enjoy a lightened regulatory framework in areas like air emissions and water pollution controls as well as easier, faster permitting with limited litigation, sharpened environmental review, and reduced enforcement. Over time, these changes will lower costs and improve profit margins. 

These arguments may prove true—in the United States. Most major US industrial companies, however, are not solely operating within or supplying a US customer base; they supply the world, including the United States’ major trading partners. As a result, US companies with a multinational footprint are subject to overlapping foreign regulations and jurisdictions, complete with requirements that the US government has no direct control over. 

That wider environment, and its risks and pressures, is evolving as the world develops a vastly greater understanding of various types and sources of emissions associated with a given unit of a product. The EU’s CBAM, highlighted above, is one example, but the bloc’s Methane Strategy is another that scrutinizes the full life-cycle methane emissions associated with certain imports, including those of liquefied natural gas (LNG). These regulations are made possible through a rapidly improving data acquisition and verification framework for greenhouse gases, enabling a sprawling new analytical industry in the realm of emissions accounting. The advent of artificial intelligence (AI) will only expedite information acquisition and interpretation capabilities, especially through previously complex, opaque supply chains. 

Governments alone are not driving these trends: Private sector associations—such as the aviation industry’s Carbon Offsetting and Reduction Scheme for International Aviation (CORSIA) and the maritime industry’s International Maritime Organization (IMO)—are taking steps to formalize emissions accounting within their sectors as a prelude to management and reduction efforts. A similar example within the steel industry is the recent announcement of a new consortium of producers and value chain stakeholders in Asia. Among other efforts, this private coalition will conduct a pre-feasibility study to assess carbon capture, utilization and storage (CCUS) opportunities and barriers in Asia ahead of establishing scalable “hubs” among the consortium members. The aspiration is to mitigate the emissions intensity of Asian steel operations—likely influenced by evolving trade dynamics around these issues. The financial sector is likewise taking notice: IBM asserts the importance of “finance-grade GHG [greenhouse gas] emissions data” for private businesses, adding: “Investors are increasingly scrutinizing sustainability performance alongside financial performance to inform investment decisions.” 

US businesses must contend with these pressures throughout global markets, and among their own investors and shareholders, which persist despite the Trump administration’s wholesale turn against environmental, social, and governance (ESG) criteria for financial sector decision-making. This tension is one driver of the “greenhushing” trend, wherein large corporations quietly maintain (but publicly minimize) their sustainability actions, investments, and internal initiatives. Recent data affirms that, regardless of the unsupportive US government perspective, major banks throughout the world (even those that have left umbrella groups like the Net-Zero Banking Alliance) are still steadily decarbonizing their portfolios. Even if scrutiny does not come from home, it may come from somewhere else. 

Moreover, public and consumer scrutiny over the societal impacts of major industries is hardly abating. The anxiety surrounding the AI buildup occurring throughout the country illustrates a warning for US industry: Intensifying opposition to new data centers and adjacent energy infrastructure is influenced by the emissions and water impactsfrom these new builds. Reasonable efforts to pursue sustainability remain a key aspect of attaining, and maintaining, social license to run a business. If anything, these considerations are set to intensify over the multi-year and multi-decadal outlook for most major operation and investment decisions. Private multinational companies must therefore contend with sustainability and decarbonization as an issue of global competitiveness right now, and for many years to come. 

C. The rise of AI could represent a new industrial revolution and accelerate decarbaonization—if US industry can take advantage  

Undoubtedly, the AI revolution represents a tremendous growth opportunity for the major industrial sectors—particularly in the face of the changing geopolitical, trade, regulatory and social environment discussed above. IBM refers to “Industry 4.0” which enables “digital transformation of the field, delivering real-time decision making, enhanced productivity, flexibility and agility.” Key AI and AI-adjacent developments already being adopted into the industrial sector include machine learning, advanced language processing, human-robot collaboration and cobots, digital twins and predictive maintenance. Given that the world is at the tip of the AI iceberg, and with quantum computing advances likewise gathering pace, there is vast potential for these transformative changes to put heavy industry on a different trajectory than its past development.

These technological adoptions could improve the ability of presently hard-to-abate sectors to decarbonize, as well as identify and implement efficiencies more quickly and affordably than has been possible before. A 2025 World Economic Forum white paper, considering the impact of AI in industrial and manufacturing operations, argues that “[s]ociety is entering the Intelligent Age…In this new era, industrial operations are being redefined as frontier technologies deliver advancements facilitating collaborative intelligence and amplifying human ingenuity.” This perspective can certainly be true with respect to industrial decarbonization. The paper notes, as one example, that autonomous industrial systems can optimize energy consumption and lower waste of resources while allowing efficient, real-time monitoring of previously complex environmental impact metrics. Moreover, the ability of major industrial stakeholders to understand and interpret data gathered throughout their supply chains is set to dramatically expand—as well as their ability to understand differing scopes of emissions involved with their production processes and the full life cycle of a given item or service. 

The AI revolution is also relevant to another key issue: infrastructure buildout. We have argued previously that the decarbonization challenge is fundamentally an infrastructure challenge—both in terms of resiliency to unavoidable climate change, adaptation of our existing infrastructure, and building the “new” pieces of the puzzle—new pipelines, transformers, cables, reinforcing steel (rebar) and much more. The addition of acres worth of data center infrastructure (and presumably a wholesale upgrade of the US power system to accommodate it) is just another layer of creation that will be foundational to a resilient and growing US economy in the years to come. Historically, such a moment would have mandated a swelling of the manufacturing workforce and enormous expenditure, as well as an ironic, immediate-term acceleration of emissions associated with an uptick in heavy industrial processes. 

The technological transformations now upon us, however, can change that 20th-century narrative for the better and break this established pattern. The World Economic Forum refers to these problems, which have made “large structure production” expensive, and energy- and emissions-intensive. However, “the urgency of decarbonization has created a window of opportunity to leapfrog outdated methods.” AI in this context acts as a force multiplier for other innovations like automation and digitalization, allowing optimization of all energy resources and inputs to a given process as well as faster, more granular repetition and replication of a facility or product design. Adapting these innovations into the heavy industrial sector can reduce the impact of this incoming generational infrastructure surge, making it possible to enhance sustainability on both sides of this proverbial equation. 

To be sure, other benefits (particularly in overall cost, waste, and workforce preparation) will make this new era of technological integration appeal to private businesses and other stakeholders. That integration, and accessing its full potential, will not occur in a vacuum or by accident; conscious preparation and motivation to access all these positive implications will be necessary. Sustainability may not be the foremost driver of AI integration and adoption in the industrial sector, but it is already part of the conversation with clear, tangible outcomes.

D. Political volatility—in the United States and elsewhere—is ever present, ensuring that incentives and opportunities will change again

Much of the present discourse around industrial decarbonization was first ignited during the Biden administration when the US government pulled many levers of its policy, regulatory, and fiscal power to encourage broad decarbonization throughout the US economy. Likewise, that same discourse has appeared to diminish as federal climate policy and decarbonization considerations have shifted under the Trump administration. 

We noted in our prior analysis that political time scales and those of major project developers and investors are rarely aligned. This misalignment perpetuates unclarity and uncertainty, especially around major decisions that could involve projects spanning years and with returns on investment planned past a decade of operation or longer. Of course, some degree of uncertainty is hardly new for US industry. After all, a new factory or plant in this sector regularly costs multiple millions of dollars to build and operationalize, but such facilities are expected to be operating for decades into the future amid a variety of economic and political changes. 

What is relatively new, however, is the degree of uncertainty in the future requirements and expectations for industrial products and services as they relate to emissions and environmental impacts. In other words, politics is increasingly influential on markets and elevating specific concerns and goals (in some instances) over others. Moreover, key policies and incentives can radically change not just within a domestic market but also within overseas markets—and those two sets of approaches may have disparate requirements. All of this poses elevated risks, greater instability, and a need for flexibility to manage varying, perhaps contradictory, mandates. 

Even within the domestic context (in this case US federal and state policies impacting industry) stability is far from guaranteed. Instability, whiplash, and volatility are increasingly the order of the day. At the federal government level, the shifts from 2016 to 2017, then 2020 to 2021, then again 2024 to 2025 were exceptional within American political history—especially with respect to energy and climate policy. While it would be tempting to argue that the personal influence of President Trump in these three transitions precipitated such sharp swings each time, it is also notable that the American electorate is far more polarized than at any other moment in recent history. These facts are borne out by the shrinking number of competitive congressional seats as well as the current Congress’s willingness to break with tradition and undercut major private sector incentives previously written into the Inflation Reduction Act (albeit by narrow margins). 

Sharp swings in American politics thus should not be laid at the door of one individual or administration but appear increasingly symptomatic of the entire polity. It is entirely conceivable, as a result, that future election cycles (never too far away, as any politician will readily admit) could produce swings in the opposite direction from the current dynamic. In this instance, that swing would push federal policy back in the direction of interest and focus on climate, and perhaps new and creative approaches toward energy system transformation and industrial decarbonization. 

Another key element to this conversation is the role of state and local governments, which retain extensive authorities when it comes to energy and decarbonization-adjacent regulations and priorities within their territories. Every federal administration has discovered this to some degree; thus far, the Trump administration’s efforts to limit state-led cap-and-trade systems, fossil-industry targeted laws, and climate-focused permitting requirements have had limited effect. This situation creates an additional layer of gubernatorial, mayoral, and legislative turnover against which businesses must invariably hedge. 

Where does this seemingly endless cycle of volatility leave the US industrial sector, particularly as it considers whether to pursue extensive investments and the immediate costs and risks associated with changing how to do business? In the end, the long-term view is what will ultimately matter the most. For major players in the industrial space, the next election cannot be predicted, and no one industry can fully insulate itself against shifting tides. That said, it may be possible to discern the wider trendlines and what considerations will matter over the extended horizon—indeed, the horizon over which most of the projects and process changes in question will actually begin to earn returns on investment. Flexibility, and a forward-looking posture, thus remains the most sensible approach amid the machinations of political machinery within and outside the United States. 

III. Still building for tomorrow

The puzzle around drivers, motivations, and factors that will facilitate industrial decarbonization has yet to be fully resolved. To be sure, more churn and change is inevitable going forward. The proposals, ideas, and policy solutions of today may not be those of tomorrow, and variability throughout the world on how to go about this generational project is perhaps the only certainty. With a variety of energy transitions (plural, not singular) taking place in different corners of the globe, developments in global industry are themselves likely to be highly varied and on different timetables. 

Even so, the direction of travel seems increasingly clear: If durable and competitive industry will ultimately include sustainability as a key, if not paramount, criterion, then US industry must retain the mindset of building for tomorrow regardless of the politics of today. Ultimately, this mindset is not about a particular vein of politics or moral conviction. Rather, it is intrinsically tied to understanding business growth prospects, seizing opportunities ahead, and applying thoughtful risk management to a changing world. To focus solely on the present-day state of play would be to risk the future of a core part of US economic strength and power projection. 

The trajectory for industrial decarbonization and the eventual winners are being decided by choices here and now. A failure of US industry to engage would effectively amount to unilateral disarmament at what could be a lynchpin moment. Such an outcome is avoidable but not by doing nothing at all. As ever, fortune favors the bold. US industry stakeholders should plan accordingly. 

about the authors

stay connected

Sign up for PowerPlay, the Atlantic Council’s bimonthly newsletter keeping you up to date on all facets of the energy transition

Explore the program

The Global Energy Center develops and promotes pragmatic and nonpartisan policy solutions designed to advance global energy security, enhance economic opportunity, and accelerate pathways to net-zero emissions.

The post Preparing US industry for a more competitive world appeared first on Atlantic Council.

]]>
The Abraham Accords at five https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/the-abraham-accords-at-five/ Mon, 15 Sep 2025 12:00:00 +0000 https://www.atlanticcouncil.org/?p=874027 On the fifth anniversary of the UAE, Bahrain, and Israel normalizing relations, American, Bahraini, Emirati, Israeli, and Moroccan authors reflect on the transformational change and “warm peace” envisioned by the Abraham Accords—a long-term, generational project.

The post The Abraham Accords at five appeared first on Atlantic Council.

]]>

Perspectives from

Five years ago, the announcements that the United Arab Emirates and Bahrain would normalize relations with Israel caught the world by surprise. Subsequent announcements on Kosovo, Sudan, and Morocco demonstrated that the new spirit of cooperation in the Middle East—embodied in the Abraham Accords signing ceremony at the White House on September 15, 2020—was not an isolated trend.

The world and the Middle East specifically have changed significantly in those five years, with intensifying major power competition, a reimagining of the US role in the world, rapid technological change, major evolutions in the conflict between Iran and both Israel and Gulf countries, significant political change across the Middle East, and the  October 7 tragedy and the resulting war in Gaza—to name a few. 

Many of these developments have reinforced the trends driving the Abraham Accords: Evolving geopolitical dynamics and economic and technological change have underscored the value of stronger cooperation between Israel and its neighbors and the importance of mending the rifts that have impeded the Middle East’s economic potential for too long. For the United States, the diplomatic achievement of the Abraham Accords highlights the value of America’s unique form of strategic partnership (as compared to competitors like China) and provides a platform for transforming its partnerships in the Middle East for a new era: away from counterterrorism and forever wars and toward cooperation around mutually beneficial, private-sector-led prosperity. The force of these trends explains why there was so much momentum toward deepening and expanding the accords in mid-2023, as Dan Shapiro describes in this collection of essays. 

Of course, other recent developments—most notably October 7 and the war in Gaza but also fears of Iranian retaliation—have challenged the positive trends associated with the Abraham Accords and demonstrated that the forces propelling division and discord remain influential. There is a risk that these forces could derail or at least further delay positive momentum. But at the N7 Initiative, we remain hopeful that these forces are waning in the face of more powerful global and regional trends. A durable end to the war in Gaza is essential to realizing the potential for a new era of de-escalation and cooperation in the Middle East. And a negotiated solution to the Iranian nuclear threat will help resolve one of the most persistent challenges to that new era.

This compilation of essays and reflections from American, Bahraini, Emirati, Israeli, and Moroccan authors reminds us that the transformational change and “warm peace” envisioned by the Abraham Accords is a long-term, generational project. Sarah Zaaimi describes how the Moroccan king was inspired to embrace the accords precisely because he was thinking about future generations and creating a more stable and prosperous country when leadership eventually passes to his son.  And as Loay Alshareef points out, positive economic and cultural change between Israel and its neighbors is continuing, and this change has deep roots that predate the accords themselves.

Those who believe in the vision for an integrated Middle East must retain a commitment to this project and continue to invest in initiatives today that will make that more promising vision for the future possible. In his reflection, Dan Shapiro, who served as US ambassador to Israel from 2011 to 2017 and deputy assistant secretary of defense for the Middle East from 2024 to 2025, describes what some of these initiatives could entail and underscores the importance of investing in a multilateral architecture to institutionalize a range of economic, security, and cultural projects. While less flashy than major new political announcements, this architecture is what will help cement regional integration for decades to come.

Finally, remaining focused on the long-term promise of the Abraham Accords can help policymakers navigate the immediate challenges facing the region more effectively. As Israel’s first ambassador to the United Arab Emirates Amir Hayek points out, the strategic partnerships Israel has forged through the Abraham Accords can provide Israel with a more comprehensive security than military power alone can deliver.  Similarly, Ahmed Khuzaie argues that Bahrain’s engagement with Israel has elevated the small country’s position as a leader of pragmatic diplomacy, allowing Bahrain to help shape regional discourse on issues like the Israeli-Palestinian conflict. 

The N7 Initiative remains committed to working with policymakers, the private sector, and thought leaders to build on these lessons. In doing so, we seek to ensure the Middle East five years from now is a more integrated, tolerant, and prosperous place.

Allison Minor is the director of the N7 Initiative, a partnership between the Atlantic Council and Jeffrey M. Talpins Foundation dedicated to strengthening cooperation between the United States, Israel, and Arab and Muslim countries. She previously served as the deputy US special envoy for Yemen and the director for the Arabian Peninsula at the US National Security Council.

United States: After the war, it’s time to revive and expand the Negev Forum

Five years after the Abraham Accords, the promise of these agreements to help shape a far more peaceful, prosperous, and integrated Middle East remains. But advancing it is also frustrated by the ongoing war in Gaza that Israel launched in response to Hamas’s terrorist attacks on October 7, 2023. But the war will end, the sooner the better. When it does, countries committed to this vision of integration must move quickly to restore momentum that has been lost.

One opportunity that should be seized as soon as possible after the war is to resume the work of the Negev Forum. The Negev Forum was launched at the Negev Summit in Israel in March 2022, when the foreign ministers of Israel, the United States, the United Arab Emirates (UAE), Bahrain, Egypt, and Morocco met together in the first gathering of its kind. They launched the Forum, with a steering committee and six working groups, covering security, health, water and agriculture, energy, education and coexistence, and tourism. The working groups were tasked with developing multilateral projects aimed at bringing the benefits of regional integration to the citizens of these nations. (The N7 Initiative conducted its own conferences on education and coexistence, water and agriculture, and trade with regional experts in 2022 and 2023 to support the governments’ work.)

Progress was mixed, as some working groups progressed faster than others, and countries had different bandwidths and levels of commitment to pursuing projects. But by the summer of 2023, when I assumed the duties of the US representative to the Negev Forum steering committee as part of my role as the State Department Senior Adviser on Middle East Regional Integration, we were gaining momentum. At the UN General Assembly in September, plans were finalized to host a second Negev Forum ministerial in Marrakesh, at which working group projects would be endorsed by the foreign ministers and advanced toward implementation. Host country Morocco insisted on going forward with the meeting despite a recent, devastating earthquake. US Secretary of State Antony Blinken was set to attend, following a visit to Israel and Saudi Arabia intended to advance work on a normalization agreement. The date of the ministerial was set for October 19, 2023.

Of course, it never happened. Hamas’s brutal attack and the war that ensued consumed the region’s attention. But when the war ends, reconvening this gathering should be an early goal, with working group projects dusted off and updated, ready for ministerial approval.

In fact, the Marrakesh ministerial was set to be an expanded version of the original Negev Summit. Plans were at an advanced stage to include Jordan as a new member, and to invite senior Palestinian Authority representatives to participate in some of the sessions. In addition, a number of other countries, including African members of the Arab League and other countries outside the region, had expressed interest in attending as observers.

That expansion, too, should be on the table for after the war. Jordan, as a full member, and the Palestinian Authority are obvious participants. Oman, Mauritania, the Comoros, Somalia, Djibouti, and Indonesia are all plausible participants as observers. A number of European partners could also attend at lower levels to indicate where their governments could provide expertise and funding to support the main countries’ efforts.

Over time, the institutionalization of a regional grouping like the Negev Forum would add considerable ballast to efforts to build a more integrated region. As its projects deliver benefits to the citizens of Negev Forum countries, more countries will want to join the club. In time of war, it may seem far-fetched, but the goal should be for an ASEAN-style regional organization to take hold in the Middle East and North Africa region, the kind of organization that creates a thickened web of ties that help make war less likely in the future.

It will be tempting to let post-war priorities that are more urgent—like the reconstruction of Gaza—or flashier—like Israeli-Saudi normalization or Israeli-Syrian understandings—crowd out the work of building a broader regional architecture. The United States should not let that happen. But given the intensity of the work involved, more resources are needed. That is why President Donald Trump should nominate, and the Senate should confirm, the special envoy for the Abraham Accords that Congress created in the National Defense Authorization Act for Fiscal Year 2024. The appointment of a high-profile envoy in this role will communicate the United States’ seriousness about expanding regional integration in every direction, and buttress the work of other senior envoys who may focus on the higher profile efforts in Riyadh and Damascus.

Once the Negev Forum has been revived with an expanded ministerial meeting, Trump could make a major contribution to his peacemaking aspirations by convening a Negev Forum head of state summit. This summit could be held in concert with, or as a means of encouraging, progress toward an Israeli-Saudi normalization deal. As much as anything, the summit would demonstrate that the dramatic regional transformation toward integration launched by the Abraham Accords is alive and well and moving forward as the Middle East emerges from the tragedy of October 7 and the Gaza war.

Daniel B. Shapiro is a distinguished fellow with the Atlantic Council’s Scowcroft Middle East Security Initiative. He served as US ambassador to Israel from 2011 to 2017, and most recently as deputy assistant secretary of defense for Middle East policy. He also previously served as the director of the N7 Initiative.

Israel: That the accords have endured is telling

As we mark the fifth anniversary of the Abraham Accords, the region is living through another difficult chapter of violence and uncertainty. The horrific October 7 attacks and the ongoing war have challenged even the most resilient partnerships. War, by its nature, undermines trust and stability. And yet, despite these headwinds, the Accords have endured. From my perspective, that endurance is not accidental. It is the product of leadership, commitment, and the recognition that the path blazed by UAE President Sheikh Mohammed bin Zayed five years ago is that of a marathon, not a sprint. 

When I speak about the Abraham Accords, particularly the relationship between Israel and the United Arab Emirates, I often think about it as a marathon. In a marathon, there are stretches where the road is smooth and momentum is strong, but there are also moments of fatigue. But the essential point is that you keep running. That is what we have seen in the past five years: Despite difficulties there has been an unshakable commitment to continue moving forward. 

In recent weeks, the United Arab Emirates has made it clear that Israeli annexation of  West Bank territory would jeopardize its relationship with Israel after an Emirati official made a public statement saying that such a move is a “red line”  and would “foreclose on the idea of regional integration.” This sentiment is not new, as the suspension of previous West Bank annexation plans was a condition for the UAE to sign the Abraham Accords. The Emiratis, known for their long-term planning, want to take action—and believe that action must be taken—to build a new, secure, and strong Middle East economically and strategically. For the Emiratis, annexation would lead to a loss of hope in their vision for the future of the Middle East, and this loss would jeopardize long-term plans. From my acquaintance with the Emirati leadership, I know that their words should be taken very seriously.

We must do everything to continue, develop, and preserve the Abraham Accords for the benefit of future generations.

The UAE’s stance following October 7 has illustrated its commitment to moving forward. Despite facing significant regional and domestic pressure, Abu Dhabi remained firmly committed to the Abraham Accords and condemned Hamas’s brutal attacks. The UAE went beyond rhetoric and maintained flights to Israel from the very first day of the war, when nearly all others suspended them. At the same time, the Emiratis leveraged their relationship with Israel to deliver humanitarian support to the people of Gaza—they provided food, medicine, medical treatment for children, and critical infrastructure like hospitals and desalination plants.

For Israel, one of the clearest lessons of the past five years is that the country waited too long to pursue these kinds of partnerships. Israel lost decades of potential cooperation in the region by relying only on military power and conflict management, rather than investing in regional alliances. The Abraham Accords have shown that real security does not come from military power alone—it comes from trusted partners, shared interests, and commitments to growth and stability. Israel has found such partners in the UAE, Morocco, and Bahrain, and the country’s long-standing peace with Egypt and Jordan remains foundational. I believe more countries will join this circle of normalization in time, motivated by the desire to counter radicalization and to pursue regional prosperity. This is not wishful thinking; it is the realistic trajectory of a region that cannot afford to remain hostage to old conflicts. 

Future partners in the region can look at Israel’s relations with the UAE and ask themselves: “Why not us?” 

The past five years have also demonstrated the tangible benefits of peace. Trade between Israel and the UAE reached over $3.2 billion in goods last year, not including government-to-government transactions or software and services. Investments have surpassed $5 billion, and more than two million Israelis have traveled to the UAE since normalization. These are not abstract statistics; they represent millions of human interactions and billions of dollars driving growth on both sides. Looking forward, the next phase must include deeper cooperation in science, academia, culture, and the arts—because while leaders may sign agreements, it is ultimately people-to-people connections that sustain them. 

The priority for Israel and its Abraham Accords partners should not be narrowly defined. Security cooperation cannot stand without economic growth. Economic growth cannot last without cultural and human connections. Trust cannot deepen without all three reinforcing each other, thus they must be pursued simultaneously. Areas of potential cooperation include regional food security, energy innovation, AI, tourism, and more. 

While the potential of bilateral relations is high, the potential of regional and multilateral cooperation is much higher.   

As we reflect on these first five years, we must avoid the temptation to take a snapshot in a moment of crisis and declare the Accords a failure. Marathons are not judged at the halfway mark. They are judged by whether the runners reach the finish line. 

Amir Hayek is a nonresident senior fellow in the N7 Initiative, a partnership between the Atlantic Council and Jeffrey M. Talpins Foundation. Hayek served as the first Israeli ambassador to the United Arab Emirates from 2021 to 2024, working to strengthen diplomatic and economic ties between the two countries after they formalized relations under the Abraham Accords.

UAE: The accords fulfill Sadat’s people-to-people dream 

When I think about the Abraham Accords, I cannot help but look back to President Anwar Sadat of Egypt, my role model for peace. In 1979, Sadat’s peace with Israel brought Egypt the full return of Sinai and opened diplomatic relations. But his dream went beyond maps and treaties. Sadat envisioned a true people-to-people peace between Egyptians and Israelis that would transform generations and replace suspicion with trust. 

Tragically, Sadat paid for this vision with his life in 1981. The bullets that killed him also killed the momentum for deep human connection. His successor, Hosni Mubarak, maintained security cooperation without cultural, social, or economic warmth as he was too afraid of the political risk. While Sadat paid the cost for peace, history remembers him as a hero who dared to dream beyond the limits of his time. 

The Abraham Accords, signed in September 2020, are in many ways the realization of Sadat’s unfinished mission. Unlike the Egypt-Israel peace, these agreements between Israel, the UAE, and later Bahrain, Morocco, and Sudan have not stopped at the level of government-to-government arrangements. They have opened the gates for business partnerships, tourism, cultural exchange, and everyday friendships between peoples who for decades never met face to face. 

Trade between Israel and the UAE has soared into the billions of dollars. Daily flights between Abu Dhabi and Tel Aviv are packed with the likes of diplomats, entrepreneurs, tourists, and families. Israelis shop in Dubai’s malls and Emiratis tour Jerusalem’s holy sites, demonstrating that this is a warm peace where people learn each other’s languages, work on joint ventures, and share meals together. 

Up until the October 7 attacks the peace was unstoppable. Reports and seized Hamas documents confirm that Hamas carried out that massacre as a way to derail the potential normalization between Israel and Saudi Arabia. Only two weeks earlier, the crown prince of Saudi Arabia publicly said, “Every day, we get closer” in reference to normalization with Israel. That statement must have infuriated Hamas leader Yahya Sinwar, who feared peace more than war. 

The UAE suddenly found itself in an extremely challenging position. On one hand, the leadership has always been clear in supporting the Palestinian people. On the other, it had to navigate a public mood already warming to the Abraham Accords. The reality is that enthusiasm for the Accords varies across the Emirates—Abu Dhabi embraces them strongly, while in Sharjah the sentiment is much cooler. 

In the midst of the crisis, the UAE was one of only two governments in the entire Middle East to condemn Hamas’s barbaric attacks—the other being Bahrain, whose Crown Prince Salman bin Hamad bin Isa Al Khalifa also spoke out. Both took a principled stance, knowing that condemning terrorism is essential for any genuine peace to survive. 

The way forward will not be easy. But I believe the war must end in the right way: Hamas’s total surrender, the complete release of all hostages, and the removal of a radical ideology that has held Palestinians hostage for decades. Only then can we begin to repair what was broken on October 7. 

When that moment comes, peace activists must double down on building more people-to-people projects that connect Muslims and Jews, Arabs and Israelis, in ways that create real human investment in peace. Initiatives like the I2U2 Group, a partnership between India, Israel, the UAE, and the United States, show the potential for cross-regional collaboration in areas like agriculture, energy, water technology, and infrastructure. This is a model worth expanding, but it is not enough. 

We must create platforms that also include Palestinians who reject Hamas’s pathological ideology—voices that want to see prosperity, education, and mutual respect flourish. Without them, peace will remain incomplete. 

The future I believe in is one where Ishmael and Isaac both prosper—where their children travel, trade, and thrive together. The biggest loser after this war must be the extremist worldview that seeks endless cycles of bloodshed. 

Five years on, the Abraham Accords remain the best hope we have for Sadat’s dream—a peace that is lived, not just signed. And that dream is worth defending, nurturing, and expanding, no matter the cost. 

Loay Alshareef is a United Arab Emirates-based Arab Muslim peace advocate whose mission is to bridge divides between Muslims and Jews and to champion peace in the Middle East.

Bahrain: Balancing domestic sentiment and regional integration

Bahrain’s formalization of relations with Israel—which the country has remained committed to despite intensifying domestic and regional pressures following October 7—has recalibrated its foreign policy approach. The kingdom now finds itself navigating a nuanced landscape, where strategic partnerships must be weighed against the evolving currents of negative public sentiment.

When Hamas launched an incursion into southern Israel in October 2023, resulting in the subsequent Israeli military campaign, scrutiny of Bahrain’s normalization with Israel intensified. Public sentiment in Bahrain remains overwhelmingly pro-Palestinian, rooted in long-standing civil society activism and religious solidarity. Unlike the UAE, Bahrain has a more vibrant public sphere, where demonstrations and symbolic acts—such as protests outside the Israeli embassy and parliamentary statements—have expressed opposition to continued normalization. 

Anti-Israeli sentiment in Bahrain is largely shaped by the ideological influence of regional Islamist movements, particularly the Iranian ayatollahs and the Muslim Brotherhood. These groups have cultivated narratives that resonate with segments of the population, framing normalization efforts as a betrayal of regional and religious identity. In response, Bahrain has sought to marginalize this influence through deepening strategic collaborations with Western partners—most notably Israel—as part of a broader effort to insulate its foreign policy from ideological pressures. 

In November 2023, Bahrain’s parliament issued a statement declaring the suspension of economic ties with Israel and the departure of the Israeli ambassador. However, this move was merely symbolic; foreign policy remains under the purview of the executive, and Bahrain has not formally abrogated the Abraham Accords. Instead, the government has adopted a nuanced approach: condemning violence on both sides, calling for a ceasefire, and emphasizing humanitarian assistance, while quietly maintaining strategic ties with Israel and the United States. 

This balancing act reflects Bahrain’s broader geopolitical calculus. Hosting the US Navy’s Fifth Fleet and participating in operations like Prosperity Guardian against Houthi threats, Bahrain remains closely aligned with Western security frameworks. Yet, it has also engaged in regional diplomacy, including communicating with Iran via Omani intermediaries, to mitigate domestic and regional backlash. 

Despite the political sensitivities, Bahrain’s relationship with Israel has yielded several tangible benefits across economic, strategic, and diplomatic domains. Since 2020, Bahrain and Israel have signed multiple bilateral agreements covering sectors such as technology, healthcare, tourism, and telecommunications. Direct flights and business exchanges have facilitated commercial ties, although the scale remains modest compared to the UAE-Israel corridor. Bahrain’s strategic positioning as a financial hub and its free trade agreement with the United States have made it an attractive partner for Israeli firms seeking Gulf access. 

The normalization has as well reinforced Bahrain’s role as a key US ally in the Gulf. With the Abraham Accords serving as a platform for regional security cooperation, particularly in maritime and cyber spheres, Bahrain’s participation in multilateral naval coalitions and its leadership in the US-led Combined Maritime Forces Task Forces underscore its strategic utility. 

Increased engagement with Israel has elevated the country’s diplomatic profile as well, positioning it as an Arab state willing to engage in pragmatic diplomacy. This has facilitated its inclusion in gatherings like the Negev Summit and enhanced its bilateral ties with the West. The normalization also provides Bahrain with leverage in shaping regional discourse on the Israeli-Palestinian conflict, advocating for a two-state solution while maintaining dialogue with all parties. 

The Comprehensive Security Integration and Prosperity Agreement (C-SIPA), signed in September 2023 between Bahrain and the United States, offers a blueprint for deepening regional integration. Structured around three pillars—defense and security, economics and trade, and science and technology—C-SIPA redefines traditional security cooperation by incorporating economic and technological dimensions. 

Bahrain’s navigation of the post-Abraham Accords landscape illustrates the complexities of small-state diplomacy in a polarized region. While domestic sentiment poses constraints, Bahrain’s leadership has pursued a pragmatic strategy that preserves strategic partnerships and economic opportunities. By building on frameworks like C-SIPA and expanding regional cooperation, Bahrain can reinforce its role as a bridge between Gulf pragmatism and Mediterranean integration—without abandoning its commitment to Palestinian rights or regional stability. 

Ahmed Khuzaie is an international political consultant, writer, essayist, and media commentator from Bahrain. He is the managing partner of the Washington-based political consultancy firm Khuzaie Associates LLC.

Morocco: ‘Pan-Abrahamism’ is crucial for the monarchy’s throne succession

To ensure the continuity of Morocco’s Alaouite dynasty, the ailing King Mohammed VI is gradually preparing his heir, Crown Prince Moulay Hassan, for a seamless succession. This effort translates into ambitious infrastructure and development initiatives, alongside strategic alliances with global powers to secure a lasting resolution to the Western Sahara dispute and cement the kingdom’s fate. Morocco’s 2020 re-normalization with Israel, brokered by the first Trump administration, should be viewed less as a diplomatic shift and more as a calculated move to position Rabat as a dependable pro-Western, pan-Abrahamic partner in North Africa—consolidating the future of the throne.

In his July 30 speech commemorating the twenty-sixth anniversary of his accession to the throne, it became undeniable that the Moroccan monarch is growing more feeble than ever. Mohammed VI, at sixty-two, has accumulated long periods of public absences and surgeries over the past decade, which have led to international speculation about his level of involvement in state affairs, despite local media cover-ups. In line with the Alaouite dynasty’s succession traditions since 1631, the current king has been gradually prepping and empowering the next monarch in line. Moulay Hassan, who recently turned twenty-one, is gradually being entrusted with more royal duties, meeting global leaders like Chinese President Xi Jinping, inaugurating major initiatives, and even being promoted to the rank of colonel-major in the Royal Armed Forces in July 2025—all signaling that the crown prince’s star is rising in key governance matters.

To reign over an ethnically and culturally diverse country like Morocco in a challenging regional and international context, the young prince needs to be surrounded by trustworthy and influential allies, hence the importance of joining the Abraham Accords’ newly forming bloc together with traditional allies from the “Arab monarchy club” like the United Arab Emirates, Bahrain, and Jordan—which are also looking for self-preservation by ensuring seamless succession for their kingdoms—along with influential players like the United States, Israel, and the European transatlantic community.

The Moroccan monarchy has survived for twelve centuries, and the Makhzen (the establishment) is wise enough to read the tea leaves and understand the profound geostrategic shifts that the region is undergoing after the 2024 collapse of the last of the pan-Arabist regimes in Syria. Alliances are being redefined, and narratives are being reimagined to provide a new ideological framework for the countries of the region, where a shared and integrated future is possible together with Israel. Similarly, the “Axis of Resistance” countries are gearing up proxies and client-states to shape the region in their own image, offering an anti-hegemonic alternative based on Iranian revolutionary Islamism and enabled by China and Russia, who increasingly challenge US unipolarity. While neighboring Algeria appears to align with old Cold War allegiances, showing an increased rapprochement with the axis, Morocco remains consistent with its post-World War II positioning and has chosen to strike a new pact with the Pan-Abrahamist clan.

Beyond this more existential zeitgeist, the Abraham Accords and the reestablishment of ties with Israel in December 2020 have yielded numerous benefits for both Rabat and Tel Aviv in the past five years. The two reconciled countries have never been closer at the military, intelligence, and economic levels despite the growing popular anti-normalization sentiment in Rabat amid the ongoing Gaza war.

October 7 sounded the alarm among Moroccan governing elites of what an Iranian proxy is capable of, especially with the growing rapprochement between Polisario militants in Western Sahara and Iran and its proxies. The kingdom’s appetite for Israeli-made weapons and security systems has grown in recent years as it found in Tel Aviv an evident partner with similar priorities and adversaries. So far, the Royal Moroccan Armed Forces have acquired three Israeli-made Heron drones, developed by Israel Aerospace Industries (IAI), for approximately $48 million. Additionally, they have purchased SkyLock Dome anti-drone systems for $500 million and Barak MX missile systems for another $500 million. Morocco is also poised to acquire a spy satellite from IAI in a $1 billion deal.

Since the tripartite agreement between the United States, Israel, and Morocco in 2020, in which the United States recognized Rabat’s sovereignty over the disputed Western Sahara territories in exchange for Israel and Morocco resuming diplomatic relations, the kingdom has become increasingly emboldened and achieved multiple consecutive foreign policy successes. Morocco, mainly thanks to the Accords, has moved from seeking international recognition for its national cause to de facto exercising sovereignty over Western Sahara. With the historical neutrality regarding Western Sahara of the former two colonizers of North Africa, France and Spain, reversed and support from key global actors like the United States, Israel, and the United Kingdom, in addition to multiple Arab and African countries, the incoming monarch can confidently ascend to power. Moulay Hassan will not have to worry that half of the territories of his kingdom are internationally contested, empowered with the vote of three UN Security Council members and the favorable momentum facilitated by his father’s long-term vision.  

The young prince will still have to defend Morocco’s strategic choices to side with pan-Abrahamism against revolutionary Islamism, particularly with his emotionally charged and largely pro-Palestinian population, which may favor regional pan-Arab and pan-Islamic sentiments over regional security and dynastic continuity. As the war in Gaza entered its second year, support for normalization with Israel dropped from 31 percent in 2021 to only 13 percent in 2024, according to the Princeton University Arab Barometer. While kingdoms with a millennial memory and an empire muscle see beyond isolated wars and conflicts, symbolic historical positions remain crucial for forging national unity and shaping public imaginaries—and Moulay Hassan will have to convince his citizens that he is a visionary leader who stands on the right side of history.

Sarah Zaaimi is a resident senior fellow for North Africa at the Atlantic Council’s Middle East programs, focusing on normalization and minorities in the region. She is also the center’s deputy director for media and communications.

Related content

Explore the program

The N7 Initiative, a partnership between the Atlantic Council and the Jeffrey M. Talpins Foundation, seeks to broaden and deepen normalization between Israel and Arab and Muslim countries. It works with governments to produce actionable recommendations to deliver tangible benefits to their people.

The post The Abraham Accords at five appeared first on Atlantic Council.

]]>
Trustworthy digital identities can set the standards for secure benefits provision in the US https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/trustworthy-digital-identities-can-set-the-standards-for-secure-benefits-provision-in-the-us/ Fri, 12 Sep 2025 13:00:00 +0000 https://www.atlanticcouncil.org/?p=871371 The proliferation of online services necessitates verifiable digital IDs globally. While they can improve convenience and reduce fraud in benefits provision, they raise privacy concerns and surveillance risks. This paper examines US digital identity challenges, analyzes EU and Japan implementations, and provides policy recommendations for responsible digital ID development in the US.

The post Trustworthy digital identities can set the standards for secure benefits provision in the US appeared first on Atlantic Council.

]]>

Table of contents

Introduction

The proliferation of public and private services online has necessitated the creation of verifiable and usable digital IDs globally. These electronic, reusable, and portable representations of identity can not only improve convenience for those accessing services but also reduce cost, waste, and fraud, especially when applied in the provision of benefits by federal and state authorities. Importantly, if designed with intention, they can improve access and enhance the inclusion of those with limited or no access to traditional and analog identities. Digital IDs also can be imbued with technological capabilities that both reduce the burdens on government providers and citizens and the privacy harms, especially to personal data, and enhance the security of our data ecosystem.

Digital identity is often fraught with controversy however due to implications for the privacy of individuals, both in the United States and elsewhere. It can spur new risks of state surveillance and cyberattacks, and lead to the exclusion of social groups. These harms are indeed serious and require clear governance standards for the responsible deployment of digital identity, strong provisions to protect consumer rights, and mechanisms to redress violations.

To that end, our paper is divided into three sections. In part 1, we begin with the stakeholders responsible for identity use and credentialing in the United States, followed by an overview of the landscape of benefits provision and its pain points, leading to an overarching assessment of the United States and its use of digital ID in benefits provision currently. In part 2, we look at Japan and the European Union (EU), which are slightly ahead in both their deployment of digital identities and governance frameworks that aim to ultimately impact global standards for digital identity. Given the lessons for the rollout of digital identity in Japan, the EU, and our initial US assessment, in part 3, we provide four key policy recommendations for the responsible development of digital identities for benefits provision in the United States.

Part 1: Identity in the United States

Citizens in the United States usually have multiple identity documents, issued by both state and federal authorities for various purposes such as access to public services, tax identification, and travel. In 2005, Congress passed the REAL ID Act, requiring state-issued identity cards like driver’s licenses to adhere to a similar format and convey the same information.1 Under this act, the Department of Homeland Security (DHS) was given federal authority to implement and enforce REAL IDs. In recent years, the DHS Transportation Security Administration (TSA), in partnership with states, has also introduced mobile driver’s licenses, which are verifiable at limited airports throughout the country.2 Other forms of verifiable credentials, such as ID.me, can link multiple federal and state agencies, such as the Internal Revenue Service (IRS) and the Social Security Administration (SSA), with private companies (such as those that provide health insurance) through one form of identity. In parallel, Login.gov is an another secure single sign on service developed by the General Services Administration (GSA) that allow users to access multiple government services using a single account.

Further analysis of seventy-two unique programs and services delivered by thirty-five High Impact Service Providers (HISPs) show a multitude of additional login options that are being used. Most notably, thirty programs and services require an applicant to call or email the agency as the only option available to access benefits. These findings highlight how there are still outstanding challenges to adopting digital identity and the increased citizen burden associated with navigating a fragmented landscape of technology options.

US benefits provision and improper payments

Benefits to individuals are the largest federal expenditure for the US government. By category, they amounted to the following in 2024: Social Security ($1,454 billion), Medicare ($1,031 billion), Medicaid/Children’s Health Insurance Program/Other Medical Care ($810 billion), Veterans benefits ($319 billion); and other benefits ($634 billion) (for Temporary Assistance for Needy Families, or TANF; Supplementary Security Income, or SSI; housing assistance; child tax credit, etc.)3 The SSA administers Social Security and SSI as well as Medicare enrollment.4 The Centers for Medicare and Medicaid Services (under the Department of Health and Human Services) oversees Medicare and Medicaid reimbursements. HHS also distributes TANF block grants.5 The US Department of Agriculture (USDA) funds the Supplemental Nutrition Assistance Plan (SNAP) and free/reduced lunch; the Department of Housing and Urban Development (HUD) provides funding for housing assistance; and the Department of Labor is responsible for unemployment insurance (UI), workforce development programs, and employment-related benefits.

In 2022, one in three Americans were enrolled in at least one public assistance program. Social Security and Medicare each cover 20 percent of Americans, and Medicare is the largest benefits program by enrollment,6 followed by SNAP (11.7 percent), and free and reduced lunch (8.8 percent).7 Beneficiaries of Medicare, Social Security, and the Department of Veterans Affairs benefits program interface directly with the federal government in benefits disbursal and access, but other forms of public benefits are mostly administered at the state level. All agencies are required to utilize direct deposits to transmit federal funds. However, there is some limited use of checks across benefits disbursal. Payment Processing Centers calculate benefits and process payments, but actual disbursal is conducted by Treasury payment systems.8

In July 2024, the Office of the Inspector General of the Social Security Administration released a report citing $71.8 billion in improper payments between Fiscal Year 2015 and FY 2022. This figure is less than 1 percent of all the benefits payments made by the SSA.9 More broadly, a study by the Government Accountability Office (GAO) estimated losses of $162 billion in improper payments across sixty-eight programs in 2024.10 This has come down from pandemic-period highs of $281 billion.11 Of the $162 billion in 2024, $85 billion were improper payments in Medicare and Medicaid.12 While this reflects self-reported improper payments, the GAO also estimates that the government loses between $233 billion to $521 billion annually to fraud and improper payments.13 While recommendations from the GAO have primarily included enhancing existing reporting, data sharing, and analytics to prevent fraud and improper payments, we explore the status of digital identities in benefits provision in the United States below; later in the paper, we explore  lessons learned in other jurisdictions.

Box 1: How the US government verifies digital identities

The National Institute of Standards and Technology developed the Identity Assurance Level (IAL) framework as part of its Digital Identity Guidelines to establish standardized requirements for verifying digital identities across federal agencies. IAL2, the intermediate level in this three-tier system, requires either remote or in-person identity proofing using evidence such as a state-issued photo ID, Social Security number verification, and additional authentication factors like phone numbers.

At its core, IAL2 ensures that there is sufficient evidence to support the existence of a claimed identity and to confirm that the “applicant” is its true owner. To achieve this, identity providers collect three types of data from the applicant: first, personal information (such as name, date of birth, and address); second, identity evidence (such as a photo ID); and third, a biometric factor (such as a fingerprint or live photo). The provider then validates that this information is consistent, authenticates the identity evidence, and verifies that the applicant is correctly associated with the claimed identity.

This standard was developed in response to the growing need for consistent and secure identity verification as government services moved online—particularly in the wake of high-profile data breaches and fraud incidents that exposed the vulnerabilities of ad hoc verification systems. The previous version of this guidance, NIST Special Publication 800-63-3, was withdrawn on August 1, 2025. The new and current guidance, SP 800-63-4serves as a critical benchmark for digital identity credibility in the United States, serving as the minimum standard for accessing sensitive government benefits and services. However, as this paper highlights, significant implementation challenges persist. For instance, the IRS has declined to adopt Login.gov due to concerns about IAL2 noncompliance, and twelve of twenty-one federal agencies have expressed similar concerns about the platform’s ability to meet these standards.

Sources: NIST, Digital Identity Guidelines, Special Publication 800‑63‑3, NIST, March 2, 2020, Withdrawn August 1, 2025, https://csrc.nist.gov/pubs/sp/800/63/3/upd2/final; ID.me Marketing Team, “What Is NIST IAL2 Identity Verification?,” ID.me Network, February 19, 2021, https://network.id.me/article/what-is-nist-ial2-identity-verification/; “Identity Verification,” in A Playbook for Improving Unemployment Insurance Delivery, New America, accessed July 24, 2025, https://improveunemployment.com/identity_verification/; and Treasury Inspector General for Tax Administration (TIGTA), Key Events of the IRS’s Planning Efforts to Implement Login.gov for Identity Verification, Report No. 20232S070fr, TIGTA, October 27, 2023, https://www.tigta.gov/sites/default/files/reports/2023-10/20232S070fr.pdf.

Using digital IDs for benefits in the United States

Login.gov (under the General Services Administration’s purview) is a government provided ID-verification service that allows approval of credentials across websites from various partner federal agencies. As of September  2024 (i.e., the end of FY 2024), Login.gov reported seventy-two million active users and 3.3 million identity-verified accounts at the Identity Assurance Level (two of three), or IAL2-level.14 Login.gov is used by over fifty agencies, most notably the VA and SSA. Enabling verification methods on a Login.gov account requires state-issued ID, a Social Security number (SSN), and a phone number. ID.me is a market-provided ID-verification service that is also used across various federal agencies in a similar capacity. In April 2025, ID.me had 145 million users, including seventy million IAL2‑verified individuals.15NIST provides the IAL as a guiding framework of digital identities in the United States. Both Login.gov and ID.me are considered to meet criteria for IAL2. The SSA accepts both Login.gov and ID.me as credentials for creating mySocial Security account. Through mySocial Security account, individuals can apply for benefits and manage their payments. While funded federally, Medicaid, TANF, SNAP, and housing assistance (among others) are administered at the state level and thus verification processes can differ substantially. ID.me’s single sign-on (SSO) service is used by Arizona as means of accessing a beneficiary’s AHCCCS (Arizona’s Medicaid provider) account. Similarly, various states allow the use of the ID.me-provided SSO to access unemployment insurance. This was a result of a boom in applicants during the COVID-19 pandemic. Use of the SSO service outside of housing benefits is very limited at the state level. Several states, such as Illinois, Colorado, and California, have centralized benefits under a common web portal.

Login.gov was widely implemented as a response to a 2017 federal mandate requiring agencies to implement an SSO platform for accessing an agency’s websites.16 While it has been widely adopted by federal agencies, there have been complaints and concerns about the service. While the IRS allows taxpayers to use ID.me to access services, it has not implemented Login.gov for services, citing Login.gov failure in meeting the IAL2 standard.17 The IRS uses the service at the IAL1 level, but recent data breaches continue to raise questions about the service’s security and reliability.

In a GAO investigation, nine of twenty-one participating agencies cited issues with Login.gov’s lack of fraud controls and visibility into authentications.18 Another twelve reported concerns over IAL2 noncompliance. The current director of GSA’s Technology Transformation Services has previously thrown his support behind Login.gov and hopes to “accelerate Login’s roadmap.”19

The above sections on the benefits provision, related fraud, waste, and abuse and the rollout of digitization lead to the following overarching assessment of the US model:

  • The federal government is an important player in the identity issuance, credentialing, verification, and data-management system. However, it does so in partnership with private players, and both sectors face similar vulnerabilities and risks, especially related to personal data transfer, storage, and use.
  • The identity landscape in the United States is highly fragmented across individual holders, issuers, and those that accept verifiable credentials. Multiple standards, both technological and regulatory, exist across states, agencies, and private issuers and verifiers of identities.
  • A related lack of interoperability and the failure to recognize that individuals often interact with different layers of the identity ecosystem lead them to be the least able to bear and use their own identity.
  • The costs of transition from analog to digital forms of identity are large but surmountable. They often do not include the frictions and delays associated with adoption by identity users and providers.
  • Improper payments are the biggest challenge for benefits service providers in the United States. Therefore, ID improvements in the provision of benefits need to be designed with the purpose of reducing improper payments and substantively impacting waste, fraud, and abuse.
  • The refinement of technology, including blockchain and privacy-enhancing technology (PET), presents new opportunities to create IDs that can be used across various functions and be linked to multiple verifiers. On the other hand, use of technology can also heighten the risk environment for identity holders and issuers and should be an important consideration when developing digital IDs.

The next section of this paper puts these assessments in context with the developments in the EU and Japan on digital identity.

Box 2: PETs vary in degrees of complexity, privacy protection

New forms of payments need to balance privacy concerns with both anti-money laundering and combating the financing of terrorism (AML/CFT) protocols and transaction efficiency in order to become a successful technology. Due to this, discussions of what to do with the data collected from digital ID processes can benefit significantly from an evaluation of privacy-enhancing technologies (PETs). Zero-knowledge proofs (ZKPs) are a computationally lightweight method of confirming that a transaction is valid and compliant with regulations without revealing any specific information about the content of the transaction using a mathematical proof (e.g., it is true that the user paid the full amount, but the amount is unspecified). Differential privacy (DP) is a method of obscuring individual activities by inserting noise into a dataset that includes information about the individual that still produces valid macro-level information. Multiparty computation (MPC) allows providers to jointly process personal information without a single party having complete information about an individual. DP and MPC are logistically complex methods, while all three promise a different extent of privacy.

Sources: “Zero-Knowledge Proof,” National Institute of Standards and Technology Computer Security Resource Center, https://csrc.nist.gov/projects/pec/zkproof. National Institute of Standards and Technology, “Guidelines for Evaluating Differential Privacy Guarantees,” NIST Special Publication 800-226, March 2025, https://csrc.nist.gov/pubs/sp/800/226/final.
“Multi-Party Computation (MPC) and Threshold Schemes,” National Institute of Standards and Technology Computer Security Resource Center, https://csrc.nist.gov/Projects/pec/threshold.

Part 2: Existing digital IDs in Japan and the EU

Japan launched its digital identity platform, the My Number Card (MINC), in 2016. The MINC features an integrated circuit chip that stores personal information and simplifies interactions with government and financial institutions, supporting services like social insurance applications, tax filings, job assistance, and bank-account setup. Since its launch, around a hundred million cards have been issued. The Digital Agency, established in 2021, also oversees the implementation and regulation of digital transformation initiatives, including digital ID systems.20 The cards themselves are issued by the Japan Agency for Local Authority Information Systems (which is jointly organized at the municipal and prefecture level).21

The European Digital Identity (EUDI) Wallet is a digital ID solution designed to enable EU citizens, residents, and businesses to securely identify themselves and verify personal information both online and offline. It builds on the foundation of the eIDAS (Electronic Identification, Authentication, and Trust Services) regulation.22 Developed by the European Commission, its main functions are cross-border recognition and harmonization. The European Commission is investing in four large-scale pilot projects to test and develop the wallet’s functionality.23 These pilots involve approximately 360 entities, including private companies and public authorities from twenty-six member states and Norway, Iceland, and Ukraine.24

Digital ID governance and implementation framework

Digital ID creation in both the EU and Japan follows a layer-based framework that consists of a highly centralized governance and implementation effort led by the federal authorities within the respective jurisdictions. The first layer is ID issuance by a government agency. The second layer is ID creation, governance, and implementation and comprises trust and verification intermediaries, such as providers of the personal ID, qualified electronic attestation of attributes, electronic seals, and other authentic sources. The third layer is entirely implementation based, consisting of “relying” on ID-accepting institutions, which are the private and public institutions that enable ID use. The fourth layer is made up of software and hardware. The final layer is made up of participants: In both cases below, these are individuals or small and medium enterprises holding digital IDs.

Outside this layer-based framework are the European Commission or Japan’s Digital Agency, respectively, along with supervisory and regulatory authorities, and various schemes for the governance of the trust layer.

Standards creation and gaps

EU’s eID framework is part of a larger packet of regulatory standard-setting action on data sovereignty and privacy. Japan is similarly aligned with its G7 presidency action plan for the free flow of data with trust and wider push for digitalization of services. Regulatory actions have emphasized privacy protection, data management and flow decisions, and ID harmonization/mobility/interoperability. Generally, across both jurisdictions, there is an emphasis on governance and assessment frameworks over technical standards on verification, privacy, and cybersecurity.

Additionally, the EU and Japan have established an MoU with each other for collaboration in exploring use cases and mutual recognition.25

Identity theft-based benefits

Across the EU, identity-theft-specific benefits fraud statistics are limited, but individual member states have published figures that provide useful context. In Finland, the Social Insurance Institution (Kela) reported 1,104 suspected benefit fraud cases in 2024 totaling €7.15 million—about 0.43% of all benefits paid, down from 0.45% in 2023 and 0.79% in 2020.26 While these figures cover all detected benefit fraud rather than identity-theft cases alone, Kela attributes part of the reduction to stronger digital verification, such as the national Incomes Register, which enables real-time income checks. Estonia, often cited as Europe’s digital identity pioneer, maintains low fraud rates through integrated verification across multiple government services. Although EU-wide identity-theft-specific data is not available, evidence from countries further along in the digital identity pathway, like Finland and Estonia, suggests that robust, integrated systems can help drive overall fraud down. The upcoming European Digital Identity (EUDI) wallet, set for implementation by 2026, could further standardize and strengthen verification measures across member states.

In Japan, fraudulent public assistance cases—including all forms from undeclared income to misrepresentation—account for less than 0.5% of total payouts.27 No public data isolates identity-theft-driven cases, and Japan’s reporting on fraud statistics is generally limited. While the My Number digital identity system is fully deployed, there is no evidence to confirm a measurable decline in identity-theft-specific benefits fraud.28 Digital identity systems can contribute to benefits fraud reduction, but effectiveness depends heavily on implementation quality, system integration, and supportive legal frameworks.

Use and expansion

The EU is still in the pilot phase. Meanwhile, 75 percent of the Japanese population (93.08 million citizens as of September 2024), has a My Number ID card.29 This uptake is in line with the growth of other digital services provided by the Japan Agency and with growth in favorable attitudes toward digitalization in Japan. This agency conducts annual assessments and evaluations of the system, and communicates expansion plans along with new use cases (e.g., entertainment, most recently) and community management.

Policy goals

Both jurisdictions are attempting two tiers of policy goals. On the ID user and holder level, the policy goals are associated with reducing administrative burden and time, enabling efficiency and reducing cost. The second tier of goals has to do with national digitalization priorities, built on actions to realize economic benefits from better use and management of private data and public services. In addition to this, the EU has a goal of ID harmonization and portability across its member states, in line with its long-term policy goal of integration.  

Putting these learnings from the EU and Japan in context with the overarching assessments in Part 1 of the paper, the next section provides policy oriented recommendations for the development of digital IDs for benefits provision in the United States.

Part 3: Policy recommendations for the United States

Given the lessons from the rollout of digital identity in the EU and Japan (Part 2), and with the context of the current use of digital identities in benefits provision in the United States (Part 1), we conclude this paper with appropriate policy recommendations to responsibly prompt the next generation of digital IDs in the United States. These recommendations, calibrated with appropriate regulations to protect the personal data of US citizens and residents, can effectively resolve existing friction in the use of digital identities in the United States, and enable the creation of an innovative ecosystem of financial products, ultimately positively impacting the financial health of the public sector, corporations, and individuals.

Policy goal 1: Incentivize private sector in the identity governance and implementation framework by creating a technology sandbox

There is an important aspect of incentivization in digital identity that drives its uptake among users and holders and broader deployment across a range of functions. Jurisdictions like the EU, Japan, and emerging markets like India, have each given a central role in this to the public sector, making access to public services the main incentive to drive ID use. The US private-sector-driven innovation model and strong foundations of individual privacy offer an alternative governance model, which can now be provided through the maturation of privacy-enhancing technologies. A governance framework should build on strong foundations for privacy, data management, as well as reciprocity and portability in digital ID for holders. Importantly, we recommend the creation of a public-private sandbox that can incentivize private-sector participants to test out new technologies and create models that address existing gaps and new risks in the cyber domain. The purpose of this sandbox should be to inform future technological and governance standards needs, reduce pain points of improper payments, and maximize digital ID deployment in the United States.

Policy goal 2: Create innovative, federated technological models that combine benefits delivery and digital identity

What is clear in our assessment of the EU and Japan is their global standards-setting ambition, largely seen in governance frameworks. Moreover, through regulatory actions they have been able to mandate interoperability requirements and have embraced verifiable credentials based digital identity technologies to address coordination challenges. To help further the state of the art, the United States has an opportunity to develop models for a federated technology stack for benefits delivery that integrates digital identity and novel payment solutions for use by the government and the private sector alike . This requires investment in research and development, especially incorporating new technologies for decentralization in pilot projects. Emerging regulatory clarity in digital assets can also inform these pilot projects and explore the feasibility of using self-hosted wallets and payment stablecoins.

Policy goal 3: Minimize ID based threat vectors in benefits disbursement

Part 1 of this paper puts into perspective the role of improper payments in benefits disbursal in the US, as well as the highly fragmented verification process used by US agencies and their private sector partners. This enables scaling of phishing attacks and other scams, with innovation by fraudsters outpacing security in our public infrastructure and private sector services. Quantifying the problem is difficult due to a lack of transparency about fraud attack data, which undermines public trust in both government and private sector services. Put in context with the lessons from the EU area digital ID roll-outs, we see a clear need for robust and integrated system of verifications, used across agencies, for a variety of end purposes. These should be aimed at reducing the duplication of efforts, beginning at the verification stage, as well as the costs associated with detection. Furthermore, law enforcement agencies and public benefit service providers should engage periodically to assess the continuously evolving threat landscape and create information sharing strategies that can help provide early indicators to inform mitigation options.

About the author

Ananya Kumar is the deputy director, Future of Money, at the GeoEconomics Center.

The author would like to thank Sanith Wijesinghe and Alisha Chhangani for their research and support on this paper. 

This work was supported by the MITRE Independent Research & Development Program

Related content

Explore the program

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

1    Transportation Security Administration, “About REAL ID,” May 2025, https://www.tsa.gov/real-id/about-real-id.
2    Transportation Security Administration, “REAL ID Mobile Driver’s Licenses (mDLs),” May 2025, https://www.tsa.gov/real-id/real-id-mobile-drivers-license-mdls.
3    Peterson Institute, “Chart Pack: Social Programs,” August 2025, https://www.pgpf.org/article/chart-pack-social-programs/.
4    USAFacts, “How Many People Receive Government Assistance?,” September 2024, https://usafacts.org/articles/how-many-people-receive-government-assistance/.
5    USAFacts, “How Many People?”
6    U.S. Census Bureau. “Social Safety Net Benefits.” Census.gov, 2024. https://www.census.gov/library/visualizations/interactive/social-safety-net-benefits.html.
7    U.S. Census Bureau. “Social Safety Net Benefits.” Census.gov, 2024. https://www.census.gov/library/visualizations/interactive/social-safety-net-benefits.html.
8    Jacob Leibenluft, “‘DOGE” Access to Treasury Payment Systems Raises Serious Risks,” Center on Budget and Policy Priorities, February 2025, https://www.cbpp.org/research/federal-budget/doge-access-to-treasury-payment-systems-raises-serious-risks.
9    Office of the Inspector General, “Preventing, Detecting, and Recovering Improper Payments,” Social Security Administration, July 2024, https://oig.ssa.gov/assets/uploads/072401.pdf.
10    Government Accountability Office (GAO), “Improper Payments: Information on Agencies’ Fiscal Year 2024 Estimates, March 2025, https://www.gao.gov/products/gao-25-107753#:~:text=For%20fiscal%20year%202024%2C%2016,concentrated%20in%20five%20program%20areas.
11    GAO, “Improper Payments.”
12    GAO, “Improper Payments.”
13    GAO, Fraud Risk Management: 2018-2022 Data Show Federal Government Loses an Estimated $233 Billion to $521 Billion Annually to Fraud, Based on Various Risk Environments, Report to Congressional Committees, April 2024, https://www.gao.gov/assets/gao-24-105833.pdf.
14    General Services Administration (GSA), “Increase Adoption of Login.gov: FY 2024 Q4 Progress Update,” Agency Priority Goal Report, GSA, September 30, 2024, https://assets.performance.gov/APG/files/FY2024/Q4/FY2024_Q4_GSA_Progress_Increase_Adoption_of_Login.gov.pdf.
15    ID.me, “Over 70 Million Americans Keep Themselves Safe by Verifying Their Identity Through ID.me as AI Fraud Accelerates,” ID.me Press Release, April 8, 2025, https://network.id.me/press-releases/over-70-million-americans-keep-themselves-safe-by-verifying-their-identity-through-id-me-as-ai-fraud-accelerates/.
16    Federal Cybersecurity Requirements, 6 U.S.C. § 1523, https://uscode.house.gov/view.xhtml?req=6+USC+1523:+Federal+cybersecurity+requirements.
17    US Treasury Inspector General for Tax Administration, “Key Events of the IRS’s Planning Efforts to Implement Login.gov for Taxpayer Identity Verification,” September 2023, https://www.tigta.gov/sites/default/files/reports/2023-10/20232S070f
18    GAO, “GSA Needs to Address NIST Guidance, Technical Issues, and Lessons Learned,” October 2024, https://files.gao.gov/reports/GAO-25-106640/index.html.
19    Natalie Alms, “Login.gov Is Key to Administration Anti-fraud Efforts, GSA Official Says,” NextGov/FCW (a unit of GovExec platform), March 2025, https://www.nextgov.com/digital-government/2025/03/logingov-key-administration-anti-fraud-efforts-gsa-official-says/403470/.
20    “Digital Agency,” Government of Japan, Digital Agency, September 2021, https://www.digital.go.jp/en.
21    “Individual Number Card (My Number Card),” Japan Agency for Local Authority Information Systems, March 2025, https://www.kojinbango-card.go.jp/en/.
22    “eIDAS Regulation,” Directorate-General for Communications Networks, Content and Technology, European Commission, May 2025, https://digital-strategy.ec.europa.eu/en/policies/eidas-regulation.
23    “EU Digital Identity Wallet Pilot Implementation,” Directorate-General for Communications Networks, Content and Technology, European Commission, February 2025, https://digital-strategy.ec.europa.eu/en/policies/eudi-wallet-implementation.
24    “EU Digital Identity Wallet Pilot Implementation.”
25    “Memorandum of Cooperation on Digital Identities and Trust Services to Implement Data Free Flow with Trust between the European Commission on behalf of the European Union and the Digital Agency of Japan,” Digital Agency, Government of Japan, April 2024, https://www.digital.go.jp/assets/contents/node/information/field_ref_resources/eea22370-19d8-4a1a-ae92-89e28476f9a1/7cda2879/20240501_news_moc_original_01.pdf.
26    Kela, Social Insurance Institution of Finland. “Annual Report on Benefit Fraud Cases 2024.” https://www.kela.fi/documents/d/guest/annual-report-on-benefit-fraud-cases-2024.
27    Nippon.com. “Financial Losses from Specialized Fraud Rise to ¥44 Billion in 2023.” March 28, 2024. https://www.nippon.com/en/japan-data/h01935/.
28    Ministry of Health, Labour and Welfare. “Main Fiscal Year 2023 Employment and Social Welfare System Changes.” April 2023. https://www.mhlw.go.jp/stf/seisakunitsuite/bunya/0000198659_00015.html.
29    “Results from the Perspective of Data: Progress of Digital Utilization in Society,” Digital Agency, Government of Japan, September 2024, https://www.digital.go.jp/en/policies/report-202309-202408/progress.

The post Trustworthy digital identities can set the standards for secure benefits provision in the US appeared first on Atlantic Council.

]]>
Private industry should step up to protect the global maritime order https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/private-industry-should-step-up-to-protect-the-global-maritime-order/ Thu, 11 Sep 2025 17:00:00 +0000 https://www.atlanticcouncil.org/?p=869913 Who should protect the global maritime order? While a growing number of countries have begun to violate maritime rules, the maritime sector has the opportunity, and an obligation, to help prevent further deterioration of the rules that underpin safe commerce and safe passage on the seas.

The post Private industry should step up to protect the global maritime order appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Safe oceans are indispensable for the functioning of modern economies.
  • Ocean safety is under severe strain, like the rest of the rules-based international order, not least because major nations actively undermine it.
  • The maritime industry is directly affected by the deterioration of the maritime order—as demonstrated, for example, by the continued growth of the shadow fleet—and should step up to protect it.

The global maritime order is an impressive but delicate construct. It depends on countries’ and companies’ willingness to abide by rules established through international treaties, even though violating them incurs only minor punishment, if any. In recent years, a growing number of countries have begun to publicly and repeatedly violate maritime rules. This poses the urgent question of who should protect the maritime order. The maritime sector—which is, by definition, dependent on the maritime order—can agree to create new rules, and such rules will likely become necessary. Clearly, corporate governance of the high seas cannot replace intergovernmental governance but, through smaller measures, the maritime domain’s different sectors can help prevent further deterioration of the maritime order.

A brief maritime history

“I am indeed lord of the world, but the Law is the lord of the sea. This matter must be decided by the maritime law of the Rhodians, provided that no law of ours is opposed to it.” This is how Emperor Justinian quotes, in 533, the first-century Emperor Antoninus on the matter of plunder following a shipwreck.1 The island nation of Rhodes, a maritime leader, had pioneered maritime rules later adopted by the Romans. Subsequent generations of rulers in Spain, Portugal, Sweden, and Italian city-states developed their own maritime rules, but these rules, naturally, covered only the waters the countries considered theirs.  

In 1609, the Dutch legal scholar Hugo Grotius advanced the new concept of the free seas: The oceans should be considered international territory, open to ships from all the world’s nations.2 The world’s nations, however, were not interested in establishing free sees, and danger continued to plague seafaring. The most successful trading nations were those that could protect their own shipping on the high seas. From the 1690s, Great Britain massively expanded its merchant shipping by investing significantly in the Royal Navy.3 This model proved exceptionally successful, but it was also costly. 

Indeed, by the beginning of the 1900s, it was clear to both the United Kingdom and other countries that individually protecting one’s merchant fleet was unsustainable and governments needed to agree on a basic set of rules to make the high seas somewhat safer for merchant shipping. The treaties, rules, and conventions that followed have allowed maritime operations to expand at a phenomenal rate. These are the International Convention for the Safety of Life at Sea (SOLAS), adopted in 1914; the International Convention on Civil Liability for Oil Pollution Damage (CLC), adopted in 1969; the Convention on the International Regulations for Preventing Collisions at Sea (COLRED), adopted in 1972; the International Convention for the Prevention of Pollution from Ships (MARPOL), adopted in 1973; the International Convention on Maritime Search and Rescue (SAR), adopted in 1979; and, of course, the United Nations Convention on the Law of the Sea (UNCLOS), which was adopted in 1982 and is considered the constitution of the oceans.4 The members of the International Maritime Organization (IMO) and International Labor Organization have adopted further rules, such as the International Safety Management Code, which de facto requires that shipping companies have a licence.5 

In addition, the shipping industry has introduced its own rules to further increase safety for those involved, and it regularly provides input to intergovernmental bodies. “There are many kinds of technical input: how the industry works, what kind of rules will work to ensure that the measures being planned are sensible and effective,” noted Svein Ringbakken, managing director of the maritime war-risk insurer DNK.6 “Governments and intergovernmental bodies don’t always have full insight into how things work, so on particular issues they consult industry. And within national delegations and international organizations like Intertanko, the International Chamber of Shipping and so on, industry representatives are regularly asked to provide input because they know the situation on the ground.” The undersea infrastructure, fishing, and oil and gas sectors—other key ocean operators—operate in the same manner. For example, the International Cable Protection Committee represents nearly all owners of undersea cables and issues rules for members to follow. 

These generations-long efforts made the oceans safer than ever before. In 2024, an estimated 403 seafarers died in connection with their work, including ninety-one men overboard. No comprehensive records exist from a century earlier, but anecdotal evidence suggests seafarer deaths around that time were tragically common.7 However, that trend toward more intergovernmental agreements and more safety on the high seas is reversing. 

‘Broken windows’ on the seas

As noted in previous reports by the Atlantic Council’s Maritime Threats initiative, compliance with maritime rules has decreased markedly in recent years and continues to do so. Russia’s use of the shadow fleet is only the latest example of a country violating maritime rules.8 (Exporting oil sanctioned by some countries does not violate maritime rules, but not using port state control to detain ships with multiple defects does. Port state control (PSC) “is the inspection of foreign ships in national ports to verify that the condition of the ship and its equipment comply with the requirements of international regulations and that the ship is manned and operated in compliance with these rules.”)9 Iran’s indirect support of the Houthis’ attacks on shipping in the Red Sea is another troubling development for the global maritime order, as is China’s maritime harassment of civilian vessels in the South China Sea. Beijing’s construction of artificial islands in the South China Sea, and its unilateral declaration of a “no-sail zone” in a part of the Yellow Sea where China’s exclusive economic zone overlaps with that of South Korea, are further examples of recent activities that undermine the global maritime order.10   

Like broken windows in a neighborhood, unaddressed maritime rule violations encourage further rule violations. As noted in a previous Maritime Threats report, proliferating rule violations risk creating two parallel maritime systems: one in which internationally agreed-upon rules apply and are obeyed by authorities and companies, and another one in which they no longer apply.11 The latter is also a world in which companies can save costs. For example, maintenance and repairs obligated by PSC inspections involve expenses, as does crew welfare. Operating in a minimum-rule environment will, however, cost them in the long run. 

That makes thwarting this trend a crucial task. The question is for whom. No nation can, on its own, shore up the maritime order; on the contrary, doing so must involve the rest of global maritime community acting collectively. This has been done before. When pirates plagued the waters off the Horn of Africa in the late 2000s, nations from around the world (including the United States, European Union (EU) countries, and China) successfully formed anti-piracy initiatives. Rooting out maritime violations by major nations is naturally a much more challenging undertaking, one that is made even more difficult by the fact that the United States—the default custodian of the global maritime order—has not ratified UNCLOS.  

In addition, to adopt measures such as greenhouse gas reduction agreements, the community of nations will likely need the support of China and other nations known to violate maritime rules. When the IMO Marine Environment Protection Committee met in London in April 2025 to negotiate and vote on an agreement to reduce the shipping sector’s greenhouse gas emissions, China voted in favor of the agreement, as did the EU’s member states, the United Kingdom, and a host of other nations, while the United States voted against it.12 A few days later, the United States unilaterally announced that it would allow seabed mining in international waters.13 The International Seabed Authority, an independent United Nations organ, does not (yet) permit seabed mining, and its secretary general has said that “any unilateral action would constitute a violation of international law and directly undermine the fundamental principles of multilateralism, the peaceful use of the oceans and the collective governance framework established under UNCLOS.”14 

In parallel with these developments, Russia’s invasion of Ukraine prompted Western governments (including the Joe Biden administration) to conclude that the maritime industry could be deployed to try forcing Russia to end the war. In December 2022, Western governments imposed a price cap of $60 per barrel on Russian oil. They considered the sanction especially potent because it didn’t just bar shipping companies based in the sanctioning countries from transporting the oil; it also barred Western protection and indemnity (P&I) insurers—which insure 90 percent of ocean-going tonnage—from insuring shipments above the cap.15 Because P&I coverage is required for all merchant vessels, the governments reasoned that Russa would not be able to sell its crude above the price cap and, thus, would be unable to raise large amounts of revenue to use in its war against Ukraine. The maritime insurance industry would shore up the rules-based international order where Western governments could not. The plan failed because Russia turned to the shadow fleet, undermining the maritime order in a way Western governments had assumed it would not.  

In a geopolitically flavored maritime development of a different kind, in April 2025 the US government issued a final notice in its 301 Investigation on “China’s Targeting the Maritime, Logistics, and Shipbuilding Sectors for Dominance.” The government announced actions that “will impose significant new port service fees on vessels that are owned or operated by China-linked entities, most vessels that were built in China but that are owned and operated by non-Chinese entities, and all foreign-built vehicle carriers.”16 Line Falkenberg Ollestad, an adviser at the Norwegian Shipowners’ Association, said that “puts the maritime sector in the middle of geopolitical rivalry. This is an industry that makes its decisions based on business efficiency, not geopolitical considerations. Now those worlds are colliding.”17 

She added: “Shipbuilding has become a new geopolitical hot topic. It’s unsurprising considering that countries have begun taking supply chains much more seriously, but frequently policymakers struggle to understand how the maritime industry works. The maritime industry is very adaptable, but the prime objective will always be to be as efficient as possible, which is why we have cost-effective global shipping. Striking that balance will be a core task for the maritime industry over the next decade.”18 

This state of affairs, in which geopolitical tensions co-exist with commercial links established during more harmonious times, exposes the maritime sector to a range of geopolitically linked risks and pressures (as detailed in previous Maritime Threats reports).19 The situation also has a less obvious upshot. With governments increasingly unable to reach international agreements, the maritime sector might have a better chance to reach global agreements. The maritime sector—which includes not just shipping but also ports, undersea infrastructure, and maritime insurance—might, in fact, be the world’s best chance at shoring up the crumbling maritime order precisely because it focuses on efficiency, which requires the high seas to be safe for commerce.  

The obvious question is how. Companies would naturally not be willing or able to negotiate sweeping conventions like UNCLOS, but they have potential to address more limited matters. For example, should IMO member states fail to adopt the greenhouse gas reduction agreement passed by the Environment Protection Committee, the shipping industry could conceivably agree on greenhouse gas emission rules without governmental involvement. To be sure, plenty of shipping companies have no interest in tackling climate change, but most know that their industry must bring down its share of global carbon-dioxide (CO2) emissions. “The shipping industry is split on the issue,” Ringbakken said. “In northern Europe, shipping companies are mostly on board with CO2 reductions, while elsewhere there’s less support, but by and large decarbonization of the shipping industry is moving ahead. Some of the largest companies are taking the lead, and leading customers are demanding CO2 reduction too.”20 Indeed, if European and other countries that are serious about CO2 reduction were to adopt stricter emission rules for ships calling at their ports, the global shipping industry would likely act pragmatically and adopt sector-wide rules.  

Could the oceans’ different industries—shipping, undersea infrastructure, and other maritime operations such as oil extraction—also negotiate and adopt other measures to ensure the high seas remain safe during a period in which the world’s nations are unlikely to reach any agreements? In other words, could the oceans’ practitioners become back-up protectors of the maritime order, the actors who step in when natural protectors—key nation-states—signal that they are not going to protect it? “When it comes to the risk of piracy, the maritime sector already has industry-wide standards,” Falkenberg Ollestad said.21 “On more complex issues, it becomes more difficult, but what the industry does agree on is the importance of navigational freedom. If countries were to begin challenging that, you could see the global shipping industry join forces to try to protect it.” Long before such a point is reached, the maritime industry’s different sectors could collectively adopt more standards and agreements on less complex issues such as greenhouse gas emissions or safer scrapping of vessels. 

Whether corporate intervention to protect the maritime order would be a desirable development is debatable, but this matters less than the fact that it might become inevitable. The global maritime order is only viable if a critical mass of actors honor it and introduce new measures that plug existing holes. As practitioners on the high seas, shipping companies, undersea-infrastructure companies, oil and gas companies, and others have an obvious interest in maintaining the maritime order.  

It would, of course, also be a risky development, as companies would be acting in a capacity otherwise mostly reserved for governments. Matters such as the definition of territorial waters and exclusive economic zones will, of course, always remain a matter reserved for nation states, as will interventions against rule breakers. By creating additional rules and standards, the maritime industry would build on the private sector’s well-established practice of creating industry-specific rules and standards beyond those contained in intergovernmental agreements. For example, the cable industry itself has established rules and procedures for the installation and repairs of undersea cables. 

Should the maritime order deteriorate to the point at which freedom of navigation is challenged—not just in a limited number of waters like the Red Sea but more widely—the global shipping industry could, for example, negotiate industry-wide rules to protect merchant vessels from attacks or collectively reroute from waters where freedom of navigation is not guaranteed. If the shipping industry were to collectively inform the Houthis that shipping through the Red Sea will be suspended unless the Houthis cease their attacks, this would send a powerful message because the Red Sea’s coastal states depend on at least some ships calling at their ports. 

One area that needs urgent attention is the security of undersea infrastructure: data cables, power cables, and pipelines. While NATO and Taiwanese authorities have increased their patrolling of undersea infrastructure following a string of suspicious cable incidents, governments will not be able to deter every potential saboteur. Data-cable owners could, for example, agree to take over each other’s traffic in situations where several cables have been damaged. (Cable owners typically install cables in pairs, with the twin cable taking over the damaged cable’s traffic in case of damage, but there is no arrangement covering traffic in cases where both cables are damaged.)  

This would naturally involve working with competitors; indeed, given intergovernmental authorities’ current weakness, companies’ efforts would be most productive if coordinated by industry bodies. The satellite industry offers a partial example collaboration in a similar vein. Satellite companies mutually report incidents via an industry-wide body, the satellite equivalent of drivers receiving warning of accidents ahead. They do so on the basis of trust, as each report goes to their competitors, and the service is crucial because it allows the satellite industry to operate as safely as possible. 

From companies’ perspectives, shoring up the maritime order would indisputably be an additional and unwanted burden. But because no one depends more on a functioning maritime order than the maritime industry itself, the maritime domain’s different sectors might find that taking on this additional task is preferable to watching the maritime order deteriorate further. 

Conclusion

The global maritime order is one the world’s most important intergovernmental achievements, and it is indispensable for the functioning of modern economies. However, like other parts of the rules-based international order, it is under severe strain, not least because major nations actively undermine it. Because the maritime industry is directly affected by the deterioration of the maritime order—as demonstrated, for example, by the continued growth of the shadow fleet—it is in the industry’s interest to protect the maritime order where governments can no longer reach agreements.

About the author

Featured project

Threats to the global maritime order

Learn more about the Atlantic Council’s project Threats to the global maritime order: Protecting the freedom of the seas.

Related content

Explore the program

The Transatlantic Security Initiative aims to reinforce the strong and resilient transatlantic relationship that is prepared to deter and defend, succeed in strategic competition, and harness emerging capabilities to address future threats and opportunities.

1    Nicholas Joseph Healy, “Maritime Law,” Britannica, last visited July 23, 2025, https://www.britannica.com/topic/maritime-law.
2    Knud Haakonssen, “The Free Sea,” Liberty Fund, 2004, https://scholar.harvard.edu/files/armitage/files/free_sea_ebook.pdf.
3    James Davey, “British Mercantile Trade and the Royal Navy During the Long Eighteenth Century,” British Online Archives, January 10, 2025, https://britishonlinearchives.com/posts/category/contextual-essays/856/british-mercantile-trade-and-the-royal-navy-during-the-long-eighteenth-century.
4    Elisabeth Braw, “From Russia’s Shadow Fleet to China’s Maritime Claims: The Freedom of the Seas Is under Threat,” Atlantic Council, January 23, 2025, https://www.atlanticcouncil.org/in-depth-research-reports/report/from-russias-shadow-fleet-to-chinas-maritime-claims-the-freedom-of-the-seas-is-under-threat/#treaties.
6    Interview with the author, July 3, 2025.
7    “Global Register of Fatalities at Sea: Experimental Data Collection,” International Labour Organization, April 7–11, 2025, https://www.ilo.org/sites/default/files/2025-04/STCMLC-2025-Information%20document-EN.pdf.
8    Elisabeth Braw, “The Threats Posed by the Global Shadow Fleet—and How to Stop It,” Atlantic Council, December 6, 2024, https://www.atlanticcouncil.org/in-depth-research-reports/report/the-threats-posed-by-the-global-shadow-fleet-and-how-to-stop-it/; Elisabeth Braw, “From Russia’s Shadow Fleet to China’s Maritime Claims: The Freedom of the Seas Is under Threat,” Atlantic Council, January 23, 2025, https://www.atlanticcouncil.org/in-depth-research-reports/report/from-russias-shadow-fleet-to-chinas-maritime-claims-the-freedom-of-the-seas-is-under-threat/.
9    “Port State Control,” International Maritime Organization, last visited August 10, 2025, https://www.imo.org/en/ourwork/msas/pages/portstatecontrol.aspx.
10    “South Korea Says Concerned by China’s ‘No-Sail Zone’ in Overlapping Waters,” Korea Herald, May 24, 2025, https://www.koreaherald.com/article/10494664.
11    Braw, “From Russia’s Shadow Fleet to China’s Maritime Claims.”
12    Elisabeth Braw, “The World Needs a Maritime ‘Elite League’ to Combat Rogue Shipping,” Atlantic Council, June 5, 2025, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/the-world-needs-a-maritime-elite-league-to-combat-rogue-shipping/.
13    “Statement on the US Executive Order: ‘Unleashing America’s Offshore Critical Minerals and Resources,’” International Seabed Authority, April 30, 2025, https://www.isa.org.jm/news/statement-on-the-us-executive-order-unleashing-americas-offshore-critical-minerals-and-resources/; “Unleashing America’s Offshore Critical Minerals and Resources,” White House, April 24, 2025, https://www.whitehouse.gov/presidential-actions/2025/04/unleashing-americas-offshore-critical-minerals-and-resources/.
14    Tom LaTourrette and Douglas C. Ligor, “New Turmoil in Regulating Deep Seabed Mining on the High Seas,” Modern Diplomacy, April 27, 2025, https://www.rand.org/pubs/commentary/2025/04/new-turmoil-in-regulating-deep-seabed-mining-on-the.html.
15    “Collectively Stronger: New International Group Chair,” International Group of P&I Clubs, last visited July 23, 2025, https://www.igpandi.org/.
16    Ian Saccomanno, Earl Comstock, and Gregory Spak, “USTR Issues Final Section 301 Actions in China Shipbuilding Investigation” White & Case, May 12, 2025, https://www.whitecase.com/insight-alert/ustr-issues-final-section-301-actions-china-shipbuilding-investigation.
17    Interview with the author, July 9, 2025.
18    Interview with the author, July 9, 2025.
19    Braw, “The Threats Posed by the Global Shadow Fleet—and How to Stop It”; Braw, “From Russia’s Shadow Fleet to China’s Maritime Claims.”
20    Interview with the author, July 3, 2025.
21    Interview with the author, July 9, 2025.

The post Private industry should step up to protect the global maritime order appeared first on Atlantic Council.

]]>
DFC 2.0: A blueprint for a bigger, faster and more strategic agency https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/dfc-2-0-a-blueprint-for-a-bigger-faster-and-more-strategic-agency/ Thu, 11 Sep 2025 12:00:00 +0000 https://www.atlanticcouncil.org/?p=873489 With the DFC’s reauthorization this year, Congress and the Trump administration have an opportunity to refine the tools, deepen partnerships, and expand expertise in order to make the investments at the scale and with the flexibility needed to strengthen US national security and enhance global competitiveness.

The post DFC 2.0: A blueprint for a bigger, faster and more strategic agency appeared first on Atlantic Council.

]]>

Bottom lines up front

  • The DFC’s current impact is hindered by outdated policies, risk aversion, complex procedures, and equity limitations, all of which restrict its ability to mobilize private capital and take on high-impact, high-risk investments— particularly in critical sectors like minerals needed to compete with China.
  • Key policy recommendations for a “DFC 2.0” include granting the agency greater operational flexibility (e.g., higher lending cap, expanded project eligibility), establishing volunteer “deal ambassador” networks to overcome workforce constraints, launching a “Business Corps” for international commercial diplomacy, and streamlining equity scoring and fund management processes.
  • Success for DFC 2.0 will require cultural change within the agency to embrace risk, celebrate innovation, coordinate more closely among U.S. government agencies, and rapidly scale its presence and influence—both domestically and globally—to better counter China and advance U.S. national security and economic interests.

Foreword

As Donald Trump’s second term as president of the United States unfolds, African decision-makers are closely watching the deployment of his new trade policy, trying to identify potential opportunities for Africa under the “America First” agenda. In addition to the issue of migration, it seems that he wants to focus his strategy on Africa with a policy of “trade, not aid.” However, beyond rhetoric, the key question is how to mobilize the necessary commercial tools. Following the abolition of USAID, trade instruments are now under scrutiny, particularly the US International Development Finance Corporation (DFC), which is awaiting reauthorization by Congress. On the continent, this shift is being monitored with a mixture of caution—as a transactional approach could neglect local development needs—and optimism because Africa has long awaited access to capital, investment, and infrastructure. Now it also awaits access to the global value chains that the new American approach promises.

For decades, the United States has lagged its competitors such as China, India, Turkey and, more recently, the United Arab Emirates. These countries have used state-owned enterprises or concessional financing to secure key resources and capture market share.

While American companies deemed Africa too risky, companies from other nations were constructing ports, railways, mines, and digital networks, thereby gaining political influence and financial returns. Today, Africans hope that the Trump administration’s desire to refocus US trade strategy on strategic competition will finally trigger the long-awaited flow of US private investment, particularly in high-growth, high-impact sectors such as energy, agriculture, digital infrastructure, and the industrial processing of minerals.

The “DFC 2.0” project embodies this reorientation. It plans to increase the agency’s lending ceiling from $60 billion to $250 billion, establish a $3 billion revolving equity fund, streamline bureaucracy, and encourage risk-taking in order to stimulate investment.

Although this transformation is primarily driven by US economic and security interests, it cannot succeed without addressing Africa’s urgent needs. If implemented wisely, it could lead to mutually beneficial relationships, with projects that secure American supply chains while creating African jobs, industrial capacity, and tax revenues.

For African leaders, this new policy represents a strategic opportunity where traditional aid has failed to deliver the desired results. If the DFC finances the initial stages and risky projects that private investors were reluctant to support, these countries could establish their economies in future industries while supplying the United States and its allies.

However, African stakeholders remain clearheaded: Promises must be kept. The DFC has historically been perceived as slow and risk-averse, much to the frustration of entrepreneurs and governments eager to take actions. Africans will expect a DFC 2.0 to break with this culture, focusing instead on innovation, speed, and local partnerships. They hope for US support not only to extract resources, but also to develop local industries, build skills, and modernize infrastructure. Simply extracting raw materials for US supply chains without creating local value would be a missed opportunity for them. With a population of 1.4 billion people, many of whom are young, and largely untapped markets, Africa offers the United States not only resources, but also resilient allies, dynamic consumers, and innovative entrepreneurs.

Africans expect US embassies, trade missions, and financial institutions to collaborate closely with their governments and the private sector rather than operating independently from Washington.

The reauthorization of the DFC will therefore be a decisive test. If the United States mobilizes its immense capital markets, technologies, and expertise to co-construct African growth, it will advance its strategic objectives and strengthen African aspirations. If it fails, others will fill the void. As Trump’s America redesigns its trade tools, Africa watches with cautious hope, ready to seize opportunities, but determined to ensure that this time, the partnership will be truly reciprocal.


Rama Yade
Senior Director, Africa Center
Senior Fellow, Europe Center
Atlantic Council 

Related content

In partnership with

Explore the program

The Africa Center works to promote dynamic geopolitical partnerships with African states and to redirect US and European policy priorities toward strengthening security and bolstering economic growth and prosperity on the continent.

The post DFC 2.0: A blueprint for a bigger, faster and more strategic agency appeared first on Atlantic Council.

]]>
Spyware blasts: Strict liability for abnormally dangerous activities https://www.atlanticcouncil.org/in-depth-research-reports/report/spyware-blasts-strict-liability-for-abnormally-dangerous-activities/ Wed, 10 Sep 2025 18:35:55 +0000 https://www.atlanticcouncil.org/?p=872496 This report explores the possibility of bringing cases related to spyware abuses under strict liability for abnormally dangerous activities in California and the UK.

The post Spyware blasts: Strict liability for abnormally dangerous activities appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Journalists, members of civil society, human rights defenders, and others who have been targeted with spyware face numerous obstacles in holding those responsible accountable for abuses.
  • Efforts to enact binding regulation are slow and only apply to future behavior, leaving an accountability gap for past and ongoing abuses that litigation may help fill.
  • This report explores one theory of civil liability that has yet to be tested in spyware cases: strict liability for abnormally dangerous activities.

Table of contents

Executive summary

More than twenty countries have signed on to the nonbinding Pall Mall Process Code of Practice for States since it was launched in April 2025 by the United Kingdom (UK) and France.1 Its focus is to “tackle the challenges posed by the proliferation and irresponsible use of commercial cyber intrusion capabilities (CCICs).”2 CCICs encompass a broad array of tools, including spyware—a kind of malicious software that allows “unauthorized remote access to an internet-enabled target device” for surveillance and/or data extraction.3 One of the pillars of the Code of Practice for States is accountability, under which countries are encouraged to establish or apply national frameworks to regulate the “development, facilitation, purchase, transfer, and use of” spyware.4

Establishing new domestic frameworks or even analyzing which existing national or international frameworks apply to spyware-related activity will take significant time, likely years. Meanwhile, new instances of spyware abuses against journalists and other human rights defenders continue.5 It is therefore not surprising that the Code of Practice for States also recommends measures to incentivize responsible activity, encourage the use of export control and licensing frameworks, and provide support for victims.6 It is on one such measure for victim support that this report focuses: “procedures for those claiming redress as a result of the irresponsible use of CCICs, including ensuring access to effective judicial or non-judicial remedies.”7 Specifically, this report explores how existing tort law relating to abnormally dangerous activities in the United States and the UK could provide a ground for bringing cases related to spyware abuses.

Tort law allows individuals to take accountability into their own hands, which is especially important when processes to enact binding obligations on actors involved in developing and selling spyware can take years and there is no guarantee they will be successful. However, tort law differs by country and, within the United States, even by state. This makes research difficult and, at a larger scale, inconsistent. Additionally, litigation is very resource intensive both in terms of money and time and governments are typically shielded from civil liability. It is simply not possible for every victim of a spyware abuse to bring a case against the actor(s) responsible. In that sense, it is not recommended to rely exclusively on tort law for accountability, but to use it as a supplementary measure while continuing to pursue parallel efforts at regulation.

With that framing, this report looks at the possibility of bringing cases under strict liability for abnormally dangerous activities in California and the UK. These two jurisdictions were chosen because of the similarities in their legal systems, the fact that civil cases have been brought in California against spyware developers, and since the UK is one of the countries that launched the Pall Mall Process. The author is not aware of any previous cases brought under this theory of liability with respect to spyware. Given the six-factor definition of abnormally dangerous activities in California, the fact that a court decides whether an activity qualifies, and recent developments regarding jurisdiction over foreign defendants and significant damages awards, it could be possible, although still difficult, to bring a case there under this theory related to spyware harms. The development of the same doctrine in the UK, however, cautions against attempting this novel argument there. For UK plaintiffs, more research is needed on alternative grounds under tort.

Recommendations

From these findings, several recommendations to different stakeholders can be distilled.

Targeted individuals:

  • Seek digital security and advocacy support from credible organizations (like Access Now).
  • Think carefully about costs, toll on mental health, risks to safety and security, and other risks posed by engaging in litigation. Consult a qualified legal representative about all these aspects. 

Lawyers:

  • Provide pro bono research and representation to targeted individuals.
  • Collaborate with lawyers in other jurisdictions to address the transnational nature of harms.
  • Collaborate with researchers and civil society groups investigating and engaging in advocacy around the misuse of spyware to better understand the complexities, risks, and other aspects of litigation.

Civil society, academia, research institutes:

  • Carry out scoping research on different jurisdictions, legal and policy measures, and investigative techniques, among other topics, to advance the knowledge base and reduce the burden on legal teams and victims.

Donors:

  • Provide funds for scoping research on possible grounds for investigations and cases.
  • Provide adequate, multiyear financial support for litigation likely to involve substantial costs and take years; provide support for defending against Strategic Lawsuits against Public Participation (SLAPPs).
  • Provide funds for technical forensic analysis.
  • Provide convening spaces for civil society and experts working on spyware accountability.

Policymakers:

  • Do not preempt lawsuits through regulation.
  • Do not shield spyware developers or other actors involved in abuses from liability.
  • Enact anti-SLAPP legislation to protect victims, researchers, and civil society advocates from retaliation.
  • Continue multilateral efforts to enact binding regulation, advance norms, and pursue various accountability measures.

Introduction: Why tort law?

Much attention has been paid to how civil liability might apply to harms caused by artificial intelligence (AI) while very little has been paid to the same question for spyware-related harms, despite obvious similarities.8 These are technologies sold predominantly by private sector entities, governments are often customers, and people can be harmed despite having never engaged with the technology themselves. As such, many of the arguments in favor of and against using civil liability to address AI harms are equally persuasive with respect to spyware.

For example, the point that it would be “unwise” to completely rely on AI companies to self-regulate and forego other methods of controlling their behavior is especially poignant in the case of the commercial spyware industry.9 Spyware abuses have been extensively documented by journalists and civil society.10 Governments have publicly demanded accountability and are working toward binding obligations through the United Nations and multilateral efforts like the Pall Mall Process.11 As experts have pointed out regarding AI, regulation is controversial and difficult to design effectively.12 Additionally, international processes take years and regulation has its limits, so tort law can fill part of the gap.13 Even more importantly, civil liability could be “less vulnerable to industry capture than regulation,” even with resource imbalances between powerful companies and individuals.14

The Whatsapp app logo can be seen on the display of a smartphone on September 2, 2025. WhatsApp is an instant messaging service that was founded in 2009 and has been part of Meta Platforms since 2014. Matthias Balk/dpa via Reuters Connect

Of course, there are drawbacks to civil cases. Differences across jurisdictions reveal an “inconsistent patchwork”;15—reliance on juries’ interpretations of the law makes it difficult to predict the outcome of any given case;16 and these cases will require technical expertise to prove cause and responsibility, something not all judges and juries may be well prepared to handle.17 Additionally, not all actors responsible for causing AI- or spyware-related harms can be held liable in civil courts. Governments, specifically, generally enjoy immunity before foreign civil courts.18 Lastly, civil cases themselves take many years and such delay may not result in incentives that change behavior.19 The WhatsApp v. NSO Group case, for example, was originally brought in October 2019 and reached a jury verdict in May 2025, almost six years later.20

There is no doubt that civil litigation takes time and resources. But as national and international efforts to design and implement regulation of spyware continue, which will apply only to future conduct and violations, it is important to take advantage of accountability measures available now. Despite the near six-year journey, the jury in the WhatsApp v. NSO Group case did award over $167,000000 in punitive damages and over $400,000 in compensatory damages.21 While NSO did appeal this award, which adds time and uncertainty to the case, the award is nevertheless significant.22 Litigation should not replace regulatory or other accountability efforts but should be pursued in parallel to fill existing impunity gaps. With that framing, this report explores one theory of liability that has yet to be tested in spyware cases: strict liability for abnormally dangerous activities.

Methodology

The author of this report engaged in desk research. She consulted materials like legal opinions, legal analyses, academic articles, news reports, and outputs from civil society organizations. She consulted practitioners and received pro bono research assistance on legal questions specific to California and the UK. The author selected the United States and the UK as the jurisdictions for this report due to their governments’ track records in taking active measures or calling for accountability for spyware abuses. Because tort law in the United States varies by state, a further selection needed to be made as a fifty-state survey is beyond the scope of this project. California was selected as several spyware-related civil cases have already been filed there and it is the principal place of business for a number of technology companies that sell products often exploited by spyware companies.

Scenario

The objective of this report is to show how the concept of liability for abnormally dangerous activities could apply to the development, sale, and use of spyware. To make this content as widely accessible as possible, the report presents a fictional fact pattern and subsequently explores how the law could apply in such a case.

Fictional fact pattern

Disclaimer: While inspired by real events, all the characters, organizations, and incidents portrayed in this section are entirely fictional and solely for illustrative purposes.

Characters:

  • Olympus Technologies: A spyware company based in Israel that produced the spyware Delphi. Olympus Technologies maintains that it only sells to governments for law enforcement purposes and that it does not work with governments that have poor human rights records.
  • Marie: An investigative journalist working for Journalists FR (JFR), an international newspaper based in France.
  • Pablo: A US citizen, residing in California, and correspondent for JFR in the United States.
  • Iris: A human rights advocate and barrister working for Justice Unlimited, a UK-based human rights organization.
  • Law & Legal, LLP: A US-based firm specializing in plaintiff-side civil law claims with offices in the UK.

Incident: An unknown government agency contracts Olympus Technologies to conduct surveillance using Delphi on certain targets it claims are involved in illegal activity. While not confirmed, it is suspected that Olympus Technologies collaborates closely with governments that hire it, providing advice and support (e.g., selecting the appropriate exploit based on the intended target’s behavior and devices).

Marie and Pablo suspect they were targeted by spyware due to their investigative work on human rights abuses and government corruption in several countries. Given the increase in spyware use against journalists, they contact an independent forensic expert who has previously worked with other journalists and human rights defenders. This forensic expert examines their phones and laptops and finds that their devices were infected with Delphi numerous times over a six-month period. It is not clear which government targeted them.

Marie and Pablo realize their sources and confidential information have been compromised. These sources stop collaborating with Marie and Pablo, fearing for their own and their families’ safety. Marie and Pablo then approach Iris, a barrister at Justice Unlimited in the UK, for assistance. Shortly after, Iris discovers that she too has been targeted by Delphi after working with Pablo and Marie. Delphi exposes her communications with Marie and Pablo and with other human rights defenders across the world. After being notified by Iris, these contacts, also fearing for their safety, tell Iris they are concerned about their joint projects with Justice Unlimited, many years in development and some of which involve privileged and confidential legal materials.

Iris, Pablo, and Marie purchase new devices and change their contact information. Marie and Pablo ask Iris to get legal advice on how to proceed, hoping to engage in litigation or criminal investigation in at least one of the countries in which they reside.

Seeing the lawyers

Iris reaches out to Law & Legal, LLP, a US firm with offices in the UK that she has worked with before. They tell Pablo, Iris, and Marie they can explore civil claims in the United States and the UK. However, they are not familiar with French national law or European Union law and so advise them to seek local counsel there. Additionally, they cannot provide advice on criminal cases. Sophia and Winston, lawyers in California and London, first explain that their firm will take this case on pro bono, for free, but if the court allows, they will try to recover attorney fees. Theirs is a midsize firm that can afford to offer services for free to certain clients but cannot absorb all the costs of multiyear litigation. Through this structure, if possible, they could recover some reasonable costs if they win. The lawyers also encourage Pablo, Iris, and Marie to see if their contacts in civil society organizations or other larger firms would be willing to join the case as co-counsel.

The lawyers emphasize there is no guarantee any case against Olympus Technologies will be successful. A case could be dismissed at the jurisdictional phase and never reach the merits stage where the actual conduct is judged. Even if a case does make it to the merits stage, it could take years and go through numerous appeals. There is also no guarantee that a judge or jury would rule in their favor. Proceeding with a case would require a lot of time and energy from Pablo, Iris, and Marie. They may have to testify or appear for depositions. They will have to find and provide evidence to support their case. They will need to convince experts to testify or produce documentation. They may be forced to share their devices and other sensitive information for examination. Information regarding their contacts, colleagues, or family members may be revealed in discovery.

Outside the courtroom, there is likely to be significant media attention, which may draw scrutiny on their personal lives, including accusations of being criminals or terrorists. Further, there are additional risks that they, their families, and the legal team could be targeted with spyware again. This can significantly interfere with someone’s ability to work and spend time with family, and can have severe negative impacts on mental health. The lawyers encourage Pablo, Iris, and Marie to think carefully about the risks to themselves, their families, their colleagues, and other vulnerable contacts before deciding to pursue litigation.

Iris is already familiar with all these risks and discusses them with Pablo and Marie. They decide it is worth it to pursue a case. Sophia and Winston then have several meetings to discuss options. Civil claims can be filed under many grounds, but tort law could cover what happened to them. A tort is either an action or an omission that results in harm to a person or to property.23 Tort law is different in the United States (where Pablo lives) and the UK (where Iris lives), and in the United States it differs by state.24 Within tort, there is an option that has yet to be tested in spyware cases: strict liability for abnormally dangerous activities (sometimes referred to as ultrahazardous activities). It exists both in the United States and the UK but has developed differently in these countries.

California

Why strict liability?

Sophia explains that while there are certainly difficulties in presenting a novel application like this for spyware harms, strict liability has significant benefits compared with negligence-based torts. For strict liability, there is no need to prove that a duty has been owed or breached or that the defendant had any intent to cause harm.25 Essentially, plaintiffs need to prove only that a defendant carried out an abnormally dangerous activity, that the plaintiff has been harmed, that the harm was the kind of harm that is a foreseeable consequence of the activity, and that the defendant’s carrying out of the activity was a substantial factor in causing the harm.26 Further, there is no predetermined approved list of abnormally dangerous activities; courts decide on a case-by-case basis, which allows for more flexibility.27

What is the test for abnormally dangerous activities?

Sophia explains to Iris, Marie, and Pablo that strict liability for abnormally dangerous activities in California means that if a person or entity engages in an activity that is considered especially dangerous, they will be liable for harm occurring to a person, land, or property caused by such activity. This recognizes that some activities are so inherently dangerous to others that even when taking the utmost care and reasonable precautions, the risk from these activities cannot be eliminated.28 Courts in California have a six-factor test to determine when an activity is abnormally dangerous: 1) whether there is a significant risk of harm to person, land, or chattel (property that is not land); 2) there is a chance that great harm could result from this risk; 3) the risk cannot be eliminated by exercising reasonable care; 4) whether the activity is one of common usage; 5) whether it was appropriate to carry out that activity in the place it was carried out; and 6) whether the societal value to carrying out this activity is outweighed by its risks.29

Typically, these cases have focused on physical or property harms from activities like handling and transporting explosives, fumigating, testing rocket motors, drilling for oil, and using open flame equipment near combustible materials.30 These examples are clearly very different from spyware. It would be a highly novel approach to argue spyware is an abnormally dangerous activity and there is no guarantee of success. In a recent case in New York, which serves only as an example in California courts and is not binding, a court using the same six-factor test ruled that a lab’s research on viruses in China could not be classified as an abnormally dangerous activity because while the virus they were studying was itself very dangerous, it was possible for the researchers to take reasonable care to mitigate the risks associated with their investigation.31

For any novel application, whether the doctrine would apply is a fact-specific question. But, while it may be unlikely and other attempts to expand the doctrine like that in New York have failed, it is not impossible. The main question that the court would have to decide is whether the risk inherent in spyware development and use is so unusual and impervious to mitigation measures that it would justify imposing strict liability on harms resulting from it even if carried out with reasonable care.32

Dynamite explosions blast rock mass at a phosphate mine in Mdhilla, Tunisia, February 15, 2019. REUTERS/Zoubeir Souissi

Spyware versus typical abnormally dangerous activities

Sophia highlights that blasting with explosives, often described as the classic abnormally dangerous activity, has parallels to spyware use. First, the defendant engages in the activity for their own benefit and “is almost certainly aware of the dangers associated with” the activity.33 Olympus Technologies develops and sells spyware to governments for profit. Numerous rights organizations and journalists have revealed lucrative contracts between the company and its government clients in the millions of dollars. These investigations also revealed many cases where these governments used Delphi to target journalists, environmental activists, members of the political opposition, and human rights defenders. The targeting was either justified on overly vague security grounds with no specific illegal conduct cited or simply not justified at all. Other spyware companies even terminated similar contracts with governments after investigations showed other instances of this, demonstrating that there is wide awareness in the sector of how some governments, democracies and autocracies alike, use (and abuse) this technology.

Second, an activity like blasting “is likely to cause harm … even though the defendant adopts all reasonable precautions in the course of conducting the … activity.”34 That is because “even when all reasonable care is exercised,” blasting is still dangerous, making it “an activity whose dangerousness is ‘inevitable’ or ‘inherent.’”35 There are important technical and operative questions about what kind of mitigation measures, if any, a spyware company could take to prevent abuses of its technology in its contractual relationships to governments. At least for the time being, one can reasonably infer that preemptive measures to mitigate the risk of harm are either not available or not feasible from a business perspective given that other similarly situated companies have cancelled contracts in response to abuses, a measure that happens only after the harm is caused. Additionally, given the extent of investigations into abuses of this technology by governments and with new instances being reported so frequently, there is an argument to be made after so much evidence that targeting individuals beyond legitimate law enforcement purposes is not a bug but a feature of the technology as currently developed and sold.

Last, a “special feature that distinguishes blasting” is that it “causes harm essentially on its own, without meaningful contribution from the conduct of the victim or of any other actors.”36 In the classic blasting scenario, the injured victim “is a passive, uninvolved third party” who simply owns property nearby or is walking by when injured.37 The passivity of the victims in the case of spyware abuses is beyond dispute, especially individuals who are targeted merely for being related to or otherwise in contact with the primary targets or whose private information is exposed as a result of someone else being targeted. Delphi uses a zero-click approach, meaning the person targeted literally does nothing and their device is still infected (they do not need to click on a link or visit a suspicious website, for example). Iris, Marie, and Pablo simply did their jobs and went about their lives as normal. Additionally, private conversations with and information about their contacts and colleagues were exposed as they had been held on Iris, Marie, and Pablo’s devices.

The more difficult part to establish is whether the harms are inherent to the normal use of the spyware technology, or if governments, a third actor, are responsible for improper uses. For example, in cases relating to guns, courts in the United States have held that the possession of a dangerous instrument does not “create automatic liability when a third party takes that instrumentality and uses it in an illegal act.”38 Sophia explained that gun cases are different because US law grants immunity to gun manufacturers, and even then, there is an exception to that immunity for aiding and abetting illegal activity.39 Spyware developers do not enjoy such immunity in the United States in the first place, so this obstacle would not apply. Further, there is credible evidence that Olympus Technologies is not completely removed from its government clients’ activity after it licenses Delphi. Instead, it chooses exploits based on the government’s targets and provides active technical support and assistance in the targeting at the direction of the government clients.

Who can be sued and on what basis?

Even if spyware can be classified as an abnormally dangerous activity, there are other requirements that must be met to bring a case. Only certain kinds of harms give grounds to sue—a plaintiff must show the harm is of a legally protected interest. The model California jury question sheet for ultrahazardous activities covers past and future economic losses for categories like lost earnings, lost profits, medical expenses, and similar monetary losses.40 It also covers noneconomic losses like physical pain and/or mental suffering.41For Pablo, Marie, and Iris, this could mean costs incurred for replacing their devices, costs incurred for therapy and other medical expenses, unpaid time off work, and expected similar future costs. For example, some journalists lose their jobs as a result of loss of trust from sources. Other victims experience being shut out or ignored by friends and family who are afraid to talk to them after finding out they are under surveillance.

Further, a person or entity that engages in an abnormally dangerous activity will be held liable to anyone injured only as a proximate result of the activity, regardless of what precautions or measures are taken to mitigate the risk.42 This is what is known as causation. Proximate cause, as defined in the California civil jury instructions for strict liability for ultrahazardous activities, requires that the harm the plaintiff suffered “was the kind of harm that would be anticipated as a result of the risk created” by the activity in question and that the defendant’s carrying out of the specific activity “was a substantial factor in causing” plaintiff’s harm.43 Essentially, the reason the harm occurred has to be foreseeable and has to play a significant role in causing the harm. For spyware, having your lunch companion’s wallet stolen at a restaurant near your lawyer’s office would not be covered. The lunch companion is not someone whose device was targeted, plus the choice of restaurant and presence of a thief are too far removed in the causal chain and not the kind of harm that can reasonably be expected from spyware targeting.

Who can bring a case in California?

Iris, Marie, and Pablo express concern that all of them live in different countries and that Olympus Technologies is headquartered in another country. Sophia acknowledges that establishing jurisdiction over a defendant that is not in California is complicated—they must show that California out-of-state jurisdiction can apply to the defendant and that this is consistent with due process, that is, that the defendant has “minimum contacts” with the state.44 One way to show minimum contacts is to prove the defendant is “at home” in the state, meaning a corporation’s principal place of business is there, for example.45 That is not the case for Olympus Technologies. It has no offices or personnel in California, or even the United States, and does not conduct business or ever travel there.

However, it might be possible under specific jurisdiction if the defendant has directed activities at residents there, if the case relates to activities in the state, and if exercising personal jurisdiction would be reasonable.46 Because Pablo lives in California, his device was targeted while physically located in California, and there is the possibility that the targeting used exploits in products produced by companies that have servers in California. While this does not cover Marie and Iris, because they were targeted at the same time, likely for working together, it is possible to join their cases. There is one important caveat here, however. Ultrahazardous activity claims are state law tort claims, but Olympus Technologies, as a foreign defendant, could seek to move the case to federal court instead. This means that federal procedural law would govern the case, but California law on torts governs substantive issues relating to what must be proven.47 Additionally, any challenge to jurisdiction is decided according to state law even if removed to federal court.48

There have now been several cases brought against Israeli spyware company NSO Group in California. In WhatsApp v. NSO Group, NSO Group tried to dismiss the case on forum non conveniens, among other grounds.49 Under this doctrine, even when a court does have jurisdiction, it can still dismiss a case if another country also has jurisdiction and it would be more convenient for the parties to litigate there.50. It is the defendant who must prove that there is an adequate alternative forum and that the balance of private factors (such as residence of the parties, location of witnesses, access to physical evidence, costs of trial, and others) and public factors (like local interest in the case and burden on local juries) is in their favor.51

A man walks past the logo of Israeli cyber firm NSO Group at one of its branches in the Arava Desert, southern Israel July 22, 2021. REUTERS/Amir Cohen

Since NSO Group, like Olympus Technologies, is based in Israel, that was the alternative forum considered in that case. The court ruled, as many others have, that Israel is an adequate alternative forum.52 That is unlikely to change. Regarding residence of the parties and witnesses, the split in that case was somewhat similar to the one here: The plaintiffs and their witnesses reside in California while the defendant and its witnesses reside in Israel.53 The case here would be more complicated by the fact that Marie is in France and Iris is in the UK. Regarding costs, for plaintiffs costs would be less in California and for defendants they would be less in Israel, so that was not a determining factor.54 On local interest in the lawsuit, NSO Group argued that Israel’s interest “substantially” outweighed California’s, but the plaintiffs argued that “California has an interest in providing a means of redress to tortiously injured citizens.”55 The court ruled that both California and Israel had substantial interests, and “at most” this factor only “slightly” favored defendants.56WhatsApp, 2023 U.S. Dist. LEXIS 204928, at *10.57 Additionally, the case against NSO Group was brought under US federal and California state law, meaning a California court would be far more familiar with it.58 In the end, most factors were neutral and the only one that was strong, a California court’s familiarity with California state and US federal law, favored plaintiffs, so the court denied the motion to dismiss.59 That analysis would be very similar in Pablo, Iris, and Marie’s case.

Sophia highlights another case, one featuring individual victims: Dada v. NSO Group, a case brought by journalists from a news organization in El Salvador who alleged their iPhones (produced by Apple, a California company) had been targeted by NSO Group with Pegasus.60 In that case, none of the plaintiffs lived or worked in California, most were located in El Salvador, but one was a US citizen and two were US residents.61 The trial court granted NSO’s request to dismiss the case on forum non conveniens grounds in March 2024.62 In July 2025, however, that decision was overturned on appeal.63

The appeals court explained that when plaintiffs are both foreign (from another country) and domestic (US citizen or resident), the domestic plaintiff’s choice of where to bring the case is still heavily favored and the presence of the foreign plaintiffs does not dilute that.64 If a domestic plaintiff brings a case somewhere they do not live, they are still entitled to more deference than someone who is foreign but less deference than someone that lives there.65 Because Pablo is a California resident, he would receive the highest level of deference on his choice of forum and the presence of Marie and Iris would not lessen that. Sophia explains that the appeals decision is unpublished, so they could not cite to it in any future brief, but they could cite the same established cases the appeals court relied on.66

What kind of redress is possible?

Regarding damages, Sophia explains that money damages are available for compensation, that is, to cover actual and future expenses. Punitive damages are available if the activities involve malice, oppression, or fraud.67 For example, in the WhatsApp v. NSO Group case, the jury awarded the plaintiff over $400,000 in compensatory damages and over $167,000,000 in punitive damages.68 But Sophia cautions them not to jump to damages yet. Their case faces an uphill battle and there is no guarantee it will reach a jury or that a jury would even issue punitive damages. The defendants may even offer a settlement. Seeing their vehement reaction, Sophia observes that while they may be against a settlement now, if they are still involved in litigation ten years later, they may feel differently. The important thing to focus on at this stage is, knowing the possibilities, whether the possible risks to them as individuals, including the time and mental health toll, are worth it.

UK

Iris, Marie, and Pablo also meet with Winston, hoping to see whether bringing a case in the UK could be better for them; after all, that is where Iris lives. Winston explains that, unfortunately, when it comes to abnormally dangerous activities, it does not appear that such a case would be successful in the UK due to differences in the development of the doctrine in the two countries over time.

It was a UK case, Rylands v. Fletcher, in which water burst from a reservoir a defendant had built and caused damage on nearby property, that is often cited as the origin of the doctrine on strict liability for ultrahazardous activities.69 However, unlike in the United States, the English judiciary has over time drastically narrowed the scope of applicability of this kind of action to cases typically involving a defendant who is “a land occupier engaging in a land-based activity” and a plaintiff who is “usually a neighboring land occupier complaining about harm to land or structures.”70 Such a strict focus on land and danger based on something “escaping” from the defendant’s property to that of another, thus causing physical harm, severely limits the kinds of cases that can be brought under this theory.71

It is apparent even just from this basic definition that spyware-related cases would be very unlikely to succeed. For example, even ignoring the elements regarding land, it is hard to argue that spyware “escapes” when it is specifically directed at an individual. Additionally, English courts have limited the kinds of damages that can be recovered in these cases to damages to property.72 Plaintiffs likely could not recover damages for death or personal injury.73 Lastly, it seems English courts feel that strict liability for abnormally dangerous activities is better dealt with by lawmakers in Parliament rather than through the courts, demonstrating a reluctance to expand the doctrine.74 Given the difficulties, including in what kind of damages can even be recovered, Winston advises them to not pursue a case based on strict liability for abnormally dangerous activities in the UK. He says he would carry out further research to see what kinds of other cases could be more productive in the UK.

Conclusion

Pursuing accountability for spyware abuses is an ongoing challenge. Efforts centered on creating binding regulation and international norms led by states are commendable, but cannot be considered the only path forward. Civil liability plays an important gap-filling function that should be pursued in parallel. As recent cases have demonstrated, while litigation is difficult and resource-intensive, and has a significant impact on the lives of victims and survivors who initiate it, it also offers the possibility of bringing actors responsible for abuses to court, exposing abusive practices, and offering some kind of redress.

Civil liability offers many avenues and strict liability for abnormally dangerous activities is only one possibility. If successful, it could provide significant benefits to possible plaintiffs such as reducing the burden of proof and the number of elements that must be shown. However, as the report shows, even the same theory of liability is applied differently by courts in different jurisdictions. While in California the theory appears to be more promising as a novel legal recourse, the same cannot be said for the UK. Nevertheless, any novel approach to expand an existing legal doctrine carries significant risk but the information herein can help better inform such decisions. As spyware abuses continue to be documented, and regulatory efforts drag on, it is imperative to explore avenues for accountability available now. This report contributes to that dialogue by proposing a theory that has yet to be tested and exploring the possible opportunities and drawbacks to help shape future legal strategies.

Acknowledgements

This report would not have been possible without the support of the Spyware Accountability Initiative and the pro bono research assistance provided by Christopher Hart and his team at Foley Hoag LLP, Langie Cadesca, Katherine Jung, and Gilleun Kang. The author also thanks colleagues at the Strategic Litigation Project for research assistance and the following individuals for providing thoughtful feedback: Nadine Farid Johnson, Celeste Kmiotek, Natalia Krapiva, Jen Roberts, Nushin Sarkarati, and Nikita Shah. All errors are the author’s own.

About the author

Lisandra Novo is senior law and tech advisor for the Atlantic Council’s Strategic Litigation Project.

Related content

Explore the program

The Atlantic Council’s Strategic Litigation Project injects fresh thinking into how governments and practitioners can apply legal tools to advance human rights and democracy around the world.

1    Foreign, Commonwealth & Development Office, The Pall Mall Process Code of Practice for States, April 25, 2025, https://www.gov.uk/government/publications/the-pall-mall-process-code-of-practice-for-states/the-pall-mall-process-code-of-practice-for-states.
2    Foreign, Commonwealth & Development Office, The Pall Mall Process Code of Practice for States, April 25, 2025, https://www.gov.uk/government/publications/the-pall-mall-process-code-of-practice-for-states/the-pall-mall-process-code-of-practice-for-states.
3    Jen Roberts et al., Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and Its Threats to National Security and Human Rights, Atlantic Council, September 4, 2024, https://www.atlanticcouncil.org/in-depth-research-reports/report/mythical-beasts-and-where-to-find-them-mapping-the-global-spyware-market-and-its-threats-to-national-security-and-human-rights/.
4    Foreign, Commonwealth & Development Office, The Pall Mall Process Code of Practice for States.
5    See, e.g., Lorenzo Franceschi-Bicchierai, “Researchers Confirm Two Journalists Were Hacked with Paragon Spyware,” Tech Crunch, June 12, 2025, https://techcrunch.com/2025/06/12/researchers-confirm-two-journalists-were-hacked-with-paragon-spyware/; Kate O’Flaherty, “Apple Issues New Spyware Attack Warning to iPhone Users,” Forbes, May 1, 2025, https://www.forbes.com/sites/kateoflahertyuk/2025/05/01/apple-issues-new-spyware-attack-warning-to-iphone-users/; “Serbia: Authorities Using Spyware and Cellebrite Forensic Extraction Tools to Hack Journalists and Activists,” Amnesty International, press release, December 16, 2024, https://securitylab.amnesty.org/latest/2024/12/serbia-a-digital-prison-spyware-and-cellebrite-used-on-journalists-and-activists/.
6    Foreign, Commonwealth & Development Office, The Pall Mall Process Code of Practice for States.
7    Foreign, Commonwealth & Development Office, The Pall Mall Process Code of Practice for States.
8    See, e.g., Matthew van der Merwe et al., “Tort Law and Frontier AI Governance,” Lawfare, May 24, 2024, https://www.lawfaremedia.org/article/tort-law-and-frontier-ai-governance; Gabriel Weil, “The Limits of Liability,” Institute for Law & AI, August 2024, https://law-ai.org/the-limits-of-liability/; Ketan Ramakrishnan et al., U.S. Tort Liability for Large-Scale Artificial Intelligence Damages: A Primer for Developers and Policymakers, RAND Corporation, August 21, 2024, cf. Tim Bernard, “Legal and Policy Responses to Spyware: A Primer,” Tech Policy Press, June 16, 2025, https://www.techpolicy.press/legal-and-policy-responses-to-spyware-a-primer/; Asaf Lubin, “Unpacking WhatsApp’s Legal Triumph over NSO Group,” Lawfare, January 7, 2025, https://www.lawfaremedia.org/article/unpacking-whatsapp-s-legal-triumph-over-nso-group.
9    van der Merwe et al., “Tort Law and Frontier AI Governance.”
10    See, e.g., “About the Pegasus Project,” Forbidden Stories, July 18, 2021, https://forbiddenstories.org/about-the-pegasus-project/; “The Predator Files: Caught in the Net,” Amnesty International, October 9, 2023, https://www.amnesty.org/en/documents/act10/7245/2023/en/.
11    Foreign, Commonwealth & Development Office, The Pall Mall Process Code of Practice for States; United Nations General Assembly, “Draft Final Report of the Open-Ended Working Group on Security of and in the Use of Information and Communications Technologies 2021-2025,” A/AC.292/2025/CRP.1, July 11, 2025, https://docs-library.unoda.org/Open-Ended_Working_Group_on_Information_and_Communication_Technologies_-_(2021)/Letter_from_OEWG_Chair_10_July_2025.pdf.
12    van der Merwe et al., “Tort Law and Frontier AI Governance.”
13    van der Merwe et al., “Tort Law and Frontier AI Governance.”
14    van der Merwe et al., “Tort Law and Frontier AI Governance.”
15    United Nations Special Rapporteur on the Promotion and Protection of Human Rights and Fundamental Freedoms while Countering Terrorism, “Global Regulation of the Counter-Terrorism Spyware Technology Trade: Scoping Proposals for a Human-Rights Compliant Approach,” April 2023, https://www.ohchr.org/sites/default/files/documents/issues/terrorism/sr/2022-12-15/position-paper-unsrct-on-global-regulation-ct-spyware-technology-trade.pdf, 6.
16    Ramakrishnan et al., U.S. Tort Liability for Large-Scale Artificial Intelligence Damages: A Primer for Developers and Policymakers, 8.
17    van der Merwe et al., “Tort Law and Frontier AI Governance.”
18    Weil, “The Limits of Liability.
19    van der Merwe et al., “Tort Law and Frontier AI Governance.”
20    Lorenzo Franceschi-Bicchierai, “Eight Things We Learned from WhatsApp vs. NSO Group Spyware Lawsuit,” Tech Crunch, May 30, 2025, https://techcrunch.com/2025/05/30/eight-things-we-learned-from-whatsapp-vs-nso-group-spyware-lawsuit/.
21    Lorenzo Franceschi-Bicchierai, “NSO Group Must Pay More than $167 Million in Damages to WhatsApp for Spyware Campaign,” Tech Crunch, May 6, 2025, https://techcrunch.com/2025/05/06/nso-group-must-pay-more-than-167-million-in-damages-to-whatsapp-for-spyware-campaign/.
22    Suzanne Smalley, “NSO Appeals WhatsApp Decision, Says It Can’t Pay $168 Million in ‘Unlawful’ Damages,” Recorded Future News, June 2, 2025, https://therecord.media/nso-group-appeals-jury-award-168million-; Raphael Satter, “Court Clash between Meta and NSO Ends in $168 Million Defeat for Spyware Firm,” Reuters, May 6, 2025, https://www.reuters.com/sustainability/society-equity/court-clash-between-meta-nso-ends-168-million-defeat-spyware-firm-2025-05-06/.
23    “Introduction to Tort Law,” Congressional Research Service, May 26, 2023, https://www.congress.gov/crs-product/IF11291.
24    “Introduction to Tort Law,” Congressional Research Service, May 26, 2023, https://www.congress.gov/crs-product/IF11291.
25    American Law Institute, “Strict Liability,” in Restatement of the Law Third, Torts: Liability for Physical and Emotional Harm (American Law Institute Publishers, 2010), vol. 1, §§ 1–36, 228-29.
26    Judicial Council of California Civil Jury Instructions (2025), CACI No. 460 (“Strict Liability for Ultrahazardous Activities—Essential Factual Elements”), 371.
27    Luthringer v. Moore, 31 Cal. 2d 489, 496 (1948).
28    Jasso v. Citizens Telecomms. Co. of Cal., Inc., No. S-05-2649, 2007 U.S. Dist. LEXIS 54866, at * 10–11 (E.D. Cal. July 30, 2007); Pierce v. Pac. Gas & Elect. Co., 166 Cal. App. 3d 68, 85 ( 1985).
29    Jasso, 2007 U.S. Dist. LEXIS 54866, at *10–11.
30    SeeGreen v. Gen. Petroleum Corp., 205 Cal. 328, 333–34 (1928);Luthringer, 31 Cal. 2d at 500; Smith v. Lockheed Propulsion Co., 247 Cal. App. 2d 774 (1967); Balding v. D.B. Stutsman, Inc., 246 Cal. App. 2d 559, 564 (Ct. App. 1966); McKenna v. Pac. Elec. Ry. Co., 104 Cal. App. 538, 542–43 (1930);Garcia v. Estate of Norton, 183 Cal. App. 3d 413 (1986).
31    Matter of Jones v. New York City Tr. Auth., No. 034252, 2023 N.Y. Misc. LEXIS 51267, (N.Y. Sup. Ct. Sept. 14, 2023).
32    Gjovik v. Apple Inc., No. 23-cv-04597, 2024 U.S. Dist. LEXIS 90231, at *48 (N.D. Cal. May 20, 2024).
33    American Law Institute, “Strict Liability,” 233.
34    American Law Institute, “Strict Liability,” 233.
35    American Law Institute, “Strict Liability,” 233-34.
36    American Law Institute, “Strict Liability,” 234.
37    American Law Institute, “Strict Liability,” 234.
38    Bridges v. Parrish, 742 S.E.2d 794, 798 (N.C. Ct. App. 2013).
39    See León Castellanos-Jankiewicz, “SCOTUS Rules for Gun Manufacturers in Mexico Suit but Denies Blanket Immunity,” Just Security, June 23, 2025, https://www.justsecurity.org/114981/scotus-gun-manufacturers-mexico/.
40    Judicial Council of California Civil Jury Instructions (2025), VF-407 (“Strict Liability—Ultrahazardous Activities”), 420-21.
41    Judicial Council of California Civil Jury Instructions (2025), VF-407 (“Strict Liability—Ultrahazardous Activities”), 420-21.
42    Pierce, 166 Cal. App. 3d at 85.
43    CACI No. 460, 371.
44    Vast Vantages, LLC v. Bhandari, No. 2:21-cv-04896, 2021 U.S. Dist. LEXIS 220379, at *2–3 (C.D. Cal. 2021); Int’l Shoe Co. v. Wash., 326 U.S. 310 (1945).
45    Goodyear v. Brown, 564 U.S. 915, 919, 924 (2011); Daimler AG v. Bauman, 571 U.S. 117, 122 (2014).
46    Vast Vantages, LLC, 2021 U.S. Dist. LEXIS 220379 at *3–4.
47    US Constitution Annotated, “Art III.S2.C1.16.6 State Law in Diversity Cases and the Erie Doctrine,” Congress.gov, n.d., https://constitution.congress.gov/browse/essay/artIII-S2-C1-16-6/ALDE_00013246/, last accessed July 18, 2025.
48    DaimlerAG, 571 U.S. at 125.
49    WhatsApp Inc. v. NSO Grp. Techs. Ltd., No. 19-cv-07123, 2023 U.S. Dist. LEXIS 204928 (N.D. Cal. Nov. 15, 2023).
50    WhatsApp, 2023 U.S. Dist. LEXIS 204928, at *3
51    WhatsApp, 2023 U.S. Dist. LEXIS 204928, at *3–4.
52    WhatsApp, 2023 U.S. Dist. LEXIS 204928, at *5.
53    WhatsApp, 2023 U.S. Dist. LEXIS 204928, at *5-6.
54    WhatsApp, 2023 U.S. Dist. LEXIS 204928, at *8.
55    WhatsApp, 2023 U.S. Dist. LEXIS 204928, at *10.
56    
57    
58    WhatsApp, 2023 U.S. Dist. LEXIS 204928, at *10.
59    WhatsApp, 2023 U.S. Dist. LEXIS 204928, at *12.
60    See “Dada v. NSO Group,” Knight First Amendment Institute at Columbia University, n.d., https://knightcolumbia.org/cases/dada-v-nso-group, last accessed July 18, 2025.
61    Dada v. NSO Grp. Techs. Ltd., No. 3:22-cv-07513 2024 U.S. Dist. LEXIS 41261, at *2 (N.D. Cal. Mar. 8, 2024); Dada v. NSO Grp. Techs. Ltd., No. 24-2179, 2025 U.S. App. LEXIS 16647, at *3 (9th Cir. July 8, 2025) (unpublished).
62    Dada, 2024 2024 U.S. Dist. LEXIS 41261.
63    Dada, 2025 U.S. App. LEXIS 16647.
64    Ibid, *4.
65    Ibid, *5.
66    Cal. R. Ct. 8.1115.
67    Frye v. Martinez Refin. Co. LLC, No. 24-cv-04506, 2024 U.S. Dist. LEXIS 229576, at *9, (N.D. Cal. Dec. 16, 2024) (citing Cal. Civ. Code § 3294(a)).
68    Franceschi-Bicchierai, “NSO Group Must Pay More than $167 Million in Damages to WhatsApp for Spyware Campaign.”
69    American Law Institute, “Strict Liability,” 232.
70    American Law Institute, “Strict Liability,” 233.
71    See, e.g., Stannard (t/a Wyvern Tyres) v. Gore, [2012] 3 EGLR 129 (summarizing the rule from Rylands); Union of India v. Prabhakaran Vijaya Kumar and Others,[2009] 2 LRC 13.
72    Read v. J Lyons & Co Ltd, [1946] 2 All ER 471, 475-76.
73    Transco plc (formerly BG plc and BG Transco plc) v. Stockport Metropolitan Borough Council, [2004] 4 LRC 314, 24. Cf. Perry v. Kendricks Transport Ltd, [1956] 1 All ER 154, 161.
74    See, e.g., Cambridge Water Co. Ltd v. Eastern Counties Leather plc, [1994] 1 LRC 619.

The post Spyware blasts: Strict liability for abnormally dangerous activities appeared first on Atlantic Council.

]]>
Mythical Beasts: Diving into the depths of the global spyware market https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/mythical-beasts-diving-into-the-depths-of-the-global-spyware-market/ Wed, 10 Sep 2025 10:00:00 +0000 https://www.atlanticcouncil.org/?p=871810 The second edition of the Mythical Beasts project assess how the global spyware market has developed and changed over the past year.

The post Mythical Beasts: Diving into the depths of the global spyware market appeared first on Atlantic Council.

]]>

Introduction

Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous capability—spyware.1 Spyware’s danger stems from its acute contribution to human rights abuses and national security risks. Most recently, NSO Group, a notorious spyware vendor known to have contributed to the surveillance of journalists, diplomats, and civil society actors across the globe, was fined $168 million in punitive damages by a US court for targeting WhatsApp’s infrastructure with Pegasus spyware. This most recent case reasserts the threat of spyware proliferation to national security and human rights. These risks and harms, coupled with a lack of market transparency, demand ongoing attention to the market’s structure and how actors circumvent accountability.

As highlighted in the 2024 report by the Atlantic Council’s Cyber Statecraft Initiative, Mythical Beasts and where to find them: Mapping the global spyware market and its threats to national security and human rights, spyware vendors often operate in complex networks of holding companies, investors, suppliers, and partners to obfuscate their business operations, making it difficult for policymakers to curb the misuse and proliferation of these capabilities.

Report

Sep 4, 2024

Mythical Beasts and where to find them: Mapping the global spyware market and its threats to national security and human rights

By Jen Roberts, Trey Herr, Nitansha Bansal, and Nancy Messieh, with Emma Taylor, Jean Le Roux, and Sopo Gelava

The Mythical Beasts project pulls back the curtain on the connections between 435 entities across forty-two countries in the global spyware market.

Cybersecurity

The Mythical Beasts dataset helped expose the global market for spyware through 2023. Since then, there has been significant global policy action to combat the proliferation and misuse of spyware tools—for example, the Pall Mall diplomatic initiative, sanctions on key individuals and organizations, and visa restrictions. Given these vital policy developments, the authors sought to assess how the global spyware market has developed and changed since the first edition of the Mythical Beasts project. Public and private sector momentum to address the market necessitated an empirical update to the dataset, as well as an inquiry into how the spyware market has evolved through 2024.

Therefore, in this update, the authors evaluated whether the 435 entities present in the original dataset were operational in 2024, updating the data accordingly. In this report, the authors also sought to uncover any historical entities not previously identified in the first Mythical Beasts report (i.e., looking further back than 2024). And lastly, they identified new entities entering the market during 2024. Findings in the second edition of this project, Mythical Beasts: Diving into the depths of the global spyware market, constitute the best possible sample of data that the authors have been able to gather. That data should be treated as a snapshot of the market through to 2024 (as opposed to representing the spyware market in its entirety). Nonetheless, it is a critical window into the market. These findings demonstrate that the global market for spyware is growing and evolving, presenting new challenges to policymakers to curb the proliferation and misuse stemming from it.

In total, this edition of the Mythical Beasts project 2025 surveys 561 entities across forty-six countries from 1992 to 2024. One hundred and thirty new entities were identified and added to the dataset, of which forty-three are new entities established in 2024. A few highlights of this new data include:

  1. The addition of twenty US-based investors.
  2. The addition of seven partners that were identified as resellers/brokers.
  3. The addition of three countries: Japan, Malaysia, and Panama.
  4. The addition of two holding companies, fifty-five individuals, thirty-four investors, eighteen partners, seven subsidiaries, ten suppliers, and four vendors.

Critical developments

Based on the updated sample, two critical developments were identified. This article reflects on the implications of those developments for future research and policy action.

First, the authors found that the number of US-based investors in spyware has notably increased in the past year, when compared with the sample size of the spyware market captured in the first Mythical Beasts project. In the first edition, the United States was the second-largest investor in the spyware market, following Israel. In that edition, twelve investors were observed to be domiciled within the United States—whereas in this second edition, twenty new US-based investors were observed investing in the spyware industry in 2024. This indicates a significant increase of US-based investments in spyware in 2024, catapulting the United States to being the largest investor in this sample of the spyware market. This is significant in scale, as US-based investment from 2023 to 2024 largely outpaced that of other major investing countries observed in the first dataset, including Italy, Israel, and the United Kingdom. It is also significant in the disparity it points to—the visible enforcement gap between the flow of US dollars and US policy initiatives. Despite numerous US policy actions, such as the addition of spyware vendors on the Entity List, and the broader global leadership role that the United States has played through imposing sanctions and diplomatic engagement, US investments continue to fund the very entities that US policymakers are making an effort to combat.

Second, the authors elaborated on the central role that resellers and brokers play in the spyware market, while being a notably under-researched set of actors. These entities act as intermediaries, obscuring the connections between vendors, suppliers, and buyers. Oftentimes, intermediaries connect vendors to new regional markets. Their presence in the dataset is almost assuredly underrepresented given the opaque nature of brokers and resellers, making corporate structures and jurisdictional arbitrage more complex and challenging to disentangle. While their uptick in the second edition of the Mythical Beasts project may be the result of a wider, more extensive data-collection effort, there is less reporting on resellers and brokers, and these entities are not systematically understood. As observed in the first report, the activities of these suppliers and brokers represent a critical information gap for advocates of a more effective policy rooted in national security and human rights. These discoveries help bring into sharper focus the state of the spyware market and the wider cyber-proliferation space, and reaffirm the need to research and surface these actors that otherwise undermine the transparency and accountability efforts by state and non-state actors as they relate to the spyware market.

This update also includes a reflection on the trends in the first Mythical Beasts report and an overview of methodological approaches, updates, and challenges. It concludes with brief commentary on necessary transparency efforts for this marketplace.

2024 key findings in full

Two major developments have occurred within this sample of the spyware market over the past year. First, the number of US-based investors in spyware now comprise the largest share of market investment which was not the case in our previous sample of the spyware market. Second, resellers and brokers now are key actors in the spyware market—comprising more sample market share than previously demonstrated—and oftentimes are under-observed and not readily addressed in current policy deliberations. New data and analysis illustrate the role these partners have not only in connecting entities across the marketplace but also in obscuring relationships.

The number of US-based investors in spyware is increasing

When compared with the initial sample of the spyware market, the number of US-based investors in spyware has increased significantly. These investors are directing their dollars to some of the most controversial and prolific vendors in the spyware market, including Israeli spyware vendors that have sold to customers that utilize these capabilities to suppress human rights and compromise national security. For example, US dollars have directly contributed to spyware that has targeted US personnel and officials in allied governments. Figure 1 highlights the changes in the largest investors in the spyware market from the first Mythical Beasts version to this update.

Figure 1: Comparison of investor-to-vendor flow by jurisdiction in the first and second Mythical Beasts versions. 

And this is happening at an alarming rate. In this update, the number of US-based entities in the sample that invested in spyware increased from eleven to thirty-one. All these investors reportedly invested in spyware companies this past year, indicating an increase of US-based investment in 2024. The figure below compares this entity increase with the other significant investors in the global market for spyware over time:

Figure 2: The number of active investors in the market each year2

Further, the quantity of US-based entities investing in the spyware market is three times greater than in the next three-highest countries with the most investors. Rapidly increasing investment into this technology is concerning, as it effectively undermines recent, concerted US government efforts to constrain the spyware market including policies to combat proliferation by issuing entity listings, sanctions, visa restrictions, a joint statement, and executive order. In the current geopolitical context, the jurisdictions to which US dollars are flowing is also concerning. US-based investment into spyware is happening in parallel to a conflict between Israel and Hamas in the Middle East, where some of these technologies have been utilized in the past. These technologies have already appeared in the Israel-Iran conflict.

Furthermore, these dollars are not going to rights-respecting vendors that could shape the global market for good. Rather, these investments fund some of the most prolific rights-abusing vendors operating within this market. One notable example of a new US-based investment in spyware includes AE Industrial Partners, which invested in Paragon Solutions Ltd in late 2024. Paragon Solutions is an Israel-domiciled spyware vendor of Graphite and has a US based subsidiary Paragon Solutions US. Recently, the Italian government used Graphite to surveil human rights defenders and other members of civil society. In early 2025, the American company Integrity Partners invested in Saito Tech Ltd (Candiru), which has been on the US Commerce Department’s Entity List since 2021. This new investment demonstrates both a contradiction and a critical enforcement gap: an American company is able to invest in an organization on the US Entity List, undermining the very measures that the US government has put in place to constrain spyware vendors in the first place. This contradiction between US industry investment and US policymaking must be addressed—or it will continue to uphold the very market that the US government is trying to combat, eroding US leadership on this issue.

Resellers and brokers are a critical and under-researched part of this market

The second Mythical Beasts project also observes a greater presence of spyware resellers and brokers within the marketplace, highlighting their often-overlooked role as “critical enablers” of spyware and its abuse. These entities, referred to generally under the category of “partners” in the database, act as crucial intermediaries by obscuring supply chains, evading observation through complex corporate structures or jurisdictional arbitrage, and connecting vendors with new regional markets. Further, there is a lack of effective policy response to curb the influence and dealings of these entities. As previously mentioned, the second edition of the Mythical Beasts project sought to do three things: 1) bring current years of activity on previously observed entities; 2) collect information on entities that fit this project’s methodology but were not observed in the first edition of Mythical Beasts; and 3) capture entities entering this updated sample of the global spyware market in 2024. The second aim, in particular, is where resellers and brokers come into view. While not observed in the previous dataset, they are now identified based off missed or newly available historical detail.

This update identifies ten entities serving as resellers or brokers of spyware products in Mexico alone. Official Mexican government documents released as part of a transparency effort reveal that NSO Group’s Pegasus was sold through these intermediaries to buyers within the Mexican government. In this case, the resellers appeared to have created misleading contracts to obscure both the genuine products and services being sold and the original vendor, NSO Group. This set of brokers and resellers was not captured in the first Mythical Beasts dataset, although they have been operational since at least 2011. In the first report, only two entities were identified as resellers: RCS Labs and VasTech.3 In these cases, their involvement only came to light through rich hacked and leaked data from Hacking Team, the Italian spyware vendor now operating as Memento Labs. Similarly, evidence revealing the network of NSO resellers in Mexico has emerged through multiple channels including hacked and leaked data, some official documents released by subsequent Mexican administrations as part of transparency efforts, and research tracing highly networked individuals to these entities. Based on these observations, the authors determined that high-quality evidence of their existence is sparse beyond hacked and leaked data, internal state transparency and accountability initiatives, and innovative research techniques.

These resellers and brokers remain under-researched, and likely under-represented in the Mythical Beasts database, for a number of reasons. Yet this challenge to document brokers and resellers highlights their crucial role in the market. These entities obfuscate the links between vendors, suppliers, and buyers, making transparency in the spyware market ever harder to achieve, in understanding the origins, uses (or abuses), and ultimately the customers of spyware. Additionally, brokers and resellers distort the prices of capabilities and the exploits they rely on, constituting an important but understudied driving force in how the market operates. Despite this importance, brokers and resellers are not a current feature of policy responses in the United States or in international policy deliberations. Without first bringing them into view within the marketplace and, second, constraining their behavior through policy responses, brokers and resellers can undermine transparency and accountability efforts by state and non-state actors with respect to the spyware market.

The first Mythical Beasts project addressed a gap in contemporary public analysis on spyware proliferation, documenting a sample of the global supply chain of this market. The first edition of the report unveiled a dataset of 435 entities within the global spyware market from 1992 to 2023 and categorized them based on business relationships with one another. Six defining characteristics of the spyware market emerged from this analysis:

  1. A disproportionate geographic concentration of entities in Israel, India, and Italy
  2. Recurring entrepreneurship
  3. Partnerships between spyware and hardware surveillance vendors
  4. Efforts to change names and shift corporate structures
  5. Strategic jurisdictional hopping
  6. The global mobilization of capital

Of note, the second edition of the Mythical Beasts project found that all six of these trends identified in the first edition of the project held relatively constant through 2024. This consistency should not be overlooked; the global spyware market is evolving in observable and definable ways, which gives an advantage to those seeking to combat its misuse and proliferation. This predictability creates opportunities to develop and implement impactful actions to address consistent trends. The first edition of the Mythical Beasts report has informed threat assessments, congressional hearings, resourcing, and further reporting; its policy recommendations have been included in codes of conduct for states. Given that the market observed in the first edition is consistent in the second edition’s findings, policymakers seeking to implement change can confidently refer to the recommendations outlined in the first report for options to address these trends, and also utilize this second edition for an in-depth look into aspects of the spyware market that are ripe for continued research and new policy development.

Methodological approaches and challenges

Overview

The first dataset from 2024 provides a snapshot of the market, illustrating trends and patterns within the spyware ecosystem. The data is limited to entities for which there is a public record (such as national corporate registries) and for which public information (e.g., through reputable reporting from civil society investigations) links the vendor to the development or sale of spyware or its components.

Vendors are included if they 1) publicly advertised products or services that match the above definition of spyware, 2) were described as selling the same products through public reporting in the media or by civil society researchers, or 3) showed evidence of the products through court records, leaks, or similar internal documentation. As part of this search process, the team gathered records on entities associated with each vendor, including investors, suppliers, and holding companies. In all cases for which data is available, the dataset includes vendor activities from the start of operation until 2023, or until records indicate that the vendor’s registration had ceased in a jurisdiction.

Updates

The first dataset has been updated in two meaningful ways.

First, for any entity in operation until 2023, the authors sought evidence for either activity in 2024 or termination of registration. The sources of public information varied but largely stemmed from different forms of corporate registration and records. In cases where evidence of activity in 2024 was absent, and no evidence pointed to dissolution or termination in a jurisdiction, the activity was updated to 2024. While some evidence points to activity in 2025, the authors uniformly restricted the update to 2024 given varied tax and corporate reporting deadlines by jurisdiction.

Second, the dataset includes 130 new entities. The entities are varied—including new vendors and their associated investors, and previously undiscovered or undisclosed information on preexisting entities. Information on key individuals—lead developers, directors, senior leaders, and shareholders, among others—was also recorded, including movement of these individuals between entities. As previously mentioned, some of the new entities in this update were undiscovered in the initial Mythical Beasts dataset but had been operational prior to 2024. The authors only recently uncovered their connection to a spyware vendor and suppliers, as information connecting them to an entity was previously limited. Some of these formerly undiscovered entities are registered in jurisdictions including Malaysia and Panama, while others are both newly connected as of 2024 and domiciled in a jurisdiction new to the dataset, as in the case of Sompo Cyber Security’s new partnership with Cognyte in Japan. This is noteworthy because Japan is a signatory of the Joint Statement on Efforts to Counter the Proliferation and Misuse of Commercial Spyware.

Altogether, the dataset now includes 561 entities present in the spyware market between 1992 and 2024. These entries are largely categorized according to the first Mythical Beast edition definitions, with some notable developments in the partner categorization. Here, the criteria of “partner” has been changed in two ways. As discussed in the key findings section, more evidence of resellers and brokers of spyware products was discovered—a critical and oftentimes missed element of the market. Given the variety of forms or relationships these entities may take, the authors broadly categorized them under the partner definition. Second, the partner category has been shrunk and there is a new entity type called “alumni” which accounts for shared staff and investors into another cybersecurity company but without public evidence of shared business or similar products to the origin company. This reflects an observed pattern of serial entrepreneurship noted in the original report including companies like Candiru. For example, if a founder of a spyware company goes and establishes alongside former spyware employees a company wholly unrelated to cybersecurity, that company would not be included in the alumni definition.

Challenges

Researchers continually face challenges in using open-source materials and encounter barriers to transparently reporting on the spyware market. In the first edition of this report, policy recommendations focused on increasing market transparency. Two of these recommendations highlighted the need to improve government-run corporate registries and to audit and publish export licenses. The Mythical Beasts research continues to rely on high-quality, accessible government databases to identify vendors and draw connections between entities. However, to be a source of truth, registries must be comprehensive and available to the public, such as those in Czechia and the United Kingdom. These registries show the full history of a company, including name changes, officers, and investment histories. However, most registries are not high-quality, with some providing little to no information whatsoever. For example, registries in Israel, India, the British Virgin Islands, the United Arab Emirates, and Mexico provide only limited or no information. Consequently, quality research into entities domiciled in these states is limited, and these states are likely more appealing to entities that seek to evade scrutiny.

The authors also continued to encounter anomalies. For example, Coretech Security Services Limited, a supplier incorporated in the United Kingdom in 2020, is not to be confused by the prior name of another supplier operating in the United Kingdom: Airis Security Technologies Inc., formerly known as Coretech Security Limited. Both Coretech Security Services Limited and Airis Security Technologies Inc. share overlap in personnel, including Alexander Church and Adrian Oldfield. Intelligence Online also reports that these companies share overlapping financial structure, diverging only to whom they sell, be it strictly UK government customers for Coretech Security Services Limited and Five Eyes countries for Airis Security Technologies Inc. While the overlap in personnel and notably similar naming conventions could be an attempt to create brand continuity between businesses, it also may suggest more evasive tactics. As observed in the first Mythical Beasts edition with the trend of shifting vendor identities, entities often change legal names and even shift entire corporate structures to obscure their identity and, potentially, manage the impact of negative reporting. Whatever the motivation behind these naming conventions and business structures, even robust corporate registries can sometimes be difficult to piece together to create a clear picture, which presents a significant challenge to researchers and policymakers who hope to gain a better understanding of the market’s mechanics.

Conclusion: The current state of the spyware market and policy

The global market for spyware continues to persist and evolve. With new data on the state of the spyware market in 2024, the authors found that: 1) US-based investors continue to disproportionately fund these capabilities, undermining important US government action on spyware; and 2) resellers and brokers are vital enablers in the proliferation and misuse of this market, operating in the shadows but do not form part of the response to constrain spyware. These findings underscore the tensions in this marketplace and the need for stronger transparency and accountability mechanisms. In particular, the direction of US investment to Israeli spyware vendors, some of which are the most controversial and prolific in the marketplace, raises concern particularly during a more intense period of geopolitical volatility and outright geopolitical conflict, where states’ use of offensive cyber capabilities for intelligence collection or reconnaissance will be heightened.

Policy should continue to evolve alongside the spyware market, rising to meet the challenges of an evolving landscape. For instance, an underexplored policy lever within the US toolkit is better understanding of and efforts to tackle US investment into this industry. The current US dollars funding entity-listed vendors undermines US-led policy efforts to better shape this market. By developing a baseline understanding of outbound investments, strengthening disclosure requirements, and providing support to US investors in conducting due diligence, the United States can continue to lead in curbing the misuse and proliferation of the market for spyware. Further, researchers can seek to better understand the mechanics of resellers and brokers within this marketplace in order to shed more transparency on the murkiest corners of this ecosystem that drive proliferation and misuse of these capabilities.

While the global market for spyware has evolved in several ways, it has also held consistent in others. Concentrations of entities in specific jurisdictions, serial entrepreneurs, partnerships between hardware surveillance vendors, and strategic jurisdiction hopping all remain present and relatively consistent within this dataset update. This gives policymakers an advantage. The market is not evolving at a pace to which action to combat its misuse and proliferation cannot keep up. The Mythical Beasts project seeks to inject systematic, empirical data into this market. At the same time, it is vital that policymakers continue to enact changes that better shape and constrain this market.

About the authors

Jen Roberts is an Associate Director with the Atlantic Council’s Cyber Statecraft Initiative. She primarily works on CSI’s Proliferation of Offensive Cyber Capabilities and Combating Cybercrime work. Jen also helps support the Cyber 9/12 Strategy Challenge and is passionate about how the United States with its allies and partners, especially in the Indo-Pacific, can cooperate in the cyber domain. Jen holds an MA in International Relations and Economics from Johns Hopkins University’s School of Advanced International Studies (SAIS) where she concentrated in Strategic Studies. She also attained her BA in International Studies from American University’s School of International Service.

Sarah Graham is a research consultant to the Atlantic Council’s Cyber Statecraft Initiative. Sarah’s research investigates the evolving relationship between digital technologies, policy, and society. She is an incoming EU Schuman Fulbright Fellow. Her work spans academia, NGOs, and industry. Sarah is a graduate of the University of St Andrews (Scotland) and of New York University.

Nitansha Bansal is an assistant director with the Cyber Statecraft Initiative (CSI), part of the Atlantic Council Tech Programs. In this role, her research focuses on the proliferation of offensive cyber capabilities, including spyware and its policy implications for human rights and national security, and open source software security. She also supports the capacity building efforts of CSI, and runs the Congressional Cyber and Digital Policy Program. Prior to joining the Council, Nitansha worked with government and think tanks in India on technology policy. She holds a masters in public administration from Columbia University’s School of International and Public Affairs where she concentrated on cybersecurity and business risk, social media policy, and data analysis.

Disclaimer on sources

More information: All sources for this dataset are open-source and were publicly available at the time of writing. For more on the kinds of data used in this project, see here. We are aware that some links have broken or been removed, and a handful of sources have been taken down in the wake of court orders. We are unable to replace, or host, copyrighted material. For any questions on sourcing, please email cyber@atlanticcouncil.org.

Related content

Explore the program

The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

1    Spyware is a type of malicious software that facilitates unauthorized remote access to an internet-enabled target device for purposes of surveillance or data extraction. Spyware is sometimes referred to as “commercial intrusion [or] surveillance software” with effectively the same meaning. This research considers the “tools, vulnerabilities, and skills, including technical, organizational, and individual capacities” as part of the supply chain for spyware and the meaningful risks posed by the proliferation of many of these components.
2    One investor from the first edition of Mythical Beasts was removed from the second edition of the dataset to be in line with the definition of investor outlined in this piece. The first edition of Mythical Beasts included twelve US investors. L3Harris was removed from the dataset, bringing the number down to eleven. Twenty new investors (all established in 2024) bring the total number of investors in the current dataset to thirty-one.
3    It is important to note that these entities were resellers during specific years. As early as 2012, RCS facilitated the sale of Hacking Team srl products and services, including Hacking Team srl’s Remote Control System (RCS), to government agencies in Bangladesh, Pakistan, and Turkmenistan. In 2022, security researchers at Lookout determined RCS Lab S.p.A created and sold the Hermit spyware, and it continues to operate into 2024 as a spyware vendor. VasTech was linked to reselling Hacking Team srl’s RCS in 2015 through documents on Wikileaks

The post Mythical Beasts: Diving into the depths of the global spyware market appeared first on Atlantic Council.

]]>
Securing data in the AI supply chain   https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/securing-data-in-the-ai-supply-chain/ Fri, 05 Sep 2025 04:00:00 +0000 https://www.atlanticcouncil.org/?p=865321 To avoid lopsided AI policy, policymakers must see the data used and generated by AI as a chain, not a snapshot.

The post Securing data in the AI supply chain   appeared first on Atlantic Council.

]]>

Table of contents

Executive summary

Underpinning AI technologies is a complex supply chain—organizations, people, activities, information, and resources that enable AI research, development, deployment, and more. The AI supply chain includes human talent, compute, and institutional and individual stakeholders. This report focuses on another element of the AI supply chain: data. 

While a diversity of data types, structures, sources, and use cases exist in the AI supply chain, policymakers can easily fall into the trap of focusing on one AI data component at one moment (e.g., training data circa 2017), then switching focus to another AI data component next (e.g., model weights in current times), risking a lopsided policy that fails to take account of all the AI data components that are important for AI research and development (R&D). For example, overconfidence about which data element or attribute will most drive AI R&D can lead researchers and policymakers to skip past important, open questions (e.g., what factors might matter, in what combinations, and to what end), wrongly treating them as resolved. Put simply, a “one-size-fits-all” approach to AI-related data runs the risk of creating a regulatory, technological, or governance framework that overfocuses on one element of the data in the AI supply chain while leaving other critical parts and questions unaddressed. 

Managing the risks to the data components of the AI supply chain—from errors to data leakage to intentional model exploitation and theft—will require a set of different, tailored approaches aimed at achieving a comprehensive reduction in risk. As conceptualized in this report, the data in the AI supply chain includes the data describing an AI model’s properties and behavior, as well as the data associated with building and using a model. It also includes AI models themselves and the different digital systems that facilitate the movement of data into and out of models. The report, therefore, spells out a framework to visualize the seven data components in the AI supply chain: training data, testing data, models (themselves), model architectures, model weights, Application Programming Interfaces (APIs), and Software Development Kits (SDKs). 

It then uses the framework to map data components of the AI supply chain to three different ways that policymakers, technologists, and other stakeholders can potentially think about data risk: data at rest vs. in motion vs. in processing (focus on a data component within the supply chain and its current state); threat actor risk (focus on threat actors and risks to a data component within the supply chain); and supply chain due diligence and risk management (focus on a data component supplier or source within the supply chain and related actors). 

In doing so, it finds that many risks to AI-related data are risks to data writ large that existing best practices could mitigate. These include National Institute of Standards and Technology (NIST) and International Organization for Standardization (ISO) specified data access controls, continuous monitoring systems, and robust encryption; the risks at hand in these cases do not require reinventing the wheel. Simultaneously, this report also finds that some security risks to AI data components do not map well to existing security best practices that would adequately mitigate the risk or even apply at all. At least two stand out immediately: bad actors’ attempts to poison AI training data require data filtering mechanisms not well captured by existing measures, and which access controls or encryption would not appropriately mitigate; and emerging, malicious efforts to insert so-called neural backdoors into the behavior of neural networks require new security protections, too, beyond the realm of traditional IT data security. On top of implementing these two categories of mitigations, this report emphasizes that organizations can leverage “know your supplier” best practices to ensure all other entities in their AI supply chains have security best practices for both non-AI-specific and AI-specific data risks. 

This report concludes with three recommendations. 

  1. Developers, users, maintainers, governors, and securers of AI technologies should map the data components of the AI supply chain to existing cybersecurity best practices—and use that mapping to identify where existing best practices fall short for AI-specific risks to the data components of the AI supply chain. 
  2. Developers, users, maintainers, governors, and securers of AI technologies should “Know Your Supplier,” using the supply chain-focused approach to mitigate both AI-specific and non-AI-specific risks to the data components of the AI supply chain. 
  3. Policymakers should widen their lens on AI data to encompass all data components of the AI supply chain. This includes assessing whether sufficient attention is given to the diversity of data use cases that need protection (e.g., not just training data for chatbots but for transportation safety or drug discovery) and whether they have mapped existing security best practices to non-AI-specific and AI-specific risks. 

Introduction

Recent advances in computing power have catalyzed an explosion of artificial intelligence (AI) and machine learning (ML) research and development (R&D). While many of the mathematical and statistical techniques behind contemporary AI and ML models have been around for decades,1 these advancements in computing power have combined with larger datasets, energy sources, human labor, and other factors to bring AI and ML R&D to unforeseen heights. 

This phrase, “artificial intelligence,” is best understood not as a single, specific technology but as an umbrella term for a range of technologies and applications. Illustrating this point, companies, governments, academic institutions, civil society organizations, and individuals, among others, are designing, building, testing, and using AI and ML applications ranging from facial recognition systems in shopping malls and driving navigation systems in autonomous vehicles to chatbots in academic research environments to highly tailored applications in drug discovery, climate change modeling, and military operations.2 Despite wide variations in design and function, all these software applications, as such, characterize “AI.” Their variations capture the expansiveness of the “AI” term. They also underscore that research and policymaking on AI’s impacts—to labor, the environment, workforce productivity, economic growth, privacy, civil rights, national security, and so forth—must reference and differentiate between specific application areas, because they may greatly vary.

Underpinning AI technologies is a complex supply chain—organizations, people, activities, information, and resources enabling research, development, deployment, and more.3The AI supply chain includes human talent: the people around the world contributing to university and nonprofit research, building and iterating on commercial products, hacking systems to boost their security, applying deployed AI technologies in innovative ways, and so forth. It includes compute: the dynamic provisioning, protection, and management of hardware and software systems across shared infrastructure, in this case to power AI training, refinement, and so on—the subject of a forthcoming companion report from the Cyber Statecraft Initiative.4 It includes institutional and individual stakeholders, such as infrastructure providers, data providers, technology and service intermediaries, user-facing entities, and consumers.5 And the AI supply chain includes data components, which are the focus of this report. 

AI technologies are data-rich. That is, they both rely tremendously on data to function and produce large volumes of data as part of their operation. As explored in this report, this data richness entails a complex set of data elements in the AI supply chain that feed into, come out of, and underpin the research, development, deployment, use, maintenance, governance, and security of AI technologies. Corporate developers, researchers, and others building an AI application from the ground up may create an algorithm and run it on different kinds of “training data” before measuring its performance with “testing data.” For instance, in training an image recognition model to identify whether a photo contains a cat, the training data may be full of pictures of cats, dogs, airplanes, coffee machines, and cats sitting on coffee machines (i.e., “yes,” “no,” and more complex “yes” options), and the testing data might consist of similar pictures the model has never trained on, to test how well the function it learned generalizes to the new data. Individuals using AI chatbots or AI facial recognition models, to give another example, may upload data (e.g., questions, face images) into the system as part of using it, after which the system may provide data back to the individual (e.g., answers, names associated with faces) as well as output some metadata into a system log (e.g., performance metrics). These data components are just some of those present in the AI supply chain. 

Mapping and understanding this data in the AI supply chain matters greatly for companies, policymakers, and society to protect each data element against exploitation. Leaks, theft, exploitation, and adverse use of AI-related data could harm specific individuals or groups of people (e.g., extracting data from AI models to violate privacy); undermine specific national objectives like economic competitiveness (e.g., data theft to replicate proprietary applications) or national security (e.g., data theft to understand a model’s behavior, and thereby attack it); and create other issues ranging from market consolidation (e.g., single points of failure in the entity supplying key AI-related data) to undermining trust in critical technology areas (e.g., between patients and healthcare institutions). The US National Security Agency (NSA) recently wrote, “as organizations continue to increase their reliance on AI-driven outcomes, ensuring data security becomes increasingly crucial for maintaining accuracy, reliability, and integrity.”6

Conversely, each data element enables different aspects of AI research, development, deployment, use, maintenance, governance, and security—meaning developers, users, maintainers, governors, and securers of AI technologies should want to better safeguard them for positively framed reasons, too. Better protecting the data underpinning an expensive commercial AI advancement could enable the company to move faster without slowdowns due to leaks, breaches, and trade secret theft. Shielding training data related to individuals from inadvertent leaks and exposure could bolster public trust in responsibly executed AI deployments in healthcare or transportation. The list of benefits to mitigating leaks, theft, exploitation, and adverse use of AI-related data goes on for comparing specific data types and uses against relevant risk mitigations—optimizing the use of existing security best practices and identifying AI-specific gaps to fill. 

Without an effective framing for how to think about all the data in the AI supply chain, policymakers and others looking at AI and data security may overfocus on a single data component in the AI supply chain without accounting for all the others in the picture. They may also conflate related but distinct data components in the AI supply chain together, failing to account for differences in data type, structure, source, and use case that may create distinct risks and require different, tailored mitigations in response. 

Moreover, treating all AI-related data as part of a new, flashy set of AI technologies can perpetuate a sort of AI exceptionalism. This view suggests that AI technologies exist in isolation from cloud, telecommunications, and other systems—treating them as separate from, rather than interconnected with, other technologies that also matter for innovation, security, governance, and more. It can implicitly suggest the data is all new, raising fundamentally new questions and issues without good answers, instead of relating to data security discussions and best practices that have been around for decades, as well as a subset of data risks that demand AI-specific mitigations. None of these outcomes lend themselves to the most rigorous public policy, industry, research, and public discussions about AI R&D, security, and geopolitics. 

At a high level, the concept of data in the AI supply chain therefore enables analysts to map out points of concentration, resilience, and security vulnerability in AI systems and the overall AI ecosystem that might vary based on AI data type, structure, source, and use case. (For example, does cybersecurity-focused training data come from too few companies? How does the security of open-source health testing data compare to the security of health model parameters?) The concept of data components in the AI supply chain can help policymakers, developers, and those impacted by AI technologies understand the broader supply chain of parts underpinning a commercially successful, data-secure (or -insecure) AI system. And it can help governments, companies, civil society groups, journalists, and individuals to more precisely, systemically evaluate AI risk mitigation methods against the security risks of the coming years.7

A mapping and understanding of the data in the AI supply chain can also inform better policy. To be sure, no regulations of technology (or anything, for that matter) will treat the technology (or other thing) in question perfectly symmetrically across every country or jurisdiction in the world. But “AI regulations” based on highly inconsistent formulations of “AI-related data” can unintentionally increase friction. If a legislature writes rules for “AI data” when picturing only one type of training data, and another country’s legislature takes a more comprehensive view of all the data types and use cases in the AI supply chain, the widely varied approaches could make it harder to harmonize cross-border steps to curtail bad practices. The varied approaches could create cross-jurisdictional barriers to startup innovation that regulators never intended. And they could further confuse global discourse on governing “AI data.” These are potentially unintended effects that a better policy formulation on how to think about risks to and protections for AI-related data would avoid. 

This report lays out a conception of the data components of the AI supply chain, which the research then maps to existing data security and supply chain security best practices—highlighting existing measures that work well and identifying, in the process, security gaps for issues more unique to AI data types and use cases. The framework once again focuses just on data, rather than all elements of the AI supply chain (e.g., compute). For simplicity’s sake, it also excludes AI agents due to the complexity their permission-based, semi-autonomous functions introduce—instead, focusing on the wide range of non-agent models in use today. 

First, this report discusses how policymakers can run the risk of overfocusing on one data component at the expense of the entirety of data types in the AI supply chain, which can contribute at best to lopsided policy and at worst to tendencies that undermine US AI competitiveness and leave critical parts of the data in the AI supply chain inadequately secured. Second, it introduces a concept of data in the AI supply chain with seven components, each defined and exemplified below: training data, testing data, models (themselves), model architectures, model weights, Application Programming Interfaces (APIs), and Software Development Kits (SDKs). It additionally discusses the interactions between data components, their varied suppliers, and those suppliers’ sometimes shifting or multiple roles vis-à-vis the data in the AI supply chain. 

Finally, the report offers three different approaches to map data components in the AI supply chain to existing data security and supply chain security frameworks: data at rest vs. in motion vs. in processing (focus on a data component within the supply chain and its current state); threat actor risk (focus on threat actors and risks to a data component within the supply chain); and supply chain due diligence and risk management (focus on a data component supplier or source within the supply chain and related actors). These approaches can map concerns about training data theft, training data poisoning, API insecurity, and other data-related AI supply chain issues to established security controls and best practices from government agencies, standards bodies, cybersecurity literature, and areas like the financial sector and export control compliance. In doing so, it also begins to identify a few areas where existing security best practices may be insufficient for AI data risks—namely, confronting risks associated with the poisoning of data components in the AI supply chain and inserting neural “backdoors” into models through tampered training data or manipulation of model architectures. These risks, perhaps unique or relatively unique to AI models, require their own mitigations.   

The report concludes by making three recommendations: 

  1. Developers, users, maintainers, governors, and securers of AI technologies should map the data components of the AI supply chain to existing cybersecurity best practices—and use that mapping to identify where existing best practices fall short for AI-specific risks to the data components of the AI supply chain. In the former case, they should use the framework of data at rest vs. in motion vs. in processing and the framework of analyzing threat actor capabilities to pair encryption, access controls, offline storage, and other measures (e.g., NIST SP 800-53, ISO/IEC 27001:2022) against specific data components in the AI supply chain depending on each data component’s current state, the threat actor(s) pursuing it, and the traditional IT security controls the organization already has in place. In the latter case, developers, users, maintainers, governors, and securers of AI technologies should recognize how existing best practices will inadequately prevent the poisoning of AI training data and the insertion of behavioral backdoors into neural networks by manipulating a training dataset or a model architecture. They should instead look to emerging research on how to best evaluate training data to filter out poisoned data examples and how to robustly test network behavior and architectures to mitigate the risk of a bad actor inserting a neural backdoor, which they can activate after model deployment. And in both cases—of non-AI-specific and AI-specific risks to data—organizations can and should use the third listed approach of focusing on the data and supply chain itself to ensure their vendors, customers, and other partners are implementing the right controls to protect against risks of model weight theft, training data manipulation, neural network backdooring through model architecture manipulation, and everything in between, drawing on the two categories of mitigations they implement themselves. 
  2. Developers, users, maintainers, governors, and securers of AI technologies should “Know Your Supplier,” using the supply chain-focused approach to mitigate both AI-specific and non-AI-specific risks to the data components of the AI supply chain. Those sourcing data for AI systems—whether training data, APIs, SDKs, or any of the other data supply chain components—should implement best practices and due diligence measures to ensure they understand the entities sourcing or behind the sources of different components. For example, if a university website has a public repository of testing datasets for image recognition, language translation, or autonomous vehicle sensing, did the university internally develop those testing datasets, or is it hosting those testing datasets on behalf of third parties? Can third parties upload whatever data they want to the public university website? What are the downstream controls on which entities can add data to the university repository—data which companies and other universities then download and use as part of their AI supply chains? Much like a company should want to understand the origins of a piece of software before installing it on the network (e.g., is it open-source, provided by a company, if so which company in which country, etc.), an organization accessing testing data to measure an AI model or using any other data component of the AI supply chain should understand the underlying source within the supply chain. Best practices in know-your-customer due diligence, such as in the financial sector and export control space, and in the supply chain risk management space, such as from cybersecurity and insurance companies, can provide AI-dependent organizations with checklists and other tools to make this happen. Avoiding entities potentially subject to adversarial foreign nation-state influence, data suppliers not sufficiently vetting the data they upload, and so forth will help developers, users, maintainers, governors, and securers of AI technologies to bring established security controls to the data in the AI supply chain itself. In the case of both non-AI-specific and AI-specific risks to data, organizations can and should use this supply chain due diligence approach to ensure their vendors, customers, and other partners are implementing the right controls to protect against risks of model weight theft, training data manipulation, neural network backdooring through model architecture manipulation, and everything in between—drawing on the two categories of mitigations implemented as part of the first recommendation. 
  3. Policymakers should widen their lens on AI data to encompass all data components of the AI supply chain. This includes assessing whether sufficient attention is given to the diversity of data use cases that need protection (e.g., not just training data for chatbots but for transportation safety or drug discovery) and whether they have mapped existing security best practices to non-AI-specific and AI-specific risks. As multiple successive US administrations explore how they want to approach the R&D and governance of AI technologies, data continues to be a persistent focus of discussion. It comes up in everything from copyright litigation to national security strategy debates. The United States’ previous policy focus on training data quantity, and little else, has already prompted policymakers to avoid discussing comprehensive data privacy and security measures, which now—in light of Chinese AI advancements and concern about AI model weight dissemination—are suddenly more relevant. To avoid these cycles in the future, where policy overfocuses on one AI data element when in fact many are relevant simultaneously, policymakers should take a comprehensive view of the data components of the AI supply chain. The framework offered in this paper, spanning seven data components, is one potential guide—though again, policymakers need not stick to necessarily one framework. What is most critical to avoid is developing data security policies that protect some data components of the AI supply chain (e.g., training data) while leaving others highly exposed (e.g., APIs). An expanded view of the different data components, the components’ interaction, and the often multiple and shifting roles of suppliers should help inform better federal legislation, regulation, policy, and strategy—as well as engagements with other countries and US states. Right now, organizations such as the Congressional commerce committees, the Commerce Department (including because it implements export controls and the Information and Communications Services and Technologies supply chain program), the Defense Department (with all its current AI procurement), and the Federal Trade Commission (with responsibility for enforcing against unfair and deceptive business practices) should stress-test their assumptions about how to best protect AI data, and whether existing best practices achieve desired security outcomes, against this data component framework. This requires asking at least two questions. Do their existing security, governance, or regulatory approaches—e.g., in the security requirements used in Defense Department AI procurement, in how the Federal Trade Commission thinks about enforcing best practices for AI data security—apply well to a diversity of data use cases that need protection, such as with testing datasets for self-driving vehicle safety or training datasets for cutting-edge drug discovery? List out the use cases beyond chatbots that are not top of mind but are highly relevant from a security perspective, from defense to shipping and logistics to healthcare. And second, are they parsing out which risks they have concerns about, vis-à-vis AI-related data, that are specific to AI versus risks to data in general? For both categories, consider how the framework and some of the security mitigations cited in this report—for example, the NIST guidance, ISO practices, and new research on detecting neural backdoors, etc.—can serve as best practices to improve outcomes. 

Moving balls, swinging pendulums 

Policymakers, researchers, and private-sector firms alike are in constant debate about what kinds of data, data analysis, and data characteristics (such as quantity or diversity) will lead to major breakthroughs in AI research and development. These debates span geopolitical and national security issues—like fights over whether a country’s population and data collection reach may lend a strategic military advantage—and economic and social ones—like conversations about how best to maximize AI for medicinal innovations or minimize AI risks to worker privacy. Debates about AI and data implicate pressing and often broader issues such as tech innovation, responsible technology governance, cybersecurity, antitrust, and nation-state competition, too. 

But the past few years alone have illustrated how simplistic this AI and data debate can become—and how quickly, and perhaps arbitrarily, the metaphorical ball can move. About seven or eight years ago, it became somewhat of a prevailing view in Washington, DC that “data is the new oil” and that the volume of data to which a country had access would determine its AI might.8 Compelling perhaps because of its simplicity (data quantity is the key) and certainty (about the link between data quantity and AI leadership—and AI leadership and superpower status), the narrative quickly took hold, pushed by senior government officials and large Silicon Valley corporations alike.9 Policy, industry, and media discourse focused highly on one element of the links between data, broadly defined, and AI R&D: training data quantity.

Now, though, the ball has moved. Policymakers talk far less about training data (even though it is still important) and much more about model weights—numerical parameters that specify how the model represents connections to leverage between pieces of data to achieve the desired output. (They also, rightfully, spent much time discussing compute, but that is once again outside the scope of this report). Discussions about new export controls and the Biden administration’s last-minute,10 multi-tiered framework for (on paper) limiting “AI diffusion” are chief among the recent policy efforts focused on this slice of AI R&D,11 as are some of the Trump administration’s efforts to deregulate AI with the stated objective of boosting AI development. (Lots of discussion also focuses, of late, on compute, which is beyond the scope of this particular report.) The heavy focus on model weights has hit industry stock prices and valuations as well. When Chinese firm DeepSeek released a new model that it claimed beat ChatGPT’s performance, US AI firms lost about $1 trillion in valuation in 24 hours—amid the worry that other (Chinese) firms might easily replicate DeepSeek’s use of open-source model weights.12Training data is still important for AI R&D—for instance, in how valuable curating the right, often proprietary datasets is for building AI drug discovery models13—but policy focus and debate have shifted greatly to legal, technical, innovation, tech governance, and national security issues surrounding model weights.14

At the height of the previous focus on AI training data, some scholars and analysts, certainly, pushed back against a myopic focus on one part of data and AI R&D. Matt Sheehan wrote a piece for the Macro Polo think tank in July 2019 arguing that strategic AI development depends not just on data quantity but on data depth (aspects of behavior or events captured), quality (accuracy, structure, storage), diversity (heterogeneity of users or events), and access (availability of data to relevant actors).15 The industry-aligned Center for Data Innovation published an article in January 2018 critiquing the flaws of making that economic comparison from an innovation standpoint.16 Since that overfocus on AI training data, others have made points about the need for a broader view of AI’s competitive data factors, too. For instance, Claudia Wilson and Emmie Hine recently cautioned against export controls on open-source models (and elements like model weights), which could trigger an “unfettered” AI “race”17—while scholars like Kenton Thibaut point out the drawbacks of hyper-fixating on a single, “silver bullet” for AI leadership in general.18

Still, many DC think tank roundtables and policy discussions center on model weights. This is not to say there is no reason for concern about how to best secure model weights, including the model weights of US AI companies, against theft by Chinese actors.19 Trade secret theft is clearly a concern for US companies, as it is for the US government. Again, though, training data—and the importance of a range of types of training data (e.g., beyond just LLM training data to include training data used to power novel AI drug discovery models, etc.)—has taken somewhat of a backseat in recent policy conversations compared to model weights as well as other AI supply chain components beyond scope, notably compute.

However, the pendulum swing from focusing on training data quantity to focusing on model weights illustrates a few prevailing problems in policy and industry debates about AI and data. 

  • Overconfidence about which data element or attribute will most drive AI R&D can lead researchers and policymakers to skip past important, open questions (e.g., what factors might matter? in what combinations? to what end?), wrongly treating them as resolved. 
  • Oversimplified views of how data flows into and out of, constitutes, and powers AI models can lead policymakers to discuss “AI data” as one bucket of data to compete on, govern, and secure, rather than as many data types with different contexts.  
  • Over-fixation on a single, AI-related data component can guide policymakers and practitioners to treat the data component as a new, flashy “AI” phenomenon—overlooking existing security and risk mitigation frameworks and best practices, which many organizations may still not have implemented in the first place. 

A continued challenge for plenty of US policymakers and industry leaders is taking, and having the intellectual and economic space for, a more comprehensive assessment of the different kinds of data and data components that enable AI R&D.20 Focusing largely on training data quantity one moment and model weights the next can contribute to piecemeal, sometimes lopsided policy and often unfounded analytical assumptions. Take the example of protecting AI training data. When policymakers overfocused on AI training data and the idea that training data quantity matters most, many policy papers,21 alongside much industry lobbying,22 advocated for weak privacy laws so the United States could “beat” China—a country which, in this framing, has zero privacy restrictions or data limits whatsoever.23 Now that the conversation has shifted to model weights, however, much policy discourse has focused on how China’s restrictions on outbound data transfers lock down its technological advantages24—a sudden pivot in the conversation that now suggests the United States might benefit from some privacy laws in the first place.

This mall-moving, pendulum-swinging tendency can mean policymakers choose a single piece of the data in the AI supply chain to focus on myopically, which can cause policy to make more sudden lurches and miss opportunities to make longer-term investments in the security of all AI components. It can also cause policy narratives about AI to move in contradictory directions based on whichever slice of AI-related data is receiving the most attention at one given moment. When the policy focus centered on fueling training data quantity, some (as described above) talked about basic data privacy and security restrictions as harmful to technology development and the country. Yet these are precisely the kinds of policies that are helpful to protect against theft of and illicit access to model weights. 

To provide another framework for researchers, industry leaders, and especially policymakers to approach important data and AI debates—from the nature of the data components most likely to drive AI R&D, to the economic and national security risks of ungoverned access to AI-involved data—the next section lays out a data-focused concept to help widen the lens. 

Untangling the data in the “AI supply chain” 

The AI supply chain—organizations, people, activities, information, and resources enabling AI research, development, deployment, and more—is complex, shifting, and global. It involves several elements not covered in this report, such as human talent and compute, and it also includes the focus of this report: data. 

Just as “AI” is not a single technology but an umbrella term for a suite of technologies, the data relevant to AI research, development, deployment, use, maintenance, governance, and security is no single data type, source, or format, either. Instead, there are several data components in the AI supply chain (described below). These data components fit into the AI supply chain because researchers, developers, deployers, users, maintainers, governors, securers, and attackers of AI systems depend upon and get access to different kinds of data—transmitted, stored, and analyzed in different ways—to make it all happen. They also fit into the AI supply chain because a wide range of entities around the world—from individuals who publish self-labeled datasets to corporations that analyze AI model outputs—supply, access, and use the underlying data, too. This idea echoes the concept of AI as a value chain (referring to the business activities that deliver value to customers),25though focused specifically on data components. 

The data in the AI supply chain covers many data types, sources, and formats—all of which need secure safeguards to enable competition, boost public trust, and protect against the leaks, exploitation, and other risks delineated above. As conceptualized in this report, the data in the AI supply chain includes the data describing an AI model’s properties and behavior, as well as the data associated with building and using a model. It also includes the AI models themselves and the different systems that facilitate the movement of data into and out of models.26 Laid out in the visualized framework and tables below, this report conceptualizes seven parts of the data and core data systems in the AI supply chain: 

  • Training data 
  • Testing data 
  • Models (themselves) 
  • Model architectures
  • Model weights 
  • Application Programming Interfaces (APIs) 
  • Software Development Kits (SDKs) 

This paper draws some inspiration at a high level from the November 2024 paper by Qiang Hu and three other scholars on the large language model (LLM) supply chain, which envisioned a framework for thinking about the components and processes that go into LLMs.27 Nonetheless, this paper differs in focusing more on the data components themselves rather than the activities to produce them (like dataset processing); delineates data components by their properties and functional differences (such as distinguishing between training data and testing data); and looking at the data supply chain for AI technologies broadly (rather than just LLMs). This paper’s analysis also differs in that it focuses specifically on the need for security.  

Notably, the first five of these components are data per se, or the model itself. The last two, however—APIs and SDKs—are neither data nor models themselves; instead, they are code and software systems that enable data to pass into, extract from, and otherwise collect around AI models. For example, business users of an LLM may use an API to submit questions to the chatbot in batches; mobile consumers using an AI image recognition app may, whether they know it or not, depend on an SDK to take their snapshot of a bird and submit it to a cloud-hosted AI model, which then returns back through the SDK’s code the species of the bird in question. While the concept of data components of the AI supply chain does not list out every software system that could interact with AI data components, it includes APIs and SDKs because of their prevalence and their security relevance in delivering AI data to and from cloud systems and mobile devices; after all, virtually all the major AI commercial companies offer access to APIs to use their models (to include submitting queries to chatbots and uploading images to recognition models). 

Figure 1 lists each of the seven data components of the AI supply chain, defines them, and provides a few examples of the companies and other entities involved in that component or its sourcing. Again, this does not include several other elements of the AI supply chain (e.g., human talent, compute) and focuses mostly on traditional AI models (e.g., excludes AI agents). 

Figure 1: Data components of the AI supply chain

Many of the above seven data components of the AI supply chain can stand on their own. A computer system can house thousands of training data images in one folder and separately store hundreds of testing image examples in another folder; the files themselves, in a literal sense, are distinct. Similarly, a company can build and deploy an AI model with a paid API, through which users can query the model without making any SDKs available for developers to more easily integrate the model into software. Some websites make training data publicly and freely available without ever supplying model weights to their visitors, and some companies will provide elements of their data supply chains to purchasers for auditing, but typically not all of their underlying training data or every model weight. 

However, all seven data components have overlapping functional roles in the AI ecosystem. Academic researchers, government technologists, or startup developers looking to build a competitive healthcare image recognition model will need training data and testing data (including potentially rounds of training data, to fine-tune a model) to make it happen; without testing data, it is difficult to systemically evaluate a model’s performance so it can be tweaked, and without training data, there is no model to test and fine-tune. Companies that want to deploy their already built and tested models have many incentives to create both APIs and SDKs, so that different users working in different environments—whether a nontechnical lawyer looking to query a chatbot or a machine learning PhD looking to use the chatbot in their own app—can readily access the technology. 

The seven data components have overlapping suppliers, which are also geographically dispersed. Companies like Amazon Web Services, for example, store and make publicly available countless training datasets, including those from other parties.28 (AWS, in this specific example, also offers cloud services to government, companies, universities, civil society groups, and individuals to train, test, fine-tune, and deploy AI models.) Universities like Tsinghua University in China and the Indian Institute of Technology publish open-source AI models and the related data (e.g., training, testing data) as part of academic studies.29 Community-maintained websites like Kaggle, popular in the AI R&D community, host many kinds of training and testing data, and open-source platforms like GitHub host various datasets as well as models themselves, too. Simultaneously, these and many other suppliers of data components in the AI supply chain are consumers of the data components. Amazon uses training and testing data to build AI products and services; universities, such as Tsinghua and the Indian Institutes of Technology (IIT), publish study-linked datasets just as they may procure AI data components and related technologies (e.g., cloud services) to conduct the research in the first place.

And the data components in the AI supply chain themselves may interact with each other. (Again, this report does not include coverage of AI agents as explained above.) When a developer initially trains a model (using a training dataset) and then iterates on the model by testing it (using testing data) and fine-tuning it further (using more training data), the resulting model and the model weights are in part the byproduct of the training and testing datasets used. The model architecture selected before sourcing the training data will likewise influence what the model weights and resulting model ultimately look like—as well as the resulting model’s data inputs and outputs via an API or SDK. Similarly, when a company acquires a certain training dataset and uses it to train a model with specified parameters, it shapes the nature of which testing data and additional training data it will subsequently source from the supply chain. If the company wants a model to be completely open-source, for instance, then it will need to select or construct datasets of only open-source testing and training data from the data in the AI supply chain; if the company elects to go with Portuguese-language training data for building a voice-to-text AI chatbot, it will need Portuguese-language testing data, perhaps even sourced only from Brazil, to evaluate the initial model’s behavior. These are additional ways in which interactions between data components of the AI supply chain can impact data sourcing decisions.  

Even nation-states looking to secure their respective AI systems and potentially steal or compromise those in other countries may need to consider everything from safeguarding the models themselves (and all the data and weights within them) against exploitation to identifying sensitive testing datasets that need protection. These AI data components are distinct in the framework above. But their overlapping and interdependent roles in AI R&D make them collectively integral to understanding AI competitiveness and innovation—and how to ensure robust, effective governance across safety, security, privacy, trust, and much more. The concept of a supply chain, as in other areas like manufacturing, helps to drive analysis towards the interaction and interdependence of the various subcomponents and their suppliers. None truly can stand alone.  

Instead of the policy and analytic pendulum swinging from one area (like training data) to another (like model weights) with underappreciation for the broader landscape, this framework and the functional overlaps between components make clear that strategic competition and governance over AI and data cannot myopically focus on one element. Doing so leads to the analytic issues laid out in the last section and detracts from the complex, entangled nature of the data supply chain components that are relevant to AI research, development, deployment, use, maintenance, governance, and security. Policymakers only increase the likelihood of missing major opportunities and risks. Hence, with this foundation, the next section uses the framework of data in the AI supply chain above to zoom in on the security risks facing the data components in the AI supply chain—to illuminate what organizations and policymakers might do about them.

Parsing the risks—and pursuing better security

Policymakers, technologists, and others working on AI (e.g., on governance) can use the framework from the last section to map data components in the AI supply chain, in different states and contexts, to security controls and risk mitigations. This section describes and details how such a process would work across three different approaches. Using the framework to parse risks enables individuals and organizations to identify the best existing practices to leverage in protecting AI data components. In some cases, this may save organizations time and money if they already have the security controls and risk mitigations in place elsewhere—and even if organizations have not yet implemented the existing controls and mitigations for non-AI systems and data, they do not need to create the controls and mitigations from scratch. Related, the framework can also help individuals and organizations to identify gaps in existing best practices—and, as exemplified in the below discussion, think about how new security controls or risk mitigations could be developed and used to address AI-specific data risks. 

As alluded to earlier, better security across the data components of the AI supply chain can mitigate risks of breaches and data interception, shield data and resulting AI technologies from theft (including by competitors), enhance protections for individuals’ privacy, bolster public trust, limit organizations’ liability risk, and strengthen US national security. Lapses in security across the data components of the AI supply chain, however, can contribute to universal problems such as data breaches and interceptions, intellectual property theft, privacy leaks and violations, and undermined public trust in AI technologies—as well as US-specific issues, such as better enabling governments adversarial to the US to hack data or infiltrate US technology supply chains. A methodological approach to this risk mapping can help organizations mitigate risk and help policymakers develop more rigorous, tailored policies on AI and data security. 

Leveraging the last section’s framework, this section evaluates three different approaches to mapping the data components of the AI supply chain to security controls and risk mitigations. The first looks at the state of a data component of the AI supply chain: is the data at rest, in motion, or in processing? The second looks at the threat actors with an interest in the AI supply chain and its data components: what are the threats, vulnerabilities, and consequences? And the third looks at the interaction of data components of the AI supply chain and the suppliers: who are the suppliers, and what are their security controls—or risks? 

A recent paper on how to enhance third-party flaw disclosures for AI models argues that the AI sector has much to learn from software security.30 This section follows in similar spirit. Instead of reinventing the wheel, these three approaches to data security in the AI supply chain help map complex questions about data in the AI supply chain to existing data security and supply chain security best practices. Then, where existing security controls and risk mitigations are insufficient for AI-specific risks to data—at least two of which are spotlighted below—these three approaches can help illuminate where new, AI-specific mitigations are needed. Figure 2 summarizes the three approaches, ahead of the more detailed discussion that follows.

Figure 2: Three potential approaches to securing data in the AI supply chain 

Approach one: Understand the ‘state’ of data

First, five of the seven data components of the AI supply chain (excluding APIs and SDKs, as they are not data per se) can be in different data states at different times. Each of these may come with specific security risks, under three states, commonly described as: “data at rest” (e.g., model weights sitting on a server, though not in use), “data in motion” (e.g., training data downloading from a website to a local machine), and “data in processing” (e.g., testing data feeding into an initially trained model). Cybersecurity professionals, when building organizational policies, programs, and processes, often apply this framework—at rest vs. in motion vs. in processing—to understand risks to data and mitigate them. AI-related data at rest, for instance, can be siphoned from databases by a hacker or sit exposed on a public server with no password, ready for anyone to download, because it was not subject to proper encryption and protection. This could enable criminals to target people in the data with scams or sell the data on the dark web. AI-related data in motion, similarly, that is weakly encrypted or entirely unencrypted could be intercepted by a nation-state as it moves from a cloud system through an API, enabling intelligence-gathering or intellectual property theft. 

Each of these data states may require different kinds of encryption, different levels of access controls for employees, and so on. Perhaps one security team is responsible for protecting a stored training dataset, while a research team is the only one authorized to modify the training dataset; the same data thus requires different security measures, such as different kinds of encryption and access control rules, when stored compared to when undergoing modification. A state agency or company may choose to implement a certain kind of robust encryption on data at rest when access or modifications are unnecessary but leave it unencrypted while in processing, or only encrypt it in very specific ways that still enable computation (i.e., while in processing).31 Focusing security measures only on the data component in question (e.g., is it testing data or training data?) will fail to account for the ways a piece of data’s current state impacts the risks to the data in that moment and the security measures to apply to it.

This framework—at rest vs. in motion vs. in processing—is therefore an effective means of tying classes of risks to the data components of the AI supply chain to specific, existing risk mitigations. Rather than assuming that the data components of the AI supply chain need entirely different protections because they are “AI-related,” leveraging this framework contextualizes risks to the data components within broader risks to data, AI-related or not. For example, one of the National Institute of Standards and Technology’s many security best practices focuses on “Protection of Information at Rest.” The security control, known as SP 800-53: SC-28, delineates three components: cryptographic protection for “information on system components or media” as well as “data structures, including files, records, or fields”; offline storage to eliminate the risk of individuals gaining unauthorized data access through a network; and using hardware-protected storage, such as a Trusted Platform Module (TPM), to store and protect the cryptographic keys used to encrypt data. 32 Universities attempting to secure health training datasets on a department computer, companies looking to prevent hackers from stealing model weights sitting on a cloud server, or government agencies hoping to protect testing data from spies can all use these techniques to protect the data components of the AI supply chain while they are at rest.

Specific data components in motion and in processing, as captured in Figure 3, can likewise be mapped to specific NIST and other security best practices. NIST SP 800-53: SC-08, “Transmission Confidentiality and Integrity,” specifies cryptographic protection, pre- and post-transmission security measures, how to conceal or randomize communications, and other steps 33that a civil society group could take to secure AI model weights it sends to a federal funder agency; the agency’s Cybersecurity Framework: PR.DS-10 control focuses on the confidentiality, integrity, and availability of data in use (i.e., in processing) and has many related controls such as account management, access enforcement, monitoring for information disclosure, system backups, cryptographic protections, and process isolation,34 that a corporation could implement for all its independent contractors building an LLM.35 This approach enables entities to identify a data component in their AI supply chain, understand its state, and map that state to best practices from NIST, the Systems and Organization Controls (SOC) 2 framework,36 and other data security compliance guidelines.

These controls could vary not just based on the data state (at rest vs. in motion vs. in processing) but on the type of data, its source, and its context. For instance, companies interested in protecting larger model weights could turn to security measures intended for larger datasets, such as tight access controls, two-party authorization for data access, and endpoint software controls.37 Companies might use this framework to arrive at a stronger level of security controls for larger model weights, in all data states, than they would apply to smaller, less sensitive training datasets.

At the same time, this mapping demonstrates ways in which existing security controls and risk mitigations may not address all AI-related data risks. Take the poisoning of an AI model, where bad actors attempt to insert “bad” data into training data, such as data that could cause serious errors or vulnerabilities if used to train a specific AI model.38 If an organization scrapes training data from the internet (i.e., data in motion), imposing confidentiality and integrity controls on the scraped data would only catch modifications to the data after collecting it—not detect whether the data uploaded in the first place was poisoned from the start. If an organization is trying to ensure the security of that training data after scraping (i.e., data at rest), to give another example, encryption and access control measures could help to mitigate the risk of post-scrape tampering of data stored on the organization’s systems. These measures would again fail, however, to protect the organization from scraping data that was compromised from the outset. While this is an intentionally simplistic discussion of AI poisoning, it underscores that traditional IT security measures for protecting data at rest, in motion, and in processing may not fully mitigate all risks to data in the AI supply chain. In this case, policymakers and organizations can look to guidance from NIST that explains types of poisoning attacks and potential mitigations—such as differential privacy applied to datasets and data sanitization techniques to remove poisoned samples of data before using the dataset for AI model training.39

Figure 3: Approach one illustrated

Approach two: Assess threat actor profile

Second, different threat actors as well as unwitting individuals (e.g., employees deceived by a phishing note, users making weak API passwords, etc.) can take actions that undermine the security of data components of the AI supply chain—or the security of a specific data component. Instead of focusing on the state of data components at risk, the developers, users, maintainers, governors, and securers of AI technologies can focus on the threat actors and scenarios themselves. Established threat actor risk frameworks can enable those entities and individuals to identify risks to the data in the AI supply chain, map an adversary’s capabilities against known mitigations, and prioritize the security measures that are the most urgent. These mitigations can be specific not just to a data component’s current state, but to any threat actor in question. 

Having a threat actor-driven risk approach is essential for companies, universities, nonprofits, government agencies, and other organizations and groups involved with developing, using, maintaining, governing, and securing AI technologies and data. Focusing on technical mitigations, such as encrypting data at risk, can help organizations prioritize their biggest technological or process vulnerabilities internally, but they do little to help the organization understand which threat actors have an interest in which of their datasets. Using the first approach described above can help an organization to shore up its own defenses, but knowing which actors are the biggest threat to an organization—and what capabilities they bring to bear—might shift which security controls and risk mitigations are the biggest priority; threat actors could focus on stealing unexpected datasets, for instance, or have far better ability to poison training data than a university or corporate research lab might appreciate. While it is again not the only approach, centering threat actors and their capabilities is another lens through which to approach securing the data components of the AI supply chain. 

Among many other risk assessment frameworks in the world, the US government often uses the framework of risk as a function of threat, vulnerability, and consequence.40 Threats are composed of an adversary’s intentions and capabilities.41 Vulnerabilities are weaknesses inherent to a system (e.g., due to poor coding practices, interactions between components, or simply the inevitability of human error in a complex software system) or that have been introduced by an outside actor.42 And consequences, in this framework, are outcomes that are either fixable or “fatal”.43

Developers, users, maintainers, governors, and securers of AI technologies can use this approach to understand how different data components of the AI supply chain may be at risk. Because many of the threat actors targeting data components of the AI supply chain—from nation-states to cybercriminals—are often already on the radar of large and boutique cybersecurity firms, organizations can use existing threat data to render their assessments. From there, they can look to industry best practice guides such as International Organization for Standardization (ISO) controls and standards from organizations like NIST to mitigate risks most appropriately44—rather than taking a one-size-fits-all approach to a diversified threat and security landscape.

For example, a medium-sized research university might worry about an industrial cyber espionage firm targeting its large AI health training data repository. If the university knows that the group has strong financial motive (intent), that it is highly sophisticated at penetrating network edge devices, insecure routers, and mobile devices but does not have the ability to decrypt large datasets (capabilities), and that the university has far too many connected devices and routers to achieve adequate security (vulnerabilities), the university may avoid a high-impact theft of the data (consequence) by choosing to encrypt the data, store it offline whenever possible, and securely isolate the encryption keys. The robust encryption and the shift towards offline storage could minimize the likelihood that the firm is able to steal the data—and minimize the likelihood they could make use of the data even if they did manage to steal it. 

If a leading US AI startup, to give another example, worries about a Chinese military hacker stealing its image recognition model weights, it could also apply this threat actor risk framework. The startup might suspect that the task is to steal its technology (intent), know that the hacker is highly sophisticated at network penetration and decryption of data (capabilities), and feel it has locked down its user accounts with strong passwords and multifactor authentication, but that its wide vendor and contractor base introduces many points of entry into its technological supply chain (vulnerability). As the firm is pre-revenue, its executives are of the view that a Chinese competitor getting a copy of its proprietary model weights and beating it to market could put the company out of business (consequence). Well aware that standard cybersecurity measures may not be enough to stop the military hacker’s capabilities, the startup may choose to invest in even more advanced mechanisms—partitioning systems; storing numerous false copies of model weights that purport to be the real thing; moving training datasets and testing datasets already used into offline storage45—to ensure that its model weights are as well-protected as possible.

These are insights that would not be as obvious were the hypothetical medium-sized research university or the hypothetical US AI startup to focus only on the current state of the training data or model weights in question (i.e., at rest vs. in motion vs. in processing). Understanding the threat actor itself was necessary to identify the most appropriate mitigations based on the varied capabilities brought to bear, data targets of interest to the adversary, and consequences of a security incident. Figure 4 lays out this approach. 

As with the prior section, some risks to data components of the AI supply chain are unlikely to be adequately addressed with existing security controls and risk mitigations. Poisoning of AI models may already require unique or relatively unique security requirements, such as filtering mechanisms to screen for poisoned data once a dataset is scraped from the internet or otherwise assembled. That is especially the case—applying this framework—when dealing with threat actors that are well-resourced, sophisticated, and persistent, such as the Chinese government. The amount of resources potentially put into attempting to poison specific datasets may require enhanced planning for the threat at hand and the consequences of the threat unfolding. 

Similarly, a sophisticated threat actor may have the capability and time to focus not just on poisoning a training dataset broadly (as discussed in the first approach subsection), but on creating what some call a neural backdoor: tampering with training data to embed a vulnerability in a deep neural network, so that the trained model does not behave erroneously or harmfully in response to standard events, but hides its learned, malicious behavior until it encounters a highly specific trigger.46 Ongoing research looks at how to tailor protections to training data under very specific assumptions about the bad actor’s approach;47 hence, a threat actor framework may provide more useful information to an organization attempting to defend against sophisticated attempts at neural backdoors. (Like with defending against poisoning attempts, encryption measures or access controls on training data at rest, in motion, or in processing are not going to mitigate these kinds of highly specific risk scenarios.) Still, more research is needed to understand generalized defenses against attempts to backdoor neural networks—including in areas that get relatively less attention than others (i.e., images getting more attention than video).48Guo, Tondi, and Barni, “An Overview of Backdoor Attacks, 20.49 More advanced mechanisms to filter training data are one promising set of approaches to address this type of risk.50

Recent work shows that bad actors can tamper not just with training data in the AI supply chain, to create de facto behavioral backdoors in neural networks, but can do so by manipulating model architectures in the AI supply chain as well.51 Again, taking a threat actor-focused view of the risks enables policymakers and organizational security experts to game out the risk scenarios—and how exactly attempts at architectural backdoors might unfold, offering insight hints on how to plan for and potentially prevent them in advance.

Figure 4: Approach two illustrated 

Approach three: Map suppliers to the supply chain

Third, the large number of suppliers of data in the AI supply chain means that security risks can come from suppliers themselves. These risks can take at least two forms: actors within the AI supply chain—such as groups of researchers uploading training data or finished models to websites—deliberately poisoning data or inserting malicious code to compromise others who use those components downstream; and actors within the AI supply chain having poor security practices that enable security risks to spill over to others. The latter of these risk categories could range from an AI service provider pushing API code to hundreds of customers, while not requiring employees to use multifactor authentication, to a volunteer research group unknowingly scraping inaccurate websites to build a flawed training dataset for a chatbot intended for security questions and login verification. Unlike focusing on the current state of a data component of the AI supply chain or the threat actor targeting a specific data component, this potential approach focuses on data security across an organization’s AI supply chain and relevant suppliers. 

Developers, users, maintainers, governors, and securers of AI technologies can draw on existing supply chain security best practices used in everything from export control regulations to compliance with the EU’s General Data Protection Regulation (GDPR). These broadly fall under the bucket of “Know Your Supplier.” First is knowing one’s suppliers to identify ownership, country of incorporation, and any other signals of potential illegality (e.g., a criminal front set up to scam others) or potential susceptibility to nation-state influence (e.g., ownership by a foreign government). Organizations such as government agencies, companies, and universities can look up the suppliers of their training and testing datasets, ensure the software engineers hired to build their APIs and SDKs are reputable, and check with AI developers about the sources of their training data. (As discussed below, the last of these may be practically difficult but is worth mentioning as a potential security practice.) This could help to identify risks such as unknowingly sourcing data or models from a Chinese military-linked university or hiring freelance data labelers previously involved with illicit hacking. 

Second, as compelled by vendor security requirements under GDPR,52 is ensuring an organization’s vendors and supply chain do not have weak security that voids the organization’s security efforts. This is likewise a concern for AI-dependent organizations that are typically dependent on a highly complex, often globalized, and frequently shifting data supply chain. AI developers, users, maintainers, governors, and securers can therefore implement contractual requirements for data security wherever possible. They can ensure vendors and customers receive adequate training on how to handle different data components that the organization might pass their way. And they can conduct or request independent audits from cloud companies deploying their AI models, data cleaning firms formatting their unstructured training data, and other entities in their supply chains. There are plentiful resources to draw on for such efforts. Financial sector know-your-customer guidelines,53 US government advisories on supply chain vetting,54 and cybersecurity and insurance readings on mitigating third-party cybersecurity risks,55 among others, can help give AI organizations tools to understand the data-involved actors in their AI supply chains and what risks might result. Such measures can help developers, users, and others to avoid relying on a cloud vendor whose security posture is wholly insufficient to match up against a threat actor the organization has worries about, or help them steer away from hiring API developers at a software support firm that has suffered repeated, simple security breaches. As some have suggested, this could include asking vendors and others in an organization’s supply chain for an AI bill of materials, or “AI-BOM” (modeled after a software bill of materials, or SBOM)56

Seriously complicating many of these efforts, of course, is just how much of the data in the AI supply chain either touches highly opaque corporate components—or depends on datasets uploaded to freely available websites with often unclear chains of custody and potentially obscured origins. Again, however, the solution is not to immediately treat these situations as unique without examining the applicability of existing best practices to specific risks. Some of the same could apply to vendors from which companies buy their software, which may not wish to make source code available to customers or to provide potential buyers with comprehensive lists of all the contractors, vendors, and dependent software packages on which their products and services were built. Much of the same also pertains to open-source software, too, where companies and developers must come up with ways to manage the risks that arise from a subset of less-well-maintained software or from otherwise well-maintained software that a threat actor compromises.57 In both cases, companies can use audits, continuous monitoring, and other measures to still mitigate risk from complex supply chains. 

Just as heavily software-dependent companies should conduct due diligence on and assess their prospective vendors’ cybersecurity (and their vendors’ cybersecurity, and so on) to avoid major security lapses and vulnerabilities, AI organizations can do some degree of risk assessment and mitigation for the data suppliers in the AI supply chain (Figure 5). 

These supply chain security measures can be applied to AI-specific data risks, too, where existing best practices fail to properly secure data components of the AI supply chain. Companies can require that new partners and vendors attest to the measures they take to mitigate risks of poisoning of training data, such as by carrying out appropriate data filtering.58 Universities could evaluate their data dependencies in their AI supply chain and, in doing so, catalogue instances where organizations do not mention poisoning in their data security plans. Government agencies could ensure that any company pitching them on a contract for an externally hosted or already trained, to-be-internally-migrated AI model spell out the steps they have taken to test for and mitigate potential threats of neural backdoors (either through training data or model architectures)—which may be exactly the kind of flaw a nation-state would want moved down the supply chain into a government computer system. Here, the concept of focusing on the supply chain itself can be effective in helping shield against both widely held and AI-unique risks to data components across the AI supply chain.

Figure 5: Approach three illustrated 

Conclusion and recommendations

The fact is governments, companies, universities, individuals, and others pursuing AI R&D will not stop collecting, labeling, disseminating, using, and producing tremendous volumes of data. Therefore, security of the data in the AI supply chain remains evermore paramount to mitigating risks of breaches and data interception, shielding data and resulting AI technologies from theft (including by competitors), enhancing protections for individuals’ privacy, bolstering public trust, limiting organizations’ liability risk, and strengthening US national security. 

Breaking down the seven data components of the AI supply chain can enable developers, users, maintainers, governors, and securers of AI technologies to understand the data components they depend upon, how they interact with and relate to one another, and the varied sources and entangled suppliers. It can then empower organizations to take one of many different existing data security and supply chain security approaches—including data at rest vs. in motion vs. in processing, threat actor risk, and supply chain due diligence and risk management—to map their concerns about data in the AI supply chain to specific, established best practices. More broadly, however, the concept of data in the AI supply chain promises something else for policymakers: the ability to see the whole data supply chain picture at once, leading to more cohesive policymaking. 

This paper makes the following three recommendations: 

  1. Developers, users, maintainers, governors, and securers of AI technologies should map the data components of the AI supply chain to existing cybersecurity best practices—and use that mapping to identify where existing best practices fall short for AI-specific risks to the data components of the AI supply chain. In the former case, they should use the framework of data at rest vs. in motion vs. in processing and the framework of analyzing threat actor capabilities to pair encryption, access controls, offline storage, and other measures (e.g., NIST SP 800-53, ISO/IEC 27001:2022) against specific data components in the AI supply chain depending on each data component’s current state, the threat actor(s) pursuing it, and the traditional IT security controls the organization already has in place. In the latter case, developers, users, maintainers, governors, and securers of AI technologies should recognize how existing best practices will inadequately prevent the poisoning of AI training data and the insertion of behavioral backdoors into neural networks by manipulating a training dataset or a model architecture. They should instead look to emerging research on how to best evaluate training data to filter out poisoned data examples and how to robustly test network behavior and architectures to mitigate the risk of a bad actor inserting a neural backdoor, which they can activate after model deployment. 
  2. Developers, users, maintainers, governors, and securers of AI technologies should “Know Your Supplier,” using the supply chain-focused approach to mitigate both AI-specific and non-AI-specific risks to the data components of the AI supply chain. Those sourcing data for AI systems—whether training data, APIs, SDKs, or any of the other data supply chain components—should implement best practices and due diligence measures to ensure they understand the entities sourcing or behind the sources of different components. For example, if a university website has a public repository of testing datasets for image recognition, language translation, or autonomous vehicle sensing, did the university internally develop those testing datasets, or is it hosting those testing datasets on behalf of third parties? Can third parties upload whatever data they want to the public university website? What are the downstream controls on which entities can add data to the university repository—data which companies and other universities then download and use as part of their AI supply chains? Much like a company should want to understand the origins of a piece of software before installing it on the network (e.g., is it open-source, provided by a company, if so which company in which country, etc.), an organization accessing testing data to measure an AI model or using any other data component of the AI supply chain should understand the underlying source within the supply chain. Best practices in know-your-customer due diligence, such as in the financial sector and export control space, and in the supply chain risk management space, such as from cybersecurity and insurance companies, can provide AI-dependent organizations with checklists and other tools to make this happen. Avoiding entities potentially subject to adversarial foreign nation-state influence, data suppliers not sufficiently vetting the data they upload, and so forth will help developers, users, maintainers, governors, and securers of AI technologies to bring established security controls to the data in the AI supply chain itself. In the case of both non-AI-specific and AI-specific risks to data, organizations can and should use this supply chain due diligence approach to ensure their vendors, customers, and other partners are implementing the right controls to protect against risks of model weight theft, training data manipulation, neural network backdooring through model architecture manipulation, and everything in between—drawing on the two categories of mitigations implemented as part of the first recommendation. 
  3. Policymakers should widen their lens on AI data to encompass all data components of the AI supply chain. This includes assessing whether sufficient attention is given to the diversity of data use cases that need protection (e.g., not just training data for chatbots but for transportation safety or drug discovery) and whether they have mapped existing security best practices to non-AI-specific and AI-specific risks. As multiple successive US administrations explore how they want to approach the R&D and governance of AI technologies, data continues to be a persistent focus of discussion. It comes up in everything from copyright litigation to national security strategy debates. The United States’ previous policy focus on training data quantity, and little else, has already prompted policymakers to avoid discussing comprehensive data privacy and security measures, which now—in light of Chinese AI advancements and concern about AI model weight dissemination—are suddenly more relevant. To avoid these cycles in the future, where policy overfocuses on one AI data element when in fact many are relevant simultaneously, policymakers should take a comprehensive view of the data components of the AI supply chain. The framework offered in this paper, spanning seven data components, is one potential guide—though again, policymakers need not stick to necessarily one framework. What is most critical to avoid is developing data security policies that protect some data components of the AI supply chain (e.g., training data) while leaving others highly exposed (e.g., APIs). An expanded view of the different data components, the components’ interaction, and the often multiple and shifting roles of suppliers should help inform better federal legislation, regulation, policy, and strategy—as well as engagements with other countries and US states. Right now, organizations such as the Congressional commerce committees, the Commerce Department (including because it implements export controls and the Information and Communications Services and Technologies supply chain program), the Defense Department (with all its current AI procurement), and the Federal Trade Commission (with responsibility for enforcing against unfair and deceptive business practices) should stress-test their assumptions about how to best protect AI data, and whether existing best practices achieve desired security outcomes, against this data component framework. This requires asking at least two questions. Do their existing security, governance, or regulatory approaches—e.g., in the security requirements used in Defense Department AI procurement, in how the Federal Trade Commission thinks about enforcing best practices for AI data security—apply well to a diversity of data use cases that need protection, such as with testing datasets for self-driving vehicle safety or training datasets for cutting-edge drug discovery? List out the use cases beyond chatbots that are not top of mind but are highly relevant from a security perspective, from defense to shipping and logistics to healthcare. And second, are they parsing out which risks they have concerns about, vis-à-vis AI-related data, that are specific to AI versus risks to data in general? For both categories, consider how the framework and some of the security mitigations cited in this report (e.g., NIST, ISO, new research on detecting neural backdoors, etc.) can serve as best practices to improve outcomes. 

The more governments, companies, civil society groups, individuals, and others move AI technologies into areas ranging from e-commerce, social media, and business administration to manufacturing, healthcare, transportation, and defense, the more important it becomes to secure all data related to AI technologies. A complex set of data components in the AI supply chain demands policy and security practices that account for the entire supply chain and all its complexity at once, or at least through piecemeal efforts that add up to the whole—making existing data security and supply chain security best practices, paired with newer responses to AI-specific data risks, an optimal place to start. 

About the author

Justin Sherman is a nonresident senior fellow at the Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Tech Programs. His work at the Atlantic Council focuses on cybersecurity policy, data security, digital public infrastructure, physical internet infrastructure such as submarine cables, and AI supply chains. His work also involves China and a range of issues related to Russia.

Sherman is the founder and CEO of Global Cyber Strategies, a Washington, DC-based research and advisory firm. He is also an adjunct professor at Georgetown University’s School of Foreign Service and a distinguished fellow at Georgetown Law’s Center on Privacy and Technology.

Acknowledgements

The author would like to thank Trey Herr, Nitansha Bansal, Kemba Walden, Devin Lynch, Harriet Farlow, Ben Goldsmith, and Kenton Thibaut for their comments on earlier drafts of this report, as well as all the individuals who participated in background and Chatham House Rule discussions about issues related to data, AI applications, and the concept of an AI supply chain. 

Explore the program

The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

1    This is not true in every single case. See, for example, Ashish Vaswani et al., “Attention Is All You Need,” arXiv, June 12, 2017 [last revision, August 2, 2023], https://doi.org/10.48550/arXiv.1706.03762.
2    Such uses are not inherently positive for the rigor (e.g., result accuracy, reproducibility, etc.) of academic research. See: Miryam Naddaf, “AI Linked to Explosion of Low-Quality Biomedical Research Papers,” Nature 641, no. 8065, (May 21, 2025): 1080–81, https://doi.org/10.1038/d41586-025-01592-0.
3    See: NIST’s definition of “supply chain” (source: CNSSI 4009-2015). “Glossary: Supply Chain,” US National Institute of Standards and Technology: Computer Security Resource Center, accessed August 26, 2025, https://csrc.nist.gov/glossary/term/supply_chain.
4    Thanks to Sara Ann Brackett for discussion of her forthcoming paper.
5    Aspen K. Hopkins et al., “Recourse, Repair, Reparation, and Prevention: A Stakeholder Analysis of AI Supply Chains,” arXiv, July 3, 2025 [submit date], https://doi.org/10.48550/arXiv.2507.02648.
6    “NSA’s AISC Releases Joint Guidance on the Risks and Best Practices in AI Data Security,” US National Security Agency: Central Security Service, press release, May 22, 2025, https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4192332/nsas-aisc-releases-joint-guidance-on-the-risks-and-best-practices-in-ai-data-se/.
7    A single company, for instance, might find that maintaining better documentation for AI applications and data allows it to not just address vulnerabilities in those systems, but also the accidental failures, human errors, and bureaucratic issues (like the purchasing of new systems), too.
8    Kai-Fu Lee, an AI industry leader and author who has advanced this “might” view about data quantity, received wide acceptance in policy, industry, and media circles for his book, AI Super-Powers, first published in 2018. See: Andy Bast, Interview: “China’s Greatest Natural Resource May Be Its Data,” 60 Minutes, CBS News, July 14, 2019, https://www.cbsnews.com/news/60-minutes-ai-chinas-greatest-natural-resource-may-be-its-data-2019-07-14/; Michael Chiu, Interview: “Kai-Fu Lee’s Perspectives on Two Global Leaders in Artificial Intelligence: China and the United States,” McKinsey Global Institute, June 14, 2018, https://www.mckinsey.com/featured-insights/artificial-intelligence/kai-fu-lees-perspectives-on-two-global-leaders-in-artificial-intelligence-china-and-the-united-states
9    Nicholas Thompson, Interview (Michael Kratsios): “The Case for a Light Hand With AI and a Hard Line on China,” WIRED, January 14, 2020, https://www.wired.com/story/light-hand-ai-hard-line-china/; Justin Sherman, “Don’t be Fooled by Big Tech’s Anti-China Sideshow,” WIRED, July 30, 2020, https://www.wired.com/story/opinion-dont-be-fooled-by-big-techs-anti-china-sideshow/.
10    “NTIA Solicits Comments on Open-Weight AI Models,” US Department of Commerce, press release, February 21, 2024, https://www.commerce.gov/news/press-releases/2024/02/ntia-solicits-comments-open-weight-ai-models.
11    90 FR 4544 (2025).
12    Dan Milmo et al., “‘Sputnik Moment’: $1tn Wiped off US Stocks after Chinese Firm Unveils AI Chatbot,” The Guardian, January 27, 2025, https://www.theguardian.com/business/2025/jan/27/tech-shares-asia-europe-fall-china-ai-deepseek. Notably, the reaction described, of course, could have had more nuance in articulating the ways that a US company’s research or advancement might benefit all kinds of companies, including other ones in the United States.
13    See: Milad Alucozai, Will Fondrie, and Megan Sperry, “From Data to Drugs: The Role of Artificial Intelligence in Drug Discovery,” Wyss Institute, January 9, 2025, https://wyss.harvard.edu/news/from-data-to-drugs-the-role-of-artificial-intelligence-in-drug-discovery/; Chen Fu and Qiuchen Chen, “The Future of Pharmaceuticals: Artificial Intelligence in Drug Discovery and Development,” Journal of Pharmaceutical Analysis 15, no. 8 (August 2025), https://doi.org/10.1016/j.jpha.2025.101248.
14    See: Sella Nevo et al., Securing AI Model Weights: Preventing Theft and Misuse of Frontier ModelsRAND, May 2024, https://www.rand.org/pubs/research_reports/RRA2849-1.html; Janet Egan, Paul Scharre, and Vivek Chilukuri, Promote and Protect America’s AI AdvantageCenter for a New American Security, January 20, 2025, https://www.cnas.org/publications/commentary/promote-and-protect-americas-ai-advantage; Alan Z. Rozenshtein, “There Is No General First Amendment Right to Distribute Machine-Learning Model Weights,” Lawfare, April 4, 2024, https://www.lawfaremedia.org/article/there-is-no-general-first-amendment-right-to-distribute-machine-learning-model-weights; Raffaele Huang, Stu Woo, and Asa Fitch, “Everyone’s Rattled by the Rise of DeepSeek—Except Nvidia, Which Enabled It,” Wall Street Journal, February 2, 2025, https://www.wsj.com/tech/ai/nvidia-jensen-huang-ai-china-deepseek-51217c40
15    Matt Sheehan, “Much Ado About Data: How America and China Stack Up,” Paulson Institute: MacroPolo, July 16, 2019, https://archivemacropolo.org/ai-data-us-china/?rp=e.
16    Joshua New, “Why Do People Still Think Data Is the New Oil?”, Center for Data Innovation, January 16, 2018, https://datainnovation.org/2018/01/why-do-people-still-think-data-is-the-new-oil/.
17    Claudia Wilson and Emmie Hine, “Export Controls on Open-Source Models Will Not Win the AI Race,” Just Security, February 25, 2025, https://www.justsecurity.org/108144/blanket-bans-software-exports-not-solution-ai-arms-race/.
18    Kenton Thibaut, “What DeepSeek’s Breakthrough Says (and Doesn’t Say) About the ‘AI race’ with China,” New Atlanticist (blog), January 28, 2025, https://www.atlanticcouncil.org/blogs/new-atlanticist/what-deepseeks-breakthrough-says-and-doesnt-say-about-the-ai-race-with-china/
19    See, for instance, among the many recent articles and headlines: Jason Ross Arnold, “High-Risk AI Models Need Military-Grade Security,” War on the Rocks, August 6, 2025, https://warontherocks.com/2025/08/high-risk-ai-models-need-military-grade-security/; Ryan Lovelace, “Congress Digs into China’s Alleged Theft of America’s AI Secrets,” Washington Times, May 7, 2025, https://www.washingtontimes.com/news/2025/may/7/congress-digs-chinas-alleged-theft-americas-ai-secrets/
20    The frantic coverage of every new AI development by many media outlets does little to help resolve the data challenges surrounding AI R&D.
21    See the discussion by authors at the Belfer Center about whether “the United States has essentially conceded the [AI] race [with China] because of concerns over the average individual’s privacy”: Graham Allison and Eric Schmidt, Is China Beating the U.S. to AI Supremacy? (Cambridge: Harvard Kennedy School Belfer Center, August 2020), https://www.belfercenter.org/publication/china-beating-us-ai-supremacy
22    Nitasha Tiku, “Big Tech: Breaking Us Up Will Only Help China,” WIRED, May 23, 2019, https://www.wired.com/story/big-tech-breaking-will-only-help-china/; Josh Constine, “Facebook’s Regulation Dodge: Let Us, or China Will,” TechCrunch, July 17, 2019, https://techcrunch.com/2019/07/17/facebook-or-china/.
23    While there are many differences between the US and Chinese environments vis-à-vis data, these notions are not entirely true. See: Samm Sacks and Lorand Laskai, “China’s Privacy Conundrum,” Slate, February 7, 2019, https://slate.com/technology/2019/02/china-consumer-data-protection-privacy-surveillance.html; Sam Bresnick, “The Obstacles to China’s AI Power,” Foreign Affairs, December 31, 2024, https://www.foreignaffairs.com/china/obstacles-china-ai-military-power.
24    Jessie Yeung, “China’s Sitting on a Goldmine of Genetic Data – and It Doesn’t Want to Share,” CNN, August 12, 2023, https://www.cnn.com/2023/08/11/china/china-human-genetic-resources-regulations-intl-hnk-dst.
25    See: Beatriz Botero Arcila, AI Liability Along the Value Chain (San Francisco: Mozilla Foundation, April 2025), https://blog.mozilla.org/netpolicy/files/2025/03/AI-Liability-Along-the-Value-Chain_Beatriz-Arcila.pdf; Max von Thun and Daniel A. Hanley, Stopping Big Tech from Becoming Big AI (San Francisco: Mozilla Foundation, October 2024), https://blog.mozilla.org/wp-content/blogs.dir/278/files/2024/10/Stopping-Big-Tech-from-Becoming-Big-AI.pdf; SPEAR Invest, “Diving Deep into the AI Value Chain,” NASDAQ, December 18, 2023, https://www.nasdaq.com/articles/diving-deep-into-the-ai-value-chain. See also: “The Value Chain,” Harvard Business School: Institute for Strategy and Competitiveness, accessed August 26, 2025, https://www.isc.hbs.edu/strategy/business-strategy/Pages/the-value-chain.aspx
26    While recognizing the necessity of evaluating AI in relation to the social, political, and economic systems that researchers, companies, and others operate within and use to build AI technologies—such as exploitative labor systems and the environmental system—this report focuses, for scope- and length-limitation purposes, on a typology of the digital and data elements themselves of relevance for AI R&D. For essential reading on other systems that generate data, move data into AI systems, and much more, see: Tamara Kneese, Climate Justice and Labor Rights: Part I: AI Supply Chains and Workflows (New York: AI Now Institute, August 2023), https://ainowinstitute.org/general/climate-justice-and-labor-rights-part-i-ai-supply-chains-and-workflows; Kashmir Hill, Your Face Belongs to Us: A Tale of AI, a Secretive Startup, and the End of Privacy (New York: Penguin Random House, 2023); Billy Perrigo, “Exclusive: OpenAI Used Kenyan Workers on Less Than $2 Per Hour to Make ChatGPT Less Toxic,” TIME, January 18, 2023, https://time.com/6247678/openai-chatgpt-kenya-workers/; Adrienne Williams, Milagros Miceli, and Timnit Gebru, “The Exploited Labor Behind Artificial Intelligence,” Noema Magazine, Berggruen Institute, October 13, 2022, https://www.noemamag.com/the-exploited-labor-behind-artificial-intelligence/.
27    Qiang Hu et al., “Large Language Model Supply Chain: Open Problems from the Security Perspective,” arXiv, November 3, 2024, https://arxiv.org/abs/2411.01604 (see, in particular, page 2’s LLM supply chain map). 
28     “Registry of Open Data on AWS,” Amazon Web Services (AWS), accessed June 16, 2025, https://registry.opendata.aws
29    See: Building AI for India! (website), accessed June 16, 2025, https://ai4bharat.iitm.ac.in; Tsinghua University: Institute for Artificial Intelligence Foundation Model Research Center (website), accessed June 16, 2025, https://fm.ai.tsinghua.edu.cn.
30    Shayne Longpre et al., “In-House Evaluation Is Not Enough: Towards Robust Third-Party Disclosure for General-Purpose AI,” arxiv.org, March 25, 2025, https://arxiv.org/abs/2503.16861 (an important point the authors make is to call the idea that general-purpose AI systems “are unique from existing software and require special disclosure rules” a “misconception”). 
31    For example, see more on how homomorphic encryption can be used to encrypt data, including AI training data, while still enabling computation on it: “Combining Machine Learning and Homomorphic Encryption in the Apple Ecosystem,” Machine Learning Research, Apple, October 24, 2024, https://machinelearning.apple.com/research/homomorphic-encryption.
32    SP 800-53 Rev. 5.1.1, SC-28: “Protection of Information at Rest,” US National Institute of Standards and Technology, accessed June 27, 2025, https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SC-28.
33    SP 800-53 Rev. 5.1.1, SC-08: “Transmission Confidentiality and Integrity,” US National Institute of Standards and Technology, accessed June 27, 2025, https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SC-08
34    “The NIST Cybersecurity Framework (CSF) 2.0,” US National Institute of Standards and Technology, February 26, 2024, https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf
35    “PR.DS-10: The Confidentiality, Integrity, and Availability of data-in-Use Are Protected,” CSF Tools, accessed June 27, 2025, https://csf.tools/reference/nist-cybersecurity-framework/v2-0/pr/pr-ds/pr-ds-10/.
36    See: MJ Raber, “SOC 2 Controls: Encryption of Data at Rest – An Updated Guide,” Security Boulevard, Techstrong Group, December 6, 2022, https://securityboulevard.com/2022/12/soc-2-controls-encryption-of-data-at-rest-an-updated-guide/.
37    Anthropic, for example, talks about using more than 100 different security controls to protect model weights. See: “Activating AI Safety Level 3 Protections,” Anthropic, May 22, 2025, https://www.anthropic.com/news/activating-asl3-protections
38    For example, a bad actor could generate training examples with incorrect or altered labels with the express purpose of causing someone to unintentionally train a harmful or erroneous model. Apostol Vassilev et al., NIST Trustworthy and Responsible AI – NIST AI 100-2e2025Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations, US National Institute of Standards and Technology (March 2025): 20, https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.100-2e2025.pdf.
39    Vassilev et al., NIST Trustworthy and Responsible AI , 20–27.
40    “Framework for Assessing Risks,” US Office of the Director of National Intelligence (ODNI), April 2021, https://www.dni.gov/files/NCSC/documents/supplychain/Framework_for_Assessing_Risks_-_FINAL_Doc.pdf
41    As the noted in the cited ODNI publication, “Key to this is using the latest threat information to determine if specific and credible evidence suggests an item or service might be targeted by adversaries. But, it must be noted, that while adversaries wish to do harm, they can only be successful if systems, processes, services, etc. are vulnerable to attacks.”
42    These are examples provided by the author of how weaknesses can be “inherent” to a system in this context; they are not examples listed in the cited ODNI publication.
43    US Office of the Director of National Intelligence, “Framework for Assessing Risks.”
44    See: ISO/IEC 27001:2022, “Information Security, Cybersecurity and Privacy Protection — Information Security Management Systems — Requirements,” International Organization for Standardization, 2022, https://www.iso.org/standard/27001.
45    See also some of the security controls and risk mitigations laid out in: Sella Nevo et al., Securing AI Model Weights.
46    See: Hossein Souri et al., “Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch,” arXiv, June 16, 2021, https://arxiv.org/abs/2106.08970.
47    See: Wei Guo, Benedetta Tondi, and Mauro Barni, “An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences,” arXiv, November 16, 2021, https://arxiv.org/abs/2111.08429.
48    
49    
50    Anqing Zhang et al., “Defending Against Backdoor Attack on Deep Neural Networks Based on Multi-Scale Inactivation,” Information Sciences 690, no. 121562 (February 2025), https://www.sciencedirect.com/science/article/abs/pii/S0020025524014762
51    Harry Langford et al., “Architectural Neural Backdoors from First Principles,” arXiv, February 10, 2024, https://arxiv.org/abs/2402.06957.
52    See: Article 32, GDPR (General Data Protection Regulation): Security of Processing, Intersoft Consulting, accessed September 4, 2025, https://gdpr-info.eu/art-32-gdpr/.
53    See: Gus Tomlinson, “KYC Process: Ask the Right Questions,” GBG, accessed June 27, 2025, https://www.gbg.com/en/blog/kyc-process-ask-the-right-questions/.
54    See: “Guidance on End-User and End-Use Controls and U.S. Person Controls,” US Department of Commerce, Bureau of Industry and Security, accessed June 27, 2025, https://www.bis.gov/licensing/guidance-on-end-user-and-end-use-controls-and-us-person-controls#“KnowYourCustomerGuidance”andRedFlags.
55    See: “Best Practices in Cyber Supply Chain Risk Management,” US National Institute of Standards and Technology, accessed June 27, 2025, https://csrc.nist.gov/CSRC/media/Projects/Supply-Chain-Risk-Management/documents/briefings/Workshop-Brief-on-Cyber-SCRM-Vendor-Selection-and-Management.pdf; “Third-Party Cyber Risks Impact All Organizations,” Marsh, April 22, 2025, https://www.marsh.com/en/services/cyber-risk/insights/defining-uncovering-cyber-risks-digital-supply-chain.html.
56    Shaked Rotlevi, “AI-BOM: Building an AI Bill of Materials,” WIZ, July 20, 2025, https://www.wiz.io/academy/ai-bom-ai-bill-of-materials.
57    See: Andy Greenberg and Matt Burgess, “The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind,” WIRED, April 3, 2024, https://www.wired.com/story/jia-tan-xz-backdoor/.
58    In addition to the above discussion of poisoning, see: Nicholas Carlini et al., “Poisoning Web-Scale Training Datasets is Practical,” arXiv, February 20, 2023, https://arxiv.org/abs/2302.10149.

The post Securing data in the AI supply chain   appeared first on Atlantic Council.

]]>
Leveraging Beijing’s playbook to fortify DFC for global competition https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/leveraging-beijings-playbook-to-fortify-dfc-for-global-competition/ Tue, 02 Sep 2025 12:00:00 +0000 https://www.atlanticcouncil.org/?p=870371 A close look at Chinese development lending practices reveals lessons for the United States on why Chinese deals succeed—and fail—and how the United States should reform its own institutions.

The post Leveraging Beijing’s playbook to fortify DFC for global competition appeared first on Atlantic Council.

]]>

Bottom lines up front

  • DFC is delivering on its mandates: investing in low- and middle-income countries, generating returns, and outcompeting China for key deals. Congress must reauthorize it before the October 6 deadline.
  • A close look at Chinese development lending practices reveals lessons for the United States on why Chinese deals succeed—and fail—and how the United States should reform its own institutions.
  • Congress should use reauthorization as an opportunity to make DFC more versatile, risk tolerant, scalable, transparent, and efficient.

Introduction

This October, the mandate for one of the US government’s most effective tools in its global competition with China is set to expire. The International Development Finance Corporation (DFC) was created under the first Trump administration with the goal of mobilizing private capital to promote economic development in low-income countries (LICs) and lower-middle-income countries (LMICs) while advancing US foreign policy interests.

In the Better Utilization of Investments Leading to Development (BUILD) Act, the bill that first established DFC, China is never mentioned by name. But China’s shadow looms large over references to “debt sustainability” and providing countries with an “alternative to state-directed investments.” When the BUILD Act was written seven years ago, US policymakers were just starting to take note of China’s growing presence in LICs and LMICs. Since then, China has become the top trading partner of 145 countries, making up roughly 70 percent of the world’s population. Between 146 and 150 countries have joined the Belt and Road Initiative (BRI), Xi Jinping’s $1 trillion flagship lending program. China is the world’s largest official creditor, and its lending initiatives have won Beijing significant geopolitical influence.

However, in the last seven years, DFC has turned the United States from a passive observer of China’s meteoric rise as a development lender into a serious contender in an intensifying front of competition with Beijing. DFC is making good on its mandates: advancing development objectives in LICs and LMICs, furthering US foreign policy goals, and winning deals that China wanted. Its lending has exceeded $50 billion to 114 countries, impacting more than 200 million people and businesses worldwide. This includes multiple cases in which DFC stepped in to provide financing that outcompeted Beijing, from the Elefsina Shipyard in Greece to the acquisition of a telecommunications company in the Pacific Islands and the Lobito Corridor railway in Zambia, Angola, and the Democratic Republic of the Congo (DRC).

DFC is one of the United States’ few remaining tools of positive economic statecraft to compete with China in global development—and it must be protected. Congress has an opportunity to fine-tune DFC’s operations and set it up for even greater success before the reauthorization deadline on October 6. In that spirit, this brief explores three case studies in Chinese development lending, what they teach us about why China’s lending programs succeed—and fail—and how Congress can make DFC an even sharper tool.

Case study 1: Jakarta-Bandung railway

China’s approach: Flexible mandates, high risk tolerance

When Beijing is asked to participate in multilateral debt relief initiatives, there is an insistence that one of its two state-owned policy banks, the China Development Bank (CDB), is a commercial lender, and not an official creditor. As a state-owned bank acting purely in its own commercial interests, Beijing argues, CDB is not furthering the PRC’s foreign policy goals, and it should not be subject to the same transparency requirements as other official lenders.

As revealed in an AidData analysis of CDB lending practices, the bank often behaves like a commercial institution adhering to standard commercial lending practices such as lending at floating market interest rates. However, when Beijing deems a project strategically important, CDB will suddenly change its practices, offering unusually concessional lending terms.

CDB came across one such strategically important project in 2014, when the Indonesian government announced a bid to finance a high-speed rail line connecting two of its largest cities, Jakarta and Bandung. Just a few months earlier, during a trip to Indonesia, Xi had announced his intention to build a “21st Century Maritime Silk Road” to enhance connectivity throughout Southeast Asia. This proposed maritime silk road became the “road” in “One Belt, One Road,” the lending program now known as the Belt and Road Initiative. The Indonesian government’s newly announced rail project presented an opportunity to develop a strong early example to showcase Xi’s new initiative in action.
From January 2014 to May 2017, CDB and the Japan International Cooperation Agency (JICA) submitted competing bids to bankroll the Jakarta-Bandung High Speed Rail project. JICA offered to finance 75 percent of the project at a 0.1 percent interest rate, contingent on the Indonesian government providing a sovereign repayment guarantee. CDB’s counteroffer was to finance 100 percent of the project at a 2 percent interest rate, with a lower overall cost and shorter construction timeline, provided the Indonesian government guaranteed repayment.

Indonesian President Joko Widodo surprised observers by rejecting both offers, citing a desire to avoid taking on substantial sovereign debt. JICA responded with a 50 percent reduction in the debt that the government would need to back with a sovereign guarantee. But CDB offered the winning bid: an arrangement that would require Indonesia to take on no debt whatsoever. Instead, the bank would create an off-government balance sheet by lending to a special purpose vehicle, a separate legal entity jointly owned by Chinese and Indonesian state-owned enterprises, created solely for the purpose of financing and building the Jakarta-Bandung High Speed Railway. This would allow CDB and Widodo to work around the Indonesian government’s debt ceiling. The final loan was far more concessional than CDB’s typical offers, and far more concessional than the minimum standards the Organisation for Economic Co-operation and Development uses to define concessionality.

CDB blurs the lines between its commercial, developmental, and geostrategic purposes and, as a result, Beijing gets to have it both ways. CDB protects its balance sheet, evades its responsibility to participate in multilateral debt relief initiatives, and lends at far below-market rates when an opportunity arises to advance the government’s policy objectives.

Lessons for the United States

Flexibility can be a strength. DFC has a dual mandate: support sustainable development in LICs and LMICs and advance US foreign policy interests. This has implications for where DFC operates, and there is currently widespread disagreement among experts on this front.

The conversation around DFC’s reauthorization is bifurcated between two camps. In one corner, development practitioners voice frustration with DFC’s gradual shift toward lending to richer countries. These observers rightly argue that US foreign policy interests have led DFC to stray from its original mandate to prioritize LICs and LMICs. In the other corner, national security analysts advocate harnessing DFC’s demonstrated effectiveness to respond to the short-term foreign policy challenges of the day.

Dealing with China means swimming in murky waters. Beijing blurs the lines between the commercial, the developmental, and the geostrategic, and a heavily siloed US system will not meet the multifaceted and overlapping challenges that the United States must address. While DFC should not neglect its development mandate, it should also have the flexibility to respond to challenges where they occur.

High risk tolerance is critical. Risk tolerance is an oft-cited advantage for Chinese lenders, and an oft-cited disadvantage for DFC. DFC’s cautiousness limits its ability to move quickly and lean into opportunities where the returns are nonmarket geostrategic wins.

Case study 2: DRC Sicomines copper-cobalt deal

China’s approach: Extreme high-volume financing

In 2007, the Export-Import Bank of China and two Chinese state-owned construction firms signed an agreement with the government of the DRC for the nation’s largest resources-for-infrastructure (RFI) deal. RFI deals, in which loans for infrastructure development are repaid with natural resources, are commonplace for China.

Under this deal, the Chinese parties would provide a staggering $9 billion of loans—more than three times the DRC’s annual government budget of $2.7 billion. The deal included $3 billion earmarked for developing and operating the Sicomines copper-cobalt mine, with the Chinese consortium owning 68 percent, and $6 billion earmarked for postwar rebuilding projects following the Second Congo War.

Ultimately, the deal was renegotiated several times. In 2009, the International Monetary Fund (IMF) called for a renegotiation due to concern over the DRC’s capacity to repay the loan. In 2021, the deal faced renewed public scrutiny, and DRC President Félix Tshisekedi launched an audit that found that the agreement presented “an unprecedented harm in the history of the DRC.” China had only spent a fraction of the amount promised for postwar reconstruction projects—reaping $10 billion in profits and giving the DRC only $822 million in return. Last year, this gave the country leverage to renegotiate the deal once more and secure an agreement that increased the infrastructure budget by $4 billion and gave the DRC a greater share of mining revenues.

In this case, Beijing was willing to commit an astounding volume of capital to a highly risky endeavor, but China has lent far greater amounts to critical minerals over the last two decades, nearly $57 billion from 2000 to 2021.

It is difficult to overstate the geopolitical gains that have resulted from high-volume financing deals like this one, which have enabled Beijing to capture over 70 percent of the world’s rare earths extraction and almost 90 percent of processing capacity. Beijing has unparalleled dominance over the essential inputs underpinning the construction of the modern world. To build everything from fighter jets to consumer electronics, MRI machines, and electric vehicles, the rest of the world is now, to some extent, dependent on Beijing’s good graces.

Lessons for the United States

The United States cannot compete with China on a dollar-for-dollar basis, but current resources are insufficient. The United States does not have to close the gap between what it and China can offer globally. US lenders can be strategic, focus on key sectors and countries, and double down on areas in which the United States has a competitive advantage. Narrow the gap it must, though. Small, strategic investments could not have won China supply chain dominance in critical minerals. The current level of resources dedicated to this challenge are not proportionate to the severity of the threat

Invest with foresight. China’s dominance in critical minerals was built over decades of placing strategic bets on resource rich countries with assets that have national security implications. Beijing pledged $9 billion for the Sicomines copper-cobalt deal in 2007, many years before terms like “critical minerals,” “electric vehicles” or “5G” entered the public lexicon. DFC should similarly aim to make strategic investments in the supply chains of the future.

Case study 3: 2025 Sino Metals Zambia dam disaster

China’s approach: Move fast, break things

This February, a dam built by Sino-Metals Leach Zambia, a Chinese state-owned mining firm, burst, spilling toxic mining waste into the Kafue River in Zambia. The damage was catastrophic and unprecedented. The river, now an acid-leached wasteland, had supplied drinking water for roughly 5 million people and supported the livelihood of roughly 20 million farmers, fishermen, and industrial workers.

The dam held waste from nearby mines that were slated to serve a critical role in meeting an ambitious development goal: triple Zambia’s copper output by 2033. As the Zambian government raced forward in pursuit of this objective, the country became increasingly reliant on the only international partner who could meet the speed and scale they required: China.

Over the last several months, Zambian civil society has demanded greater transparency and accountability in the government’s mining deals. Thanks to public pressure to disclose further information, we now have a detailed record of the negligence behind this disaster.

It’s clear now that prioritizing speed led the parties involved to overlook negligence in terms of environmental, social, and governance (ESG) standards. Sino Metals operated within the Zambia-China Economic and Trade Cooperation Zone, Africa’s first special economic zone designed to attract international investment through incentives like tax breaks and streamlined approvals, including environmental approvals. In 2014, a Zambian auditor warned that tailings dams, large embankments used to store mining waste, were being systemically mismanaged in Zambia’s Copperbelt. Nevertheless, Sino Metals decided to rely on a tailings dam to store copper mining waste from its Chambishi Leach Plant. Rather than building a new dam, it was faster for the company to raise the wall of an existing dam built many years earlier.

Once built, the company repeatedly failed to conduct routine inspections, and there is no evidence to suggest that the dam was managed by licensed engineers. Sino Metals’ sister company, NFCA Africa Mining, admitted to disregarding safety and environmental standards in an internal report. Zambian regulators and the Chinese project managers had many chances to prevent the disaster from happening. A 2017 study found that the groundwater near the Sino Mines facility was already contaminated. In 2022, Sino Mines expanded the dam once again.

Lessons for the United States

ESG standards and transparency are important competitive advantages for US-backed deals. The Sino Metals dam disaster was not a one-time occurrence. Beijing routinely scores own goals in the form of flagrant disregard for host countries’ environmental, labor, and anti-corruption standards. The Jakarta-Bandung high speed railway project managers sped through an environmental impact assessment that should have taken twelve to eighteen months in only seven days. The consequence: a fatal accident, flooded roads, ruined homes and farms, improper waste dumping, mass protests, and $1.49 billion in cost overruns.

Particularly in democracies sensitive to public opinion and countries facing civil society backlash against opaque Chinese deals, the United States should lean into this strategic edge.

Moving fast makes a difference. Paradoxically, speed is a commonly cited factor contributing to host countries’ preference for Chinese loans. While the United States should not save time by cutting regulatory corners, US-backed deals cannot afford to be burdened by needlessly lengthy bureaucratic timelines.

Policy recommendations

To promote thoughtful versatility:

  • Rethink the guidelines on where DFC operates. The BUILD Act mandates that DFC prioritize the provision of support to countries that meet the World Bank classifications for LICs and LMICs. The resulting arrangement excludes many countries with significant development needs that are classified as upper-middle-income countries (UMICs), often because of socioeconomic disparities or remittances. Examples include Mexico, Brazil, Tuvalu, Thailand, and Malaysia. Rather than relying on the World Bank’s rigid income classifications, DFC should revisit its lending criteria, borrowing from other official lenders’ practices.
  • Clarify the key terms of DFC’s dual mandate. The BUILD Act instructs DFC to “pursue highly developmental projects” and assess their “strategic value,” but does not put forward standard criteria to determine what is developmental or strategic. A Center for Strategic and International Studies analysis, which collected insights directly from US government development practitioners, found that different agencies apply varying standards for what qualifies as “highly developmental.” Setting standard definitions for these key terms will begin to bridge the divide between the two camps of development practitioners and national security analysts who have different visions for where DFC should operate.

To strengthen risk tolerance:

  • Establish an internal advisory council to provide guidance on projects that have the potential to generate nonmarket returns. The advisory council can weigh the project’s commercial viability against its implications for US strategic interests and judge whether the risk is acceptable to DFC’s balance sheet.
  • Transfer the responsibility to approve exceptions to the LIC and LMIC preference from the president of the United States to the DFC’s Board of Directors. Under current law, exceptions to this rule—41.6 percent of investments made in DFC’s first five years—must go up a lengthy approval chain to the highest authority in the United States, who is then expected to parse through highly technical financial terms to evaluate the project’s risk-return profile and repayment terms. Instead, LIC and LMIC preference exceptions should be approved by DFC’s board, a group of development finance and foreign policy experts from across federal agencies. Particularly amid heightened political scrutiny of US government spending, professional oversight may empower DFC to take calculated risks with greater assurance.
  • Evaluate investments at the portfolio level, not the individual project level. This creates space for DFC to take on, for example, a high-risk, high-reward mining project, provided the aggregate critical minerals portfolio is generating returns.
  • Authorize DFC—permanently. The life cycles of many current DFC projects extend well beyond another seven-year reauthorization period. In contrast, BRI loans have been steady, providing highly concessional, long-term financing that complements LIC and LMIC governments’ long-term economic development plans. Repeated reauthorization cycles disincentivize DFC from pursuing partnerships that require a long-term steady commitment. DFC has built credibility that warrants a longer leash. Despite weathering a global pandemic, significant leadership turnover, and two highly tumultuous presidential transitions, DFC is delivering on its mandates: investing in LICs and LMICs, generating returns, and outcompeting China for key deals.

To boost finance volume:

  • Triple DFC’s portfolio cap, from $60 billion to $180 billion. While this may sound like a hefty increase, $180 billion will only make up 12 percent of the $1.5 trillion infrastructure finance gap in LICs and LMICs. A larger portfolio cap will increase the total value of outstanding commitments that DFC can have at any given time and enable DFC to back bigger deals.
  • Fix the budget rule accounting for DFC’s equity investments. The BUILD Act granted DFC the authority to make direct equity investments, an arrangement that grants the United States unique influence by giving DFC partial ownership in individual companies and projects. Oftentimes, this means DFC earns a voice in management decisions, enabling DFC to ensure projects align with development and US policy goals. Unfortunately, this authority has been underutilized due to an administrative rule with an outsized impact. Under current federal budget rules, DFC’s equity investments are treated as grants, assuming a total loss on 100 percent of DFC’s equity investments. Instead, DFC’s equity investments should be reflected using net present value scoring, which accounts for the likelihood of financial return over time to determine the true cost to taxpayers.
  • Emphasize the importance of collaboration. The United States should pool funding with allies and partners’ development finance institutions to meet the scale and speed needed to match Chinese state-backed capital. DFC already has partnerships with Australia, Japan, and the Inter-American Development Bank; these partnerships should cut the burden of dealmaking in half, not double it. DFC should work with US partners to create standard due diligence requirements, term sheets, and agreements. This will create opportunities for more effective collaboration across institutions and help joint projects move forward faster.

To streamline operations:

  • Increase the threshold of investments subject to congressional notification. While the notification process allows for additional oversight and gives Congress the opportunity to raise concerns, this bar is currently set at $10 million, an extremely low threshold that imposes a significant administrative burden for roughly 60 percent of DFC transactions.
  • Improve staffing. DFC was built to be a lean and dynamic entity akin to a private corporation, but in practice, it has not been given the personnel and resources it needs to work efficiently. The Office of the Inspector General’s most recent report on DFC found that staffing was insufficient to perform robust site visits. DFC has been steadily growing its workforce and had a total of 675 employees in 2024, but the corporation has not released updated staffing figures since the US government terminated all probationary employees earlier this year. The World Bank has more than thirteen times as many employees managing a portfolio less than twice the size of DFC’s. Furthermore, the salaries of DFC’s investment professionals with prior deal experience are roughly a quarter of their private-sector peers’. Having more staff on board—and compensating them fairly—will help to move transactions through DFC’s project preparation workflows more efficiently.

Conclusion

The most common refrain in commentary on US-China competition in LICs and LMICs is that “don’t take China’s money” is not a policy. It is not tenable to beg host governments not to make deals with China, especially when China is the only option for meeting urgent development needs. For many years, experts have repeated the same recommendation to the US government: show up. Offer a US-led alternative to Chinese capital. DFC represents a major step in the right direction. The last seven years have been proof of concept. Now, Congress must scale it and commit resources that will allow DFC to live up to its full potential.

About the author

Related content

Explore the program

The Global China Hub tracks Beijing’s actions and their global impacts, assessing China’s rise from multiple angles and identifying emerging China policy challenges. The Hub leverages its network of China experts around the world to generate actionable recommendations for policymakers in Washington and beyond.

The post Leveraging Beijing’s playbook to fortify DFC for global competition appeared first on Atlantic Council.

]]>
The India-Middle East-Europe Economic Corridor: Connectivity in an era of geopolitical uncertainty https://www.atlanticcouncil.org/in-depth-research-reports/report/the-india-middle-east-europe-economic-corridor-connectivity-in-an-era-of-geopolitical-uncertainty/ Wed, 27 Aug 2025 21:00:00 +0000 https://www.atlanticcouncil.org/?p=869851 Weeks before the war in Gaza broke out, India, Europe, the US, and Gulf nations announced plans for an economic corridor linking the EU and India through the Gulf via rail, fiber optic cable, and pipelines. We ran the cost-benefit numbers and they’re clear: Washington should put the IMEC back on the global agenda this year.

The post The India-Middle East-Europe Economic Corridor: Connectivity in an era of geopolitical uncertainty appeared first on Atlantic Council.

]]>

Launched at the 2023 Group of Twenty (G20) summit in New Delhi, the India-Middle East-Europe Economic Corridor (IMEC) features three pillars that integrate existing and future infrastructure: a transportation pillar—the corridor’s backbone—integrating rail and maritime networks, an energy pillar with interconnected energy and electricity infrastructure across continents, and a digital pillar providing new fiber-optic cables and cross-border digital infrastructure.

  • The corridor is well placed to be a consequential regional integration and infrastructure initiative in the coming decades, reinforcing supply chain security and aligning Eurasian policy around open, rules-based connectivity, supported by market-driven, locally funded investment from a diverse set of countries. IMEC also provides an alternative to existing corridors dominated by a single government, particularly the Belt and Road Initiative
  • The transportation corridor plan has a financing gap of approximately $5 billion to become minimally operational, linking Gulf ports to Haifa, Israel. Most of the unmet costs are in Jordan, Israel, and logistics hubs likely at Haradh, in the Kingdom of Saudi Arabia (linking KSA-United Arab Emirates); al-Haditha, KSA (KSA-Jordan); Mafraq, the Jordan logistics hub, and near Beit She’an in Israel (Jordan-Israel).  
  • The corridor would have the capacity to move about forty-six trains daily carrying 1.5 million storage containers (TEUs) annually on single-stack cargo rail, with the ability to scale up to 3 million TEUs in the future, with both double-stack cargo rail and the additional integration of Ashdod Port enabling greater throughput into the Eastern Mediterranean. The upper ceiling of trade volume carried on IMEC could reach even higher, as it is only constrained by the laying of additional rail lines and port capacity, which could be expanded both by additional rail investments and integrating additional countries into IMEC.  
  • Transshipment times via the transportation corridor could be reduced by about 40 percent (to twelve-plus days) relative to maritime routes, generating approximately $5.4 billion in annual savings on Asia-Europe trade traveling the route. The corridor also would provide stronger access to international markets for countries along the route and increase export competitiveness. For India alone, IMEC could generate an overall increase of between 5 percent and 8 percent in Indian export valuation, returning $21.85 billion of additional Indian exports annually.  
  • The energy and digital pillars of the corridor will likely reinforce energy security and global data transmission. High-potential projects include deeper electricity grid integration among portions of the corridor and new subsea and terrestrial fiber-optic cables linking emerging data centers in the Middle East with Europe and India. The economic potential and feasibility of other components identified in the 2023 IMEC statement, namely a trans-Arabian gas pipeline linking Saudi Arabia to the Eastern Mediterranean and leveraging green hydrogen along the IMEC, remains unclear. The corridor has the potential to provide an effective platform for critical mineral refining and supply chains, advanced manufacturing zones, AI data centers, and other strategic components. 
  • The IMEC offers strategic and economic opportunity for the United States and its partners.  Washington should leverage its convening power and risk-mitigation tools to renew momentum on IMEC in 2025, and leverage US leadership in the 2026 G20 process to establish and shape an IMEC coordinating structure. IMEC’s completion would demonstrate the staying power of US diplomacy in the Middle East; provide a clear alternative to China’s Belt and Road Initiative; create additional incentives for states to normalize relations with Israel; open new markets for US companies; shape regional coordination in strategic sectors; and deepen US-Gulf alignment. To ensure IMEC’s success, the initiative needs senior US engagement and a central coordinating mechanism. 
  • While IMEC represents an opportunity to reshape Eurasia’s economic and political landscape, success is not guaranteed. Regulatory uncertainty and political risk make small but critical components of the IMEC a difficult proposition for private capital absent risk-mitigation measures from governments. Further, realizing the full potential of IMEC requires additional steps from IMEC signatory governments to ensure full corridor interoperability, develop common digital platforms, remove nontariff barriers, harmonize trade and customs standards, and sustain public investments in transportation, energy, and digital systems. 
  • An IMEC central coordinating body is essential to overcoming these challenges and maximizing the corridor’s potential. This body should include a ministerial-level component to secure the necessary political support, a secretariat to manage day-to-day coordination, and technical working groups that incorporate private-sector stakeholders and experts. Further, the coordinating body should embrace IMEC not as a single corridor, but a web of interconnected routes uniting regional policies on open, transparent, and free trade. 
  • To advance IMEC this year, the United States should consider launching a high-level public meeting in 2025 before assuming the G20 chairmanship on December 1. The French, Italian, and German governments should consider pushing for IMEC as a deliverable in the G7, particularly through the Partnership for Global Infrastructure and Investment. Key deliverables could include a communiqué that outlines a road map for IMEC through 2026; announces intent to form a coordinating body through the G20/G7 sherpa processes; and includes formal entry of regional partners in the IMEC as well as nonsignatory observer countries. 

About the authors

Afaq Hussain is a nonresident senior fellow at the N7 Initiative within the Atlantic Council’s Middle East Programs. In this role, much of his work focuses on the economic aspects of India-Middle East-Europe Corridor. A policy researcher with over twenty years of experience, Hussain’s expertise spans logistics infrastructure, trade facilitation, regional connectivity, and related regulatory policy.

He is the co-founder and director of the Bureau of Research on Industry and Economic Fundamentals (BRIEF) in New Delhi.

Nicholas Shafer is a project lead with the Atlantic Council’s N7 Initiative where he leads the program’s work related to India and the Middle East, particularly on IMEC and the I2U2 Group. He has worked closely on IMEC since the initiative launched in September 2023.

Related content

Explore the program

Through our Rafik Hariri Center for the Middle East, the Atlantic Council works with allies and partners in Europe and the wider Middle East to protect US interests, build peace and security, and unlock the human potential of the region.

The post The India-Middle East-Europe Economic Corridor: Connectivity in an era of geopolitical uncertainty appeared first on Atlantic Council.

]]>
Navigating the new normal: Strategic simultaneity, US Forces Korea flexibility, and alliance imperatives https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/navigating-the-new-normal-strategic-simultaneity-us-forces-korea-flexibility-and-alliance-imperatives/ Wed, 27 Aug 2025 15:37:43 +0000 https://www.atlanticcouncil.org/?p=869778 The future of deterrence on the Korean Peninsula—and indeed, the wider Indo-Pacific region—will hinge on Seoul’s ability to reframe US force realignments not as unilateral disengagements but as catalysts for action.

The post Navigating the new normal: Strategic simultaneity, US Forces Korea flexibility, and alliance imperatives appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Seoul should anticipate a possible transition of US Forces Korea toward fewer ground forces and a more flexible US presence overall.
  • Mismanaging such a transition risks alliance fatigue, fragmentation, or hollow deterrence.
  • US demands should not be depicted as unilateral disengagements but as catalysts to deepen conventional-nuclear integration of the alliance, seek new assurances, and refine the division of labor to create a more adaptive and credible alliance.

The recent summit between South Korean President Lee Jae-myung and US President Donald Trump, despite looming anticipation of large-scale changes in the alliance, such as restructuring of US Forces Korea (USFK), ended with Trump touting his “very good relationship” with North Korean leader Kim Jong Un. Yet as Trump hinted about seeking “ownership” of military bases, his demands for greater burden-sharing from Seoul remain. This particularly reflects Washington’s apparent shift toward a “China-first” strategy as reportedly outlined in the Interim National Defense Strategic Guidance. South Korea can expect continued pressure to assume greater regional security responsibilities, with alliance discussions over key issues such as troop reduction, strategic flexibility, and wartime operational control (OPCON) transfer. Echoing the latest call of Markus Garlauskas, director of the Indo-Pacific Security Initiative of the Atlantic Council’s Scowcroft Center for Strategy and Security, to upgrade the ROK-US alliance from “ironclad” to “titanium,” I also contend in this paper that the brewing changes in the alliance can provide momentum for a renewal befitting the changing security environment. With specific focus on the possibility of USFK reduction or adjustments, I contend that while strategic simultaneity fragments traditional alliance roles, it also generates new imperatives and opportunities for conventional-nuclear integration and refining the division of labor to create a more adaptive and credible alliance.

Strategic simultaneity and USFK transformation

The concept of strategic simultaneity has posed new questions for alliance structures. Amid rising tensions with both a US nuclear peer and a near peer—the Russian Federation and the People’s Republic of China—the Democratic People’s Republic of Korea (DPRK) also is expanding its nuclear weapons capabilities, assisted by its mutual defense pact with Russia. These factors demand the sustained attention and readiness of US forces in the Indo-Pacific. Meanwhile, the US military has ongoing commitments of support for Ukraine and in the Middle East, leading to a reprioritization of resources.

Faced with such a congested security environment, the US military presence on the Korean Peninsula appears to be at the edge of transformation. The Wall Street Journal, for instance, reported in May that the approximately 4,500 troops of USFK’s Stryker Brigade Combat Team (SBCT)—which currently rotates into South Korea every nine months—could be withdrawn for possible redeployment to Guam or even the US southern border for domestic missions. The retirement of twenty-four A-10 aircraft by September 2025 also necessitates reconfiguration of the forces.

In Seoul, these possible USFK adjustments arouse concerns, particularly given the backdrop of  Trump’s approach to alliances. The withdrawal of the SBCT, for instance, would leave the Eighth Army—which commands US Army forces in South Korea—without any maneuver elements. Although artillery, Apache helicopters, missile defense units (e.g., Patriot and Terminal High Altitude Area Defense, or THAAD), and intelligence, surveillance, and reconnaissance (ISR) platforms are expected to remain, this shift increases the burden on the ROK military to fill operational gaps, especially in early-phase ground operations. The Stryker team, designed for rapid response and equipped with real-time targeting sensors, plays a key role in ground warfare; its absence would degrade US immediate tactical responsiveness in South Korea.

Moreover, there is growing concern in Seoul about US interest in enhancing USFK’s strategic flexibility to address contingencies beyond the Korean Peninsula. Although key military leaders including the chairman of the Joint Chiefs of Staff, General John D. Caine, the USFK commander, General Xavier T. Brunson, and the commander of the Indo-Pacific Command, Admiral Samuel Paparo, have publicly underscored the continuing need for the US presence on the Korean Peninsula for credible deterrence against North Korea, the issue of strategic flexibility is reemerging as a critical topic within the alliance.

This is particularly true amid Washington’s prioritization of its military readiness vis-à-vis China. Under Secretary of Defense Elbridge Colby, currently leading the drafting of the Pentagon’s National Defense Strategy, has repeatedly emphasized—prior to entering office—the need to reorient USFK to better address what he regards as the primary threat: China. Robert Peters, a senior fellow at the Heritage Foundation, has also recently urged that “all geographic combatant commands should be directed to plan for a China contingency.” Such calls underscore the United States’ growing strategic rationale behind transforming USFK into a force better aligned with transregional deterrence priorities. The United States has reaffirmed the ROK-US alliance as “ironclad,” as Secretary of State Marco Rubio put it, and emphasized the alliance’s capacity to “continue to thrive” under Seoul’s new leadership of President Lee Jae-myung. Yet the US perception of a congested threat environment in the Asia-Pacific region, its priority focus on China, and its vision of a more flexible USFK all point to the potential for alliance fissure.

New mission for alliance: Strategic reconfiguration

In short, Seoul should anticipate a possible transition toward fewer ground forces and a more flexible US presence. Washington’s increasing emphasis on airpower and missile defense over heavy ground units suggests a redefinition of US priorities in the region. The upcoming withdrawal of legacy platforms and restructuring of USFK may reflect this shift. The current administration’s apparent interest in the transfer of wartime operational control will accelerate such a shift.

What’s important for the alliance, however, is to ensure that the transformation constitutes a strategic reconfiguration rather than fragmentation. Both Seoul and Washington’s stakes are too high to diminish deterrence and the extended deterrence values of the alliance. Therefore, even though US military forces are stretched thin in a multi-adversary environment, Seoul does not have the luxury of foregoing the combined deterrence and extended deterrence mechanisms of the ROK-US alliance. The DPRK’s continued nuclear threats, the revived DPRK-Russia mutual defense pact, and China’s increasing encroachment at sea and air have also congested Seoul’s security environment.

To reconfigure the alliance without risking a kind of deterrence vacuum on the Korean Peninsula, Seoul and Washington should pursue new initiatives for conventional-nuclear integration and refined division of labor in the region. To elaborate, since the 2023 Washington Declaration and the establishment of the Nuclear Consultative Group (NCG), South Korea and the United States have focused on improving the conventional-nuclear integration (CNI) of their forces, including US nuclear weapons. For South Korea, the motivation behind pursuing CNI has centered on two key objectives. First, CNI enables the ROK to specify and expand its conventional role, by which it can seek to better lock in the US security commitment to provide, per the State Department’s NCG fact sheet, the “full range of US capabilities including nuclear.” Second, by delineating its conventional responsibilities, South Korea can upgrade both its operational and hardware capabilities. Altogether, CNI is an effort to signal the alliance’s credible resolve and capability to deter DPRK.

First and foremost, this CNI context would enable Seoul to ensure that any reduction of USFK troops or withdrawal of US legacy platforms is followed by the United States’ continued provision of extended deterrence and also to push for new US assurance measures. Seoul should seek to reaffirm the declaratory policy that, should North Korea employ nuclear weapons in an attack, the United States will employ “the full range of US capabilities” and bring about “the end of the Kim regime.” Sustaining the operation of key deterrence coordination mechanisms such as the Extended Deterrence Strategy and Consultation Group and NCG, as well as regular maintenance of combined training and exercises, will be critical.

Second, regarding capability, the legacy platforms can be replaced with new and advanced capabilities. Indeed, with the retirement of the A-10 aircraft, there is proposed permanent deployment of one F-35A squadron at Kunsan Air Base, with rotation of another squadron. The F-35, with its stealth and electronic warfare capabilities, offers better survivability and precision strike options against critical targets than the A-10. Technologically, it surpasses the F-16 in versatility, integrating electronic warfare and electro-optical/infrared (EO/IR) sensor suites for multi-role missions. More importantly, the anticipated deployment of F-35As may be a window of opportunity for Seoul and Washington to discuss possible utilization of F-35As for dual-capable aircraft (DCA) missions—given their capability of deploying and operating US tactical nuclear weapons. Flexible and temporary deployment of US tactical nuclear weapons, as well as Seoul’s participation in DCA missions, could be the next steps of alliance transformation as well. Moreover, the United States also is prepping for consolidation of sixty-two F-16s into two “super squadrons” at Osan Air Base (one super squadron is already in place). The consolidation of the F-16 fleet into super squadrons reflects a new US approach to maximizing combat readiness by integrating aircraft and personnel for rapid, high-intensity operations. For Seoul, such consolidation at Osan Air Base would shorten response times to North Korean threats by more than 100 kilometers—e.g., Kunsan to Kaesong in 5 minutes 20 seconds at Mach 2, Osan to Kaesong in 2 minutes 30 seconds. Its effect on the adversary is already salient as Rodong Sinmun, the official Party newspaper of North Korea, in May condemned the first super squadron’s establishment as “a dangerous military move aimed at preemptive strikes against our state.” In addition, with Trump’s push for a missile defense system dubbed the Golden Dome—with an earmark of $25 billion in the FY2026 defense budget—Seoul may also seek to reinvigorate missile defense cooperation. As recent Israel-Iran conflict demonstrated, missile defense is not only a central means to enhance deterrence (and extended deterrence) by denial but also to damage limitation and survivability or resilience if deterrence fails.

Third, aside from capabilities, thinking about a larger scope of deterrence beyond the Korean Peninsula may be necessary for Seoul as well. As the US burden to deter multiple, simultaneous threats grows heavier, it serves South Korea’s strategic interest to actively contribute to efforts aimed at reinforcing the credibility and resilience of US regional deterrence, including its nuclear umbrella. While Seoul remains committed to its preference for a Korean Peninsula-centric posture, it must also recognize that reluctance to engage in broader regional deterrence initiatives may weaken US resolve, erode deterrence coherence, and embolden adversaries to exploit perceived gaps, especially under Trump’s approach to alliances.

Last but not least, the transformation of USFK—and the broader evolution of the ROK-US alliance—will serve as a powerful external driver compelling Seoul to undertake a comprehensive overhaul of its national defense posture. As USFK shifts toward a more agile and airpower-oriented configuration, with fewer ground forces, the onus will fall increasingly on South Korea to fill capability gaps across multiple domains. This will likely require a significant increase in defense spending, acceleration of military procurements, and deep structural reforms in force structure, doctrine, and training—particularly in areas such as ISR and missile defense. Close strategic synchronization—as urged by Ham Hyeong-pil, director for the Center for Security Strategy at the Korea Institute for Defense Analysis—with an evolving US force posture would help secure Washington’s continued political and operational support for Seoul’s force modernization efforts. Above all, strategic synchronization will be critical to ensure that any reduction in the scale or change in role of USFK does not lead to a deterrence vacuum, which could embolden adversaries such as North Korea, China, or even Russia to test the credibility of the alliance.

Conclusion

The second Trump administration’s priorities and the evolving reality of strategic simultaneity—exacerbated by the growing threats from North Korea, China, and a realigned Russia bolstered by North Korean military support—have ushered in an era of transformation for the ROK-US alliance. As Washington reallocates both attention and US military assets toward transregional challenges, Seoul faces mounting pressure to absorb a greater share of operational responsibility, strategically recalibrate its force posture, and align its defense planning with a shifting alliance architecture. If mismanaged, this shift could lead to alliance fragmentation, fatigue, or hollow deterrence. However, as this article contends, if managed carefully and strategically leveraged, the anticipated transformation of USFK presents Seoul with a critical window of opportunity: to deepen the alliance’s CNI, refine the division of labor, and lay the foundation for a more adaptive and strategically credible alliance.

The future of deterrence on the Korean Peninsula—and indeed, the wider Indo-Pacific region—will hinge on Seoul’s ability to reframe US force realignments not as unilateral disengagements but as catalysts for indigenous capability development, coevolution in defense planning, and new forms of assurance through extended deterrence mechanisms.

About the author

Related content

Explore the program

The Indo-Pacific Security Initiative (IPSI) informs and shapes the strategies, plans, and policies of the United States and its allies and partners to address the most important rising security challenges in the Indo-Pacific, including China’s growing threat to the international order and North Korea’s destabilizing nuclear weapons advancements. IPSI produces innovative analysis, conducts tabletop exercises, hosts public and private convenings, and engages with US, allied, and partner governments, militaries, media, other key private and public-sector stakeholders, and publics.

The post Navigating the new normal: Strategic simultaneity, US Forces Korea flexibility, and alliance imperatives appeared first on Atlantic Council.

]]>
Addressing China’s military expansion in West Africa and beyond https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/addressing-chinas-military-expansion-in-west-africa-and-beyond/ Thu, 21 Aug 2025 18:00:00 +0000 https://www.atlanticcouncil.org/?p=868957 As China expands its military reach in West Africa, the United States risks losing strategic ground on the continent. The next National Defense Strategy must confront China’s ambitions beyond the Indo-Pacific, balancing defense diplomacy, bilateral military relationships, and counterterrorism.

The post Addressing China’s military expansion in West Africa and beyond appeared first on Atlantic Council.

]]>

This issue brief is part of the Scowcroft Center for Strategy and Security’s National Defense Strategy Project, outlining the priorities the Department of Defense should address in its next NDS.

Executive summary

The next National Defense Strategy (NDS) is being drafted at a critical moment when the United States risks permanently ceding strategic influence to China in Africa—especially West Africa—without a reimagined approach to the continent. With lifesaving foreign assistance drastically reduced due to the current administration’s budget cuts to the US Agency for International Development (USAID) and State Department programs, along with uncertain economic effects from tariffs, the United States has voluntarily weakened its diplomatic and economic tools to influence and support Africa.  

This reality gives additional weight to the importance of defense diplomacy and military cooperation as critical means by which the United States can exercise strategic influence in the region. While the US administration may be looking to narrow the United States’ role on the continent, Africa is too vast, important, and complex to attempt bilateral defense diplomacy, military-to-military relations, and counterterrorism efforts on the cheap, by proxy, or from afar. 

Key issues for the Department of Defense (DoD) include acknowledging the looming strategic dilemma posed by China’s increased influence in Africa; developing a cohesive and responsive strategy to counter that influence; managing bilateral defense relationships; and addressing other regional priorities such as Russia’s growing influence and counterterrorism issues, which also have inextricable connections to China. The new NDS needs to lay a foundation to address these challenges. The alternative is over-regionalization of the China challenge to the Indo-Pacific, which could impose short-sighted limitations that will affect the US role in Africa for years to come.

View the full issue brief

About the author

Related content

Explore the program

The Adrienne Arsht National Security Resilience Initiative, in the Scowcroft Center for Strategy and Security, works to advance resilience as a core tenet of US and allied national security policy and practice.

The post Addressing China’s military expansion in West Africa and beyond appeared first on Atlantic Council.

]]>