National Security - Atlantic Council https://www.atlanticcouncil.org/issue/national-security/ Shaping the global future together Fri, 30 Jan 2026 16:36:57 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://www.atlanticcouncil.org/wp-content/uploads/2019/09/favicon-150x150.png National Security - Atlantic Council https://www.atlanticcouncil.org/issue/national-security/ 32 32 Amato in RealClearDefense on the 2025 National Security Strategy https://www.atlanticcouncil.org/insight-impact/in-the-news/amato-in-realcleardefense-on-the-2025-national-security-strategy/ Fri, 30 Jan 2026 16:36:55 +0000 https://www.atlanticcouncil.org/?p=902695 On January 29, Forward Defense Nonresident Senior Fellow Paul Amato published an article in RealClearDefense on the Trump administration’s ambiguity on nuclear deterrence in the Korean peninsula. In the article, Amato argues that silence on the regime ending policy risks emboldening North Korea and unsettling South Korea and Japan.

The post Amato in RealClearDefense on the 2025 National Security Strategy appeared first on Atlantic Council.

]]>

On January 29, Forward Defense Nonresident Senior Fellow Paul Amato published an article in RealClearDefense on the Trump administration’s ambiguity on nuclear deterrence in the Korean peninsula. In the article, Amato argues that silence on the regime ending policy risks emboldening North Korea and unsettling South Korea and Japan.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Amato in RealClearDefense on the 2025 National Security Strategy appeared first on Atlantic Council.

]]>
Scowcroft Strategy Scorecard: Grading Trump’s second National Defense Strategy https://www.atlanticcouncil.org/content-series/scorecard/scowcroft-strategy-scorecard-grading-trumps-second-national-defense-strategy/ Thu, 29 Jan 2026 20:23:25 +0000 https://www.atlanticcouncil.org/?p=901811 Last week the Trump Administration released its new National Defense Strategy, which defines the threats facing the United States and how it plans to counter them. Our experts break down the strategy to see if it makes the mark.

The post Scowcroft Strategy Scorecard: Grading Trump’s second National Defense Strategy appeared first on Atlantic Council.

]]>

Scowcroft Strategy Scorecard:
Grading Trump’s second National Defense Strategy

On January 23, the Pentagon released the 2026 National Defense Strategy (NDS), a document that builds on the previously released National Security Strategy. The NDS gives the Trump administration a chance to define the military threats facing the United States and how it plans to counter them. Read on to see how our experts grade the latest strategy.

Matthew Kroenig

Vice president and senior director, Scowcroft Center for Strategy and Security

This strategy marks a shift from past National Defense Strategies, with a distinctive focus on the Western Hemisphere. It correctly recognizes the risk of a simultaneous conflict, but would have benefited from more clearly defined goals.  

Distinctiveness

Is there a clear theme, concept, or label that distinguishes this strategy from previous strategies?

Prioritizing the homeland and the Western Hemisphere is distinctive and marks a shift from the past two National Defense Strategies, which both prioritized great power competition with China. The strong focus on both the Western Hemisphere and the Indo-Pacific, however, raises the question of whether hard decisions were taken about prioritization, or does this document instead reflect compromises between different factions within the administration focused on different theaters. 

Sound strategic context

Does the strategy accurately portray the current strategic context and security environment facing the United States? Is the strategy predicated on any specious assumptions?

Yes, this strategy contains a dedicated section on the current security environment that outlines the challenges posed by China, Russia, Iran, and North Korea, and importantly recognizes the challenge of strategic simultaneity, the risk of multiple conflicts occurring in overlapping time frames. This section risks downplaying the threat from Russia and Iran. Several past administrations, going back to at least President Barack Obama, had also hoped to do less in Europe and the Middle East in order to pivot towards Asia, only to have serious security crises erupt and thwart their plans.  

Defined goals

Does the strategy define clear goals?

The strategy would have benefited from a dedicated goals section. Past NDSs have laid out broader, global defense goals, such as deterring attacks against the United States and its allies, defeating adversaries if deterrence fails, and assuring allies. This strategy does not articulate such overarching goals. To be sure, it mentions more specific goals in the sections on lines of effort, such as deterring conflict in the First Island Chain, but would have benefited from providing a clearer vision of success.     

Clear lines of effort

Does the strategy outline several major lines of effort for achieving its objectives? Will following those lines of effort attain the defined goals? Does the strategy establish a clear set of priorities, or does it present a laundry list of US foreign policy activities?

The strategy very clearly identifies four important lines of effort: defend the US homeland; deter China in the Indo-Pacific through strength, not confrontation; increase burden-sharing with US allies and partners; and supercharge the US defense industrial base. The section on China seems to incorrectly imply that a confrontational US stance raises the risk of conflict, when in fact the problem is the Chinese Communist Party’s stated revisionist goals.  

Realistic implementation guidelines

Is it feasible to implement this strategy? Are there resources available to sustain it?

For more than four years, I have argued that the United States needs to do three things to resource the strategic simultaneity problem: revitalize the US defense industrial base, strengthen nuclear deterrence, and get allies to step up and do more. This strategy recognizes and affirms all three of these steps, with a heavy emphasis on revitalizing the US defense industrial base, which will be supported by US President Donald Trump’s promised $1.5 trillion 2027 defense budget, and increased allied burden sharing. 

Joe Costa

Director, Forward Defense Initative, Scowcroft Center for Strategy and Security

The strategy reaffirms longstanding US principles, such as nuclear deterrence, preventing adversary dominance in key regions, increasing burden-sharing, and reinvigorating the defense industrial base. It rightfully articulates the perennial problem that global requirements consistently outpace the demand of military forces, and therefore ruthless prioritization is required. The biggest risk is the reward and punishment approach toward allies and partners. Unquantifiable factors such as unity of purpose, trust, cohesion, and reliability are the essential elements for creating these durable military alliances. By largely ignoring the core values that hold US military alliances together, and explicitly stating that the Department of Defense (DOD) will prioritize cooperating with “model allies,” this strategy could create long-term structural risks that significantly limit the DOD’s ability to deter and prevail against adversaries. 

Distinctiveness

Is there a clear theme, concept, or label that distinguishes this strategy from previous strategies?

Yes. Homeland defense is explicitly tied to border security and US “military dominance” in the Western Hemisphere. Allies and partners are implicitly rewarded or punished to take primary responsibility for their own defense. Economic interests prevail over core values that underpin military cooperation, and the threats posed by the United States’ adversaries are deemphasized in favor of the main message, which is: keep your “demands reasonable and cabined,” and we can maintain a “sustainable balance of power.” 

Sound strategic context

Does the strategy accurately portray the current strategic context and security environment facing the United States? Is the strategy predicated on any specious assumptions?

Persistent threats posed by the United States’ adversaries are deemphasized in favor of the larger message on deconfliction and deescalation. The strategy makes three key assumptions that deserve serious examination:  

  1. the DOD can achieve NDS objectives absent a coherent approach to allies and partners across the US government (e.g., if allied economies are hurt by tariffs, will they still spend more on defense?);  
  2. allies and partners will respond to US rewards and punishments in a way that aligns with NDS objectives; and
  3. US adversaries will adjust their longstanding goals and accept the DOD’s “gracious offer” in favor of a “sustainable balance of power.”   

Defined goals

Does the strategy define clear goals?

Yes. The four priorities are clearly stated throughout the document. 

  1. Defend the US homeland 
  2. Deter China in the Indo-Pacific through strength, not confrontation  
  3. Increase burden-sharing with US allies and partners  
  4. Supercharge the US defense industrial base

Clear lines of effort

Does the strategy outline several major lines of effort for achieving its objectives? Will following those lines of effort attain the defined goals? Does the strategy establish a clear set of priorities, or does it present a laundry list of US foreign policy activities?

Lines of effort are defined with varying degrees of specificity. Tradeoffs exist between the four priorities. For example, forces off the coast of Venezuela, and the naval “armada” recently redeployed from the Indo-Pacific to the Middle East, limit what’s available now and potentially degrade future readiness to deter China in the First Island Chain. If this new strategic approach erodes trust with allies and partners, it could adversely impact their collaboration in areas that are essential to achieving the strategy’s end states. How the DOD manages and balances the risks that come with these tradeoffs will determine the success of the overall strategy.  

Realistic implementation guidelines

Is it feasible to implement this strategy? Are there resources available to sustain it?

Further analysis is required, but aspects of the strategy likely will have to be modified. For example, the Congressional Budget Office estimates the Golden Dome could cost more than $800 billion over twenty years, with other estimates going even higher. In addition, the full impact of the DOD’s personnel actions is still unclear—including reported reductions to the cyber workforce, which could adversely impact homeland defense. Lastly, it remains an open question how allies and partners will react to this shift in US defense strategy.  

Alexander B. Gray

Nonresident senior fellow, Geostrategy Initiative, Scowcroft Center for Strategy and Security

The NDS builds usefully upon the National Security Strategy (NSS) by carefully reflecting on the primary security threats to the United States and prioritizing those threats alongside the regional areas of greatest importance to core US interests. This exercise, while contrary to nearly four decades of US strategy, is both overdue and salutary in an era of rising great power threats and diminishing domestic resources. The NDS’s call for a wartime-level mobilization of the defense industrial base (DIB) reflects the seriousness of the challenge and the DIB’s criticality in meeting even the whittled-down priorities found in the NSS and NDS. Taken together, the NSS and NDS are an epochal shift in US strategy and represent a decisive break with post-Cold War conceptions of the United States’ limitless strategic bandwidth. 

Distinctiveness

Is there a clear theme, concept, or label that distinguishes this strategy from previous strategies?

As with the National Security Strategy, the NDS represents an abrupt break from the strategic documents from previous administrations of both political parties. The NDS rejects explicitly the need to uphold the “liberal international order” and instead prioritizes the capabilities and requirements needed to implement the core US interests outlined in the NSS: defense of the homeland, the Western Hemisphere, and a “free and open” Indo-Pacific.

Sound strategic context

Does the strategy accurately portray the current strategic context and security environment facing the United States? Is the strategy predicated on any specious assumptions?

Building upon the NSS, the NDS captures both the greatest challenges facing the United States, beginning with China and its threat to the three core regions of US concern (the homeland, the hemisphere, and the Indo-Pacific), and the need to prioritize in a world of limited resources and domestic political constraints. By understanding the threats but also the limitations facing Washington, the NDS captures the unique environment at this moment in US security policy.  

Defined goals

Does the strategy define clear goals?

The NDS forces clear priorities and largely explains how the administration envisions converting those priorities, whether regions of focus or a renewed emphasis on a revitalized defense industrial base, into actionable policy. In its ruthless focus on avoiding previous periods of strategic overstretch, the NDS (like the NSS) succeeds in a goal-oriented approach to strategy.  

Clear lines of effort

Does the strategy outline several major lines of effort for achieving its objectives? Will following those lines of effort attain the defined goals? Does the strategy establish a clear set of priorities, or does it present a laundry list of US foreign policy activities?

The NDS is anything but a laundry list, and the prioritization exercise it represents will have a cathartic effect on both resource allocation and the time and attention of government officials across the chain of command. For each priority, the NDS explains broadly how the administration will define success, which will be useful in holding officials to account for execution.  

Realistic implementation guidelines

Is it feasible to implement this strategy? Are there resources available to sustain it?

The strategy can be implemented but will face fierce congressional and institutional resistance by forcing prioritization on a bureaucracy and larger national security apparatus that has become accustomed to avoiding hard choices and doing everything, everywhere, simultaneously. The NDS is appropriate to available resources but must be advocated for consistently to avoid the inevitable mission creep that will be encouraged in many parts of Washington.  

Imran Bayoumi

Associate director, GeoStrategy Initiative, Scowcroft Center for Strategy and Security

The National Defense Strategy makes clear the priorities of the Department of Defense. It has clear goals and lines of effort but lacks detail in how it plans to achieve these stated outcomes. The strategy overlooks key regions and allies, such as Taiwan and Australia, and risks underestimating the threat posed by China. Failure to account for the strategic reality and the nature of the threats that the United States finds itself facing will make it harder to achieve the goals set out within the strategy.

Distinctiveness

Is there a clear theme, concept, or label that distinguishes this strategy from previous strategies?

The 2026 National Defense Strategy builds on the 2025 National Security Strategy with its clear focus on defending the homeland, with the claim that “for decades, America’s foreign policy establishment neglected our nation’s Homeland defenses.” But past NDSs have also prioritized the homeland, including the 2022 NDS, which listed “Defending the homeland” as its top priority, albeit while recognizing the People’s Republic of China (PRC) as a pacing threat. The strategy is distinct through its continued promotion of the “Trump Corollary” to the Monroe Doctrine, but this concept is not expanded on throughout the document.  

Sound strategic context

Does the strategy accurately portray the current strategic context and security environment facing the United States? Is the strategy predicated on any specious assumptions?

The strategy rightly recognizes that China, Russia, Iran, and North Korea all pose threats to the United States, but it does not mention China’s position towards Taiwan and seemingly downplays the global threat posed by Russia in Africa, the Arctic, and elsewhere. In Africa, the focus only on the threat from “Islamic terrorists” ignores the support provided by China and Russia to governments across the continent. At the same time, the strategy overstates some threats, saying that in the past “U.S. access to key terrain like the Panama Canal and Greenland was increasingly in doubt,” which is not true.  

Defined goals

Does the strategy define clear goals?

The strategy has four clearly defined goals that build on the priorities set forth in the National Security Strategy.  

Clear lines of effort

Does the strategy outline several major lines of effort for achieving its objectives? Will following those lines of effort attain the defined goals? Does the strategy establish a clear set of priorities, or does it present a laundry list of US foreign policy activities?

The strategy clearly lays out four lines of effort that build on the defined goals, but some are more detailed than others. More clarity on how the DOD seeks to deter China or supercharge the defense industrial base would be helpful.  

Realistic implementation guidelines

Is it feasible to implement this strategy? Are there resources available to sustain it?

The strategy calls for having allies in Europe, in the Middle East, and on the Korean Peninsula take on more of a role in their own defense but does not detail changes in US force posture or presence that would likely be expected with such an announcement. The lack of details makes it difficult to understand how exactly the strategy will be implemented and how challenging it will be to do so.  

Related content

Explore the program

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

The post Scowcroft Strategy Scorecard: Grading Trump’s second National Defense Strategy appeared first on Atlantic Council.

]]>
Ukraine’s defense tech sector can play a key role in economic security https://www.atlanticcouncil.org/blogs/ukrainealert/ukraines-defense-tech-sector-can-play-a-key-role-in-economic-security/ Thu, 29 Jan 2026 20:22:33 +0000 https://www.atlanticcouncil.org/?p=902255 Ukraine’s defense tech and dual-use sector is a rare wartime success story, with over six hundred innovative and combat‑tested firms becoming increasingly attractive to international investors, writes Eric K. Hontz.

The post Ukraine’s defense tech sector can play a key role in economic security appeared first on Atlantic Council.

]]>
Ukraine’s defense tech and dual-use sector is a rare wartime success story, with over six hundred innovative and combat‑tested firms becoming increasingly attractive to international investors. However, the future growth of this sector is constrained by obstacles including export licensing bottlenecks, currency controls, weak intellectual property protection, inconsistent consultation between government and business, and fears that old problems including corruption and rent-seeking could re‑emerge.

The Ukrainian government has an obvious interest in supporting the growth of the defense tech sector, but many officials believe the top priority remains preventing strategic vulnerabilities. The list of potential threats includes infiltration by corrosive capital, a loss of sensitive technologies, and systemic risks arising from insufficiently regulated markets. Experts emphasize the need for new policy instruments, clearer definitions, monitoring systems, and alignment with G7‑style economic security practices. So far, discussion of these issues remains mostly conceptual, leaving businesses uncertain about rules, timelines, and risks.

Ukraine’s economic security debate is currently being shaped by three overlapping realities. First, the global economy has shifted away from maximum trade liberalization toward a more security-based paradigm, particularly in strategic sectors such as defense, energy, critical minerals, and advanced technology. Second, Ukraine is fighting a full‑scale war, making economic resilience and industrial capacity existential concerns rather than abstract policy goals. Lastly, Ukraine’s defense and dual‑use sectors have undergone an unprecedented transformation since 2022, emerging from a prewar model dominated by state enterprises to become one of the most dynamic segments of the Ukrainian economy.

The core question now is not whether the state should intervene, but how to design intervention that protects national interests without suffocating private initiative or driving away international investors. This means finding the middle ground between security and economic freedom. Democratic Ukraine must seek to strike a better balance than its authoritarian adversary in order to enable the kind of continued defense tech innovation necessary to prevail on the battlefield and increase deterrence.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

There are currently concerns that Ukraine’s fast‑growing defense tech sector risks inheriting longstanding governance problems including opaque procedures, slow decision‑making, and uneven enforcement. Recent corruption scandals in Kyiv have already damaged trust, creating what some businesses have described as “negative expectations.”

From the Ukrainian government’s side, there is recognition that institutions are still adapting, with many of the available economic security tools still fragmented or not yet fully operational. This represents an opportunity for Ukraine if the country is able to build governance structures tailored to strategic sectors rather than retrofitting existing and outdated bureaucratic models. Creating a new generation of transparent institutions to address defense sector exports, investment screening, and procurement could become a competitive advantage for Ukraine if designed with private sector input from the outset.

Export licensing is one of the most acute potential bottlenecks. Ukraine’s defense tech businesses currently face a process requiring excessive approvals from multiple institutions, with little accountability or predictability. There is also a perception of unequal treatment, undermining confidence in the system. Ukrainian officials, meanwhile, tend to stress the necessity of strict controls to prevent leakage of sensitive technologies.

A risk‑based and tiered export control regime could address these concerns. By clearly defining a narrow list of highly sensitive technologies requiring strict oversight, the Ukrainian authorities could create faster and more predictable export pathways for less sensitive defense and dual‑use products. This would support economic growth while preserving core security interests.

Wartime currency controls and capital movement restrictions severely limit the ability of Ukrainian defense sector companies to expand internationally. Multiple investors have noted the paradox of profitable Ukrainian firms being unable to deploy their own capital abroad, forcing them to raise funds outside the country simply to operate globally.

From the perspective of Ukrainian policymakers, currency restrictions are viewed as necessary to preserve macro‑financial stability and to prevent capital flight. Targeted exemptions for vetted defense and dual‑use companies, particularly those pursuing foreign acquisitions or joint ventures aligned with national priorities, could unlock growth without undermining financial stability. Such a mechanism would signal trust in compliant firms and reward transparency.

Another key issue is intellectual property (IP). Standard IP processes are too slow for wartime innovation cycles. In the dynamic current environment, Ukrainian companies rely on trade secrets and know‑how rather than formal patents, but this increases risks when partnering internationally.

Ukrainian officials acknowledge the importance of innovation but have so far only been able to offer limited concrete solutions. Accelerated IP pathways for defense and dual‑use technologies, combined with support for joint research and development frameworks with trusted foreign partners, could help Ukrainian firms secure protection in allied jurisdictions while strengthening international integration.

There is a degree of uncertainty in Ukraine’s expanding defense tech sector that can be seen in inconsistent terminology, unclear boundaries, and undefined red lines. A shared vocabulary and published strategic framework, co‑developed by the public and private sectors, could help reduce this uncertainty.

Different priorities lead to diverging visions. Defense tech industry executives and investors tend to view the issue of economic security primarily through the lens of scalability, competitiveness, and speed. Their key assumptions include the notion that innovation thrives in predictable, transparent environments.

Many also argue that Ukraine’s combat‑tested technologies represent a unique global opportunity, while cautioning that excessive controls risk pushing talent, capital, and IP abroad. With this in mind, industry representatives and investors generally support targeted security measures but fear blanket restrictions that treat all technologies and companies as equally sensitive.

Ukrainian officials tend to frame economic security primarily as a defensive necessity. They warn that adversaries actively use markets, investment, and technology transfer as weapons. Many are also concerned that under‑regulation could result in irreversible strategic losses. Naturally, their perspective prioritizes caution, monitoring, and alignment with allied security frameworks, even at the cost of slower growth.

The central tension here is time-based and risk‑based. Businesses operate on market timelines and accept calculated risk, while governments operate on security timelines and seek to minimize worst‑case scenarios. Without structured dialogue, these differences manifest as mistrust rather than complementary roles.

If managed effectively, wartime Ukraine’s approach to economic security in the defense tech and dual-use sectors could become a model for the country’s broader postwar reconstruction. Ukraine has the opportunity to redesign institutions in a strategic sector that already commands global attention. Success may depend on whether government policy is seen by businesses as a partnership or as an obstacle.

Constructive cooperation grounded in transparency, risk‑based policy, and continuous dialogue can transform economic security from a constraint into a catalyst for Ukraine’s long‑term strength and sovereignty, providing significant security benefits for allies and partners along the way. This is a realistic objective. After all, industry, investors, and government all ultimately seek the common goal of a resilient, innovative Ukrainian economy integrated with democratic allies and protected from adversarial exploitation.

Bridging the gap between perspectives is less a matter of ideology than of process, trust, and execution. Ukraine is currently in a period of transition that is marked by many significant challenges but no irreconcilable obstacles. Industry and investors are ready to scale globally while the government is racing to build safeguards against unprecedented threats. The task now is to synchronize these efforts.

Eric K. Hontz is director of the Accountable Investment Practice Area at the Center for International Private Enterprise.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values, and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia, and Central Asia in the East.

Follow us on social media
and support our work

The post Ukraine’s defense tech sector can play a key role in economic security appeared first on Atlantic Council.

]]>
Trump’s National Security Strategy doesn’t downgrade the Middle East, it redefines it https://www.atlanticcouncil.org/blogs/menasource/trumps-national-security-strategy-doesnt-downgrade-the-middle-east-it-redefines-it/ Wed, 28 Jan 2026 12:42:37 +0000 https://www.atlanticcouncil.org/?p=901603 Trump's strategy is a sophisticated refinement of “America First.” For the Gulf, the implications are significant, but manageable.

The post Trump’s National Security Strategy doesn’t downgrade the Middle East, it redefines it appeared first on Atlantic Council.

]]>
At the end of 2025, the White House released a comprehensive National Security Strategy (NSS) that reflects the strategic worldview of US President Donald Trump’s current administration. Like the 2017 NSS issued during Trump’s first term, this new document is branded as “America First,” but it goes further in its clarity, prioritization, and ideological framing. The 2017 NSS already emphasized border security, economic nationalism, sovereign decision-making, and a renewed focus on great-power competition, yet the newly issued NSS formalizes these instincts more sharply. It treats sovereignty, industrial revival, the end of mass migration, tight border control, and burden-shifting to regional partners as core national objectives rather than rhetorical elements of diplomacy. The subsequently released National Defense Strategy (NDS) reinforces this hierarchy by translating these political priorities into concrete force-planning choices, especially around Iran, Israel, and the role of Gulf partners as frontline regional security providers.

At the same time, Trump’s current NSS is more explicit than its 2017 predecessor in delineating a hierarchy of regions and interests. Whereas earlier versions still treated the Middle East as a central theater of policy execution, the new strategy bluntly states that not all regions matter equally at all times—and that the Western Hemisphere and the Indo-Pacific should receive the lion’s share of strategic attention. The NSS also reinforces the notion that economic security, energy dominance, and revival of the defense industrial base are fundamental to national security, not peripheral to it. Although the NSS is a statutory planning document and therefore binding on departments for implementation, Trump’s foreign policy style has always been adaptive, personalized, and operationally flexible. Thus, the NSS should be treated as a reliable directional guide, one that shapes expectations, alliances, budgeting, and bureaucratic activity, while leaving room for Trump’s preference for personal diplomacy and transactional deal-making where needed.

It is in this context that the Middle East—and particularly the Gulf Cooperation Council (GCC)—emerges not as a downgraded region, but as a strategically redefined one: less central to day-to-day US force planning, yet still pivotal to the administration’s concepts of burden-sharing, deterrence, and regional stabilization.

The Middle East: Enduring interest, but no longer central

Among the most striking elements of the new NSS is its recalibration of the Middle East’s place in US foreign policy. For decades, the region consumed disproportionate diplomatic attention, military deployments, and crisis-management resources because it supplied vital energy, served as a Cold War battleground, and generated conflicts with global spillover potential. Today, those foundations have weakened: the United States is a net energy exporter with greater resilience to supply shocks, and great-power competition now plays out far more in the Indo-Pacific and in technological and economic domains than through Middle Eastern proxy wars.

However, the fact that the Middle East no longer dominates US strategic planning does not imply disengagement or irrelevance. The NSS is careful to define the Middle East as a region of enduring interests that must not be relegated to instability or hostile domination. The United States retains core objectives: preventing any adversarial power from controlling Gulf hydrocarbons or the chokepoints through which they transit, ensuring freedom of navigation of waterways such as the Red Sea and the Strait of Hormuz, countering terrorism and radical movements, supporting Israel’s security, and expanding the normalization dynamic of the Abraham Accords.

The regional focus is therefore shifting from militarized management toward political stabilization, strategic deterrence, investment collaborations, and cost-efficient conflict management. The NSS frames the Middle East increasingly as a zone of partnership, innovation, and capital exchange rather than as the site of long, resource-intensive wars. The NDS adds an important nuance: while confirming that the Middle East is no longer the central theater for US force planning, it explicitly commits to retaining the capability for “focused, decisive action” in the region, illustrated by operations such as Midnight Hammer against Iran’s nuclear infrastructure and Rough Rider against the Houthis, while expecting regional actors to manage most of the security workload between such interventions.

Burden-shifting: The GCC as regional security providers

One of the clearest implications for GCC states is the NSS’s burden-shifting logic. Washington does not intend to underwrite regional security in the same way it once did. Instead, the White House expects capable regional actors, particularly Saudi Arabia, the United Arab Emirates (UAE), and to a lesser extent Qatar, to assume leadership in securing maritime routes, deterring hostile adventurism, stabilizing proximate conflict zones, and countering terrorist networks. The United States will remain a strategic backstop, especially at the high end of military power, but the NSS encourages a division of labor where Washington leverages diplomatic influence, advanced deterrent capabilities, and intelligence, while expecting Gulf capitals to provide financial, logistical, and regional operational support. The NDS makes this division of labor more explicit by directing the Department of Defense to “empower regional allies and partners to take primary responsibility for deterring and defending against Iran and its proxies,” while the United States concentrates on high-end enablers, surge operations, and global priorities such as homeland defense and the Indo-Pacific.

This is not a sudden change, but rather a deeper institutionalization of trends that have been emerging for a decade. The GCC has long demonstrated an increased appetite for autonomous security roles, whether through counter-piracy patrols, Yemen interventions, Red Sea stabilization efforts, or investments in Central African and Horn of Africa equilibria. Trump’s NSS validates these ambitions and situates them within a US strategic architecture, rather than treating them as ad hoc regional experiments. For Gulf capitals, this recognition is beneficial: their regional activism is not only tolerated, it is encouraged as a core element of maintaining regional stability in lieu of direct US military domination.

From conflict theater to economic and technological platform

Another significant shift in the NSS narrative is the re-casting of the Middle East as an economic, technological, and financial platform, rather than a theater for perpetual conflict. The NSS recognizes that regional leaders have embraced diversification, industrial development, and sovereign wealth strategies that expand beyond hydrocarbons. It also emphasizes US opportunities in nuclear energy, artificial intelligence (AI), defense industrial cooperation, logistics networks, and supply chain localization. The Middle East is treated as an increasingly strategic geography for future economic corridors, especially those linking Africa, South Asia, and the Mediterranean.

This framing aligns neatly with GCC trajectories. Saudi Arabia, the UAE, and Qatar have long sought to position themselves as global logistics hubs, aviation nodes, sovereign wealth investors, and technology accelerators. With the NSS emphasizing US economic security, energy dominance, and domestic manufacturing revival, Gulf states can leverage bilateral partnerships to show how investment projects, whether in nuclear energy, AI, aerospace, or critical minerals, support American jobs, reindustrialization needs, and technological gains. If packaged correctly, a Gulf-US economic deal now has political value in Washington that goes far beyond foreign direct investment: it can be framed as contributing to domestic industrial revival and strategic supply chain safety. The NDS reinforces this economic-security linkage by treating arms sales and defense industrial cooperation with GCC states as part of a broader effort to “supercharge” the US defense industrial base, making Gulf procurement and potential co-production not only a regional stabilizer but also a mechanism for sustaining US military capacity.

From deterrence to decisive operations: The NSS–NDS approach to Iran

The NSS conveys a strong view that Iran’s disruptive influence has weakened due to Israeli military pressure and to targeted US actions designed to degrade Iran’s nuclear potential. However, the situation has shifted dramatically in recent weeks. Widespread protests across Iran, triggered by deep socioeconomic grievances and political repression, have created an atmosphere of internal volatility not fully captured in the NSS released in late 2025. The Trump administration has responded with forceful rhetoric, warning Tehran that further repression or attempted regional escalation could trigger additional US military strikes. These warnings, coupled with reports that Washington is actively considering another limited, targeted strike on Iranian military infrastructure, have generated both reassurance and unease in GCC capitals. Here, the NDS adds two revealing elements: first, it publicly frames Operation Midnight Hammer as having “obliterated” Iran’s nuclear program and weakened the regime and its Axis of Resistance. Second, it explicitly states that Gulf partners and Israel are now expected to carry primary responsibility for containing Iran’s conventional and proxy capabilities, with the United States stepping in episodically when decisive force is required.

The ongoing instability in Iran introduces a new variable into the regional equation. While the NSS presents Iran as strategically weakened, current developments demonstrate that internal unrest can make the regime simultaneously vulnerable and unpredictable. The possibility of US kinetic action raises concerns about Iranian retaliation across the Gulf, whether through drones, cyberattacks, missile strikes, or activation of regional proxies. GCC leaders therefore view current tensions through a dual lens: understanding that US pressure aligns with long-standing Gulf concerns about Iran’s nuclear ambitions, yet also wary of the escalation risks that accompany any US–Iran confrontation.

The NSS balances deterrence with an emphasis on pursuing peace deals and post-conflict stabilization, including in Gaza and Syria. Trump’s political style is highly confident about presidential diplomacy and conflict resolution, and the NSS treats mediation as a strategic tool to bring difficult bilateral environments into a more stable architecture. This dynamic underscores that while the NSS prioritizes stability and “realignment through peace,” the Trump administration remains fully prepared to use force when it believes core US and allied interests are threatened, a stance entirely consistent with the NSS’s emphasis on “peace through strength.”

Although this is broadly reassuring for the GCC, residual anxiety remains. If Washington chooses to secure regional stability through big-ticket diplomatic bargains, especially where Russia or Israel are involved, Gulf capitals will expect assurances that their security will not be traded for conflict de-escalation. However, many Gulf leaders now possess significant diplomatic capacity and mediation credibility of their own. The NSS creates an opening for GCC states to position themselves as mediators or stabilizers rather than as passive recipients of US decisions. The Gulf’s growing diplomatic centrality, from Gaza cease-fire talks to Sudan, Libya, or the Horn of Africa, fits well with an NSS that prefers localized responsibility and regional realignment rather than direct US intervention. Still, the current crisis underscores a critical reality: any US–Iran confrontation, even a limited one, will have immediate consequences for Gulf security, energy markets, and maritime stability, reinforcing the importance of GCC preparedness, joint air and missile defense integration, and sustained coordination with Washington as the situation continues to evolve. In this sense, the NDS largely confirms the NSS’s direction of travel but narrows the margin for ambiguity: it signals that future Iran-related crises will be handled through short, sharp US operations nested within a regional architecture in which the GCC and Israel shoulder greater routine responsibility.

Will GCC capitals be surprised or concerned?

Little in the NSS will shock senior decision-makers in the GCC. Most regional governments have already experienced Trump’s approach firsthand, benefitted from strong bilateral ties, and understand that Washington’s foreign policy has permanently moved away from nation-building, democracy promotion, and open-ended security commitments. The more consequential shift in recent weeks has been the intensification of US–Iran tensions, which has temporarily elevated the Gulf within Washington’s strategic focus despite the NSS’s assertion that the region is no longer central. GCC capitals now find themselves preparing for multiple scenarios, ranging from a calibrated US strike on Iran to potential Iranian retaliation, even as they recognize that none of this contradicts the NSS’s underlying logic of deterrence, burden-shifting, and threat-management rather than long-term occupation or nation-building.

Overall, the NSS is more likely to produce re-calibration than alarm. The strategy is consistent with Gulf countries’ expectations that they will be treated as indispensable pillars of regional stability and as partners in defense technology, energy investment, and maritime security. The NDS largely reinforces this assessment: it does not downgrade GCC importance, but instead clarifies the price of being central—greater spending, deeper integration with Israeli and US forces, and a willingness to absorb more day-to-day risk in managing Iran and regional crises.

How the NSS will guide GCC responses

The NSS will provide Gulf policymakers with an actionable framework for deepening relations with Washington. First, Gulf capitals can present themselves as regional security providers, offering maritime patrols, counter-terrorism support, Red Sea and Bab al-Mandab stabilization, and specialized capacity-building. Second, GCC countries can frame investment deals as US industrial wins, emphasizing how AI, aerospace, nuclear, and defense co-production create US jobs and secure American supply chains. Third, Gulf states can symbolically align with Washington on sovereignty narratives, emphasizing secure borders, state authority, and skepticism toward external ideological intervention, areas where their domestic priorities already converge.

Finally, GCC states will possibly manage their relationship with China more carefully, offering Washington assurances that high-sensitivity sectors will remain insulated from Chinese involvement while still leveraging Chinese trade and capital where appropriate. In doing so, Gulf leaders can demonstrate that multi-vectorism increases stability and economic growth without jeopardizing strategic trust.

A strategically manageable landscape

The Trump administration’s NSS is a sophisticated refinement of “America First.” It sets clear priorities, clarifies regional hierarchies, and emphasizes economic and technological competition as the foundation of power. For the GCC, the implications are significant, but manageable. Rather than being marginalized, Gulf partners are now expected to assume greater security responsibility, serve as stabilizers, and act as premium platforms for bilateral economic and technological exchange. The NSS ultimately positions GCC countries not as passive dependents of US security guarantees, but as mature strategic actors capable of shaping their region while deepening mutually beneficial ties to Washington.

Read together with the NDS, the picture becomes sharper: the GCC is central to a burden-sharing model in which the Middle East is no longer the main theater of US strategy, but remains a crucial test case for how America First can combine limited, decisive US force with empowered regional allies to deliver “peace through strength” without returning to the era of open-ended wars.

Kristian Alexander is a senior fellow and lead researcher at the Rabdan Security & Defense Institute (RSDI) in Abu Dhabi.

The post Trump’s National Security Strategy doesn’t downgrade the Middle East, it redefines it appeared first on Atlantic Council.

]]>
Wang Yi’s MENA tour was long on messaging, short on outcomes https://www.atlanticcouncil.org/blogs/menasource/wang-yis-mena-tour-was-long-on-messaging-short-on-outcomes/ Thu, 22 Jan 2026 12:17:45 +0000 https://www.atlanticcouncil.org/?p=900349 Wang worked to position China as a defender of free trade and a reliable partner for the Middle East region.

The post Wang Yi’s MENA tour was long on messaging, short on outcomes appeared first on Atlantic Council.

]]>
Chinese Foreign Minister Wang Yi was in the Middle East recently, visiting the United Arab Emirates (UAE), Saudi Arabia, and Jordan from December 12 to 16. The trip was long on messaging and short on outcomes, as Wang worked to position China as a defender of free trade and a reliable partner for his hosts.

An unusual stop in Jordan

Of the three countries on Wang’s itinerary, Jordan stands out as unusual. Chinese leaders frequently engage with countries in the Gulf, but Jordan isn’t a typical destination for Beijing’s officials. While in Amman, he met with King Abdullah II, Crown Prince Hussein, and Deputy Prime Minister and Foreign Minister Ayman Safadi.

At the bilateral level, the message was that China wants to enhance the strategic partnership signed during the king’s 2015 visit to Beijing. This elevated partnership would focus on increased economic and investment cooperation and deeper political trust. As Wang conveyed to Safadi, “China will remain Jordan’s most reliable strategic partner in its development and revitalization process.”

SIGN UP FOR THIS WEEK IN THE MIDEAST NEWSLETTER

This is an odd description of the China-Jordan relationship, which is not especially strategic. There has been little in the way of political or security cooperation between the two; Jordan is deeply tethered to the United States, limiting opportunities for China to make serious inroads. The economic side of the relationship has also been modest. Data from the American Enterprise Institute’s China Global Investment Tracker shows relatively insignificant engagement, with $1.96 billion in investments over the past twenty years and $5.54 billion in construction contracts for Chinese companies in Jordan since 2005. Trade has also been muted. Data from 2023 shows China exported $5.44 billion to Jordan, while Jordan exported $986 million to China.

Given the limited political and economic relations at the bilateral level, the likely reason for the Amman stop in Wang’s Middle East trip was to discuss diplomatic efforts on the Palestine issue. Beijing has been making efforts to be a more significant actor on the Israel-Palestine conflict, and with no influence with the Israelis, working with the Palestinians is China’s only access point. In July 2024, Beijing hosted a delegation of fourteen Palestinian political groups, releasing the Beijing Declaration in which these factions pledged to end their divisions and form an interim national unity government. Since then, Chinese diplomacy has been active but not particularly effective, although to their credit, they continue to advocate for Palestine, regularly voicing support in the United Nations and offering Beijing as a potential mediator.

In Wang’s talks with the king and crown prince, the focus was on the humanitarian crisis in Gaza, “the need for cooperation between China and the Jordan Hashemite Charity Organization,” the cease-fire in Gaza, and the urgency of stopping attacks on West Bank Palestinians. 

The week before Wang’s trip, the third round of China-Saudi-Iran trilateral talks were held in Tehran, and discussions significantly focused on regional security issues—including on Israel-Palestine. Clearly, Chinese diplomats are working to enhance their profile on the issue. 

With the China-Arab States Summit scheduled for June 2026, regional analysts should expect more coordination between China and the Arab League on Palestine. And Wang’s visit to Jordan might indicate King Abdullah’s presence at the summit. If so, it would be his first trip to China since 2015, when the strategic partnership was announced.

Engagements with the Gulf

The Saudi visit was not at all surprising given the depth of relations between Beijing and Riyadh. Chinese capital has been flowing into the kingdom at a higher rate in recent years, with Saudi media noting a 29 percent gain in the stock of Chinese investment in Saudi Arabia from 2023 to 2024. Trade continues to surge, with China ranking as Saudi Arabia’s top trade partner. 

During the visit, Wang met with Crown Prince Mohammed bin Salman and Foreign Minister Faisal bin Farhan. The foreign ministers jointly held the fifth High-Level Joint Committee (HLJC) meeting, a mechanism developed after Chinese President Xi Jinping’s 2016 state visit, which resulted in the China-Saudi comprehensive strategic partnership agreement. Since then, the HLJC has been used to chart the course for bilateral cooperation, with regular senior meetings that coordinate trade, investment, contracting, and diplomatic efforts.

Wang emphasized the increasing depth of the partnership while meeting with the Saudi crown prince, telling him that “China is ready to be the most trustworthy and reliable partner in Saudi Arabia’s national revitalization process.”

Contrasting the United States on trade

That Wang focused on trustworthiness and reliability in both Amman and Riyadh was clearly carefully chosen messaging. In his meeting with Gulf Cooperation Council (GCC) Secretary-General Jasem al-Budaiwi, Wang tried to position China’s reliability as a reason to jump back into talks for the long-negotiated China-GCC free trade agreement. Wang noted that “the talks have lasted for more than twenty years, and conditions for all aspects are basically mature, it is time to make a final decision.” Claiming that free trade is “under attack,” he described a China-GCC free trade agreement (FTA) as “a strong signal to the world about defending multilateralism.” All of this served as a not-particularly-subtle means of comparing China as a defender of trade in the face of US tariffs. 

The FTA was also a focus in Wang’s talks with UAE Foreign Minister Sheikh Abdullah bin Zayed. Wang expressed hope that the UAE could play a role in moving the FTA towards a conclusion, while his counterpart responded that he’s willing to play a positive role in the matter.

Despite Wang’s positioning of Beijing as a reliable trade partner, the China-GCC FTA talks have been stalled for nearly a decade. During Xi’s 2016 visit to Riyadh, he said he wanted a deal done within a year. Four rounds of talks that year didn’t get the FTA finished, and the GCC rupture from 2017 to 2021 put negotiations on hiatus. Since then, every meeting between senior Chinese and Gulf officials has included Chinese statements about the need to conclude the agreement as soon as possible. 

It’s worth pointing out that since 2023, the GCC initiated six anti-dumping investigations against China, while Saudi Arabia has launched four of its own and Oman recently launched one as well, citing the need to “safeguard the local market from price distortions caused by imported products sold at unfair prices that do not reflect actual production costs.” UAE Minister of Foreign Trade Thani al-Zayoudi said at the World Economic Forum in October that “we are seeing huge dumping coming from China to our local markets,” and “we must make sure we are protecting our industries.” 

As Gulf countries look to develop local manufacturing, free trade with China isn’t an easy sell. Yes, China is a global trading superpower, but it is very much a one-sided trader, pursuing a mercantilist growth model that floods other countries’ markets while decreasing its own imports. Unfettered Chinese imports look more like a threat than an opportunity for Gulf countries at this stage in their development.

In any case, Wang’s visit did highlight the many areas of cooperation between China, the Saudis, and Emiratis. Talks included cooperation on oil and natural gas, renewable energy, technology, research and science, education, tourism, and security. China may not have reached the status of most reliable and trustworthy, but it is clearly signaling its ambition to be a more serious partner. 

Jonathan Fulton is a nonresident senior fellow for the Atlantic Council’s Middle East programs and the Scowcroft Middle East Security Initiative. He also serves as an associate professor of political science at Zayed University in Abu Dhabi. 

The post Wang Yi’s MENA tour was long on messaging, short on outcomes appeared first on Atlantic Council.

]]>
Voices from Iran: As rejection of government reaches all-time high, Iranians also wary of foreign intervention https://www.atlanticcouncil.org/blogs/menasource/voices-from-iran-as-rejection-of-government-reaches-all-time-high-iranians-also-wary-of-foreign-intervention/ Wed, 14 Jan 2026 20:01:43 +0000 https://www.atlanticcouncil.org/?p=899078 If Trump is serious about peace, stability, and a lasting legacy, the path forward does not run through air strikes or transactional deals with a failing theocracy.

The post Voices from Iran: As rejection of government reaches all-time high, Iranians also wary of foreign intervention appeared first on Atlantic Council.

]]>
Unlike any other time in modern history, a US president is encouraging protestors in a foreign country to “take over the institutions” in Iran, saying that “help is on its way”—potentially with the backing and support of Israel—while offering no clear policy toward either the fate of the country’s theocratic dictatorship or that of its ninety million people.

As of January 13, the Human Rights News Agency, a US-based human rights group, estimated that the death toll has climbed above two thousand since the start of the protests on December 28 last year. This is while the Iranian government, as it has done previously, enacted a complete internet blackout, where the entire nation continues to remain under the world’s largest digital prison.

“I saw snipers in our neighborhood—in all these years I’ve never seen such scenes,” said Sahar, a doctoral student in the Saadat Abad neighborhood in Tehran, in a brief phone conversation via Starlink satellite connection.

Her voice was more distraught than in our previous conversations earlier in the week. She also explained how, since Saturday, fewer people have been going on the streets. “At first, there were families, old, young, but now everyone’s terrified, given the bloodbath.”

So far, Tehran’s crackdown on the demonstrations appears to have turned into a bloodbath, in which the only victims appear to be ordinary Iranian people—those who for long have been paying the price of the brutality of the Islamic regime, topped with the global isolation resulting from decades of sanctions and pressure imposed by the United States and its allies.

Against this backdrop, US President Donald Trump may have a real opportunity to be an effective dealmaker with Iran. However, if he is serious about a durable, win-win outcome for both the United States and Iranians, there is only one asset worth betting on: the Iranian people.

Today, Iranian society is more unified against the Islamic Republic than at any point since 1979. Nearly three weeks into the latest nationwide protests, this time ignited not by a single spark but by the country’s wider economic freefall, Iranians have taken to the streets in extraordinary numbers.

Speaking shortly before the regime’s blackout began, Sepideh, an Iranian journalist who has been arrested multiple times and isn’t using her last name for security concerns, explained how she believes Iran is at one of the “most dangerous junctures” in its modern history.

“There is zero possibility of reform within this regime,” she told me. “But history also shows that the [United States], the UK, and Israel don’t prioritize the Iranian people either—only their own interests. This is what makes me afraid of what’s coming.”

Asked about Reza Pahlavi, the exiled son of Iran’s last monarch, she says with a deep sigh that “he has some supporters because there is no strong domestic opposition, as those voices have been crushed domestically over the years. But I struggle to believe in someone backed by foreign powers, tied to monarchy, and unable to form a coalition.”

Some others express a more fatalistic openness, including Sahar, who—prior to the internet blackout—told me how many Iranians “believe anything after this regime will be better. We want a complete separation of religion and state. This deck of cards needs to be reshuffled.”

These voices capture the nuances within the Iranian society today—united in its rejection of the Islamic Republic, deeply wary of foreign agendas, and desperate to reclaim agency over their own future.

For the United States, meaningful support for the Iranian people requires resisting the impulse to frame their uprising through the language of takeover or intervention, and instead prioritizing concrete protections for civilians in light of the brutal repression inside Iran. This means keeping Iran connected to the world, shielding protesters and journalists from digital isolation, and ensuring that accountability efforts target perpetrators of violence rather than a population already trapped between domestic repression and coercion from abroad.

Furthermore, it means treating internet access as humanitarian aid—funding circumvention support, satellite connectivity where feasible, and protection for independent journalists. This can help to ensure that the regime cannot repeatedly convert blackouts into a weapon of mass impunity.

An open, empowered Iranian civil society would not be a liability to US interests; it would be one of Washington’s greatest assets.

If the goal is to empower Iranians rather than freeze them into permanent victimhood, economic engagement must run alongside pressure on the state. This does not mean enriching the regime or reopening a flood-gate of funds to Islamic Revolutionary Guard Corps (IRGC)-backed entities. Rather, it means expanding lawful, carefully assessed, people-to-people commerce that bypasses state hijacking and manipulation.

This includes enabling small and medium-sized Iranian businesses, freelancers, and entrepreneurs to access global markets; lifting travel bans for Iranian students, artists, medics, scientists and civil society members while banning entry to government-affiliated individuals; widening licenses that allow US and European firms to provide cloud services, payment rails, logistics support, and professional tools directly to Iranian users; and supporting diaspora-led investment vehicles that fund Iranian startups, cooperatives, and cultural industries without routing capital through regime-controlled entities. Such engagement gives Iranians income, skills, and stake—converting isolation into leverage and dignity rather than dependency.

Despite decades of sanctions, Iran has cultivated one of the most educated populations in the region and a resilient tech ecosystem that mirrors Silicon Valley’s platforms under far harsher conditions. Iranian youth have built local equivalents of Amazon, Uber, YouTube, and DoorDash with little capital and almost no global access. With the right engagement, Iran could generate trillions in long-term value—benefiting not only Iranians but also US businesses and consumers. A reintegrated Iran, charged by its people, would open a new frontier in trade, education, technology, and culture.

Meanwhile, none of this negates Iran’s military capacity. After more than four decades of isolation, Iran recently went head-to-head with the world’s most powerful militaries. Even Israeli defense analysts were surprised by some of its capabilities—proof that such sophistication does not emerge from a broken society. Beneath the Islamic regime’s aggression lies decades of scientific and technological investment made by the Iranian people themselves, who—if empowered and allowed self-determination—could become Washington’s strongest allies in the region.

Trump’s rhetoric amplifies the contradictions Iranians already live with. His warnings to Tehran and expressions of solidarity have landed with equal parts validation and fear. For some protesters, his words signal that their struggle is finally seen as entwined with an uncertainty of what’s to come. For others, Washington’s bombast risks giving the regime a pretext to paint the Iranian people’s unified dissent as foreign-engineered. Supreme Leader Ayatollah Ali Khamenei’s accusations that protesters act “to please Trump” reveal just how threatening even rhetorical pressure can be to a regime terrified of losing control—one that’s now at its weakest point than ever before.

Iranians understand the stakes. They have watched Russia and China extract economic leverage from their isolation, and they fear becoming yet another bargaining chip. As Behzad, an Iranian journalist who is going by his first name for security purposes, told me, “everyone wants a piece of Iran. Sometimes I wish we lived in a poorer, smaller country; so at least we could live freely—far from domestic corruption and foreign interference.”

Still, across class, gender, and belief, Iranians remain united in one demand: the dismantling of the current regime. They do not ask the United States for bombs or saviors. They ask for surgical, effective, and thought-through support that enables them to reclaim their own agency in the absence of the current regime.

If Trump is serious about peace, stability, and a lasting legacy, the path forward does not run through air strikes or transactional deals with a failing theocracy. It runs through the Iranian people who, if given the chance, could build one of the world’s most dynamic democracies and one of Washington’s most valuable partners.

Tara Kangarlou is an award-winning global affairs journalist, author, and humanitarian who has worked with news outlets such as NBC, CNN, CNN International, and Al Jazeera America. She is also the author of the bestselling book The Heartbeat of Iran, the founder of nonprofit Art of Hope, and an adjunct professor at Georgetown’s School of Foreign Service, teaching on humanized storytelling and journalism.

The post Voices from Iran: As rejection of government reaches all-time high, Iranians also wary of foreign intervention appeared first on Atlantic Council.

]]>
Kroenig on DW News on US oil tanker seizures in the Caribbean https://www.atlanticcouncil.org/insight-impact/in-the-news/kroenig-on-dw-news-on-us-oil-tanker-seizures-in-the-caribbean/ Wed, 07 Jan 2026 17:00:00 +0000 https://www.atlanticcouncil.org/?p=898075 On January 7, Atlantic Council vice president and Scowcroft Center senior director Matthew Kroenig was interviewed on DW-TV about the US seizure of a Russian flagged oil tanker carrying Venezuelan oil. He contends that the move signaled US resolve in quarantining the Venezuelan regime and adopting a firmer approach toward Russia in the Western hemisphere.

The post Kroenig on DW News on US oil tanker seizures in the Caribbean appeared first on Atlantic Council.

]]>

On January 7, Atlantic Council vice president and Scowcroft Center senior director Matthew Kroenig was interviewed on DW News about the US seizure of a Russian flagged oil tanker carrying Venezuelan oil. He contends that the move signaled US resolve in quarantining the Venezuelan regime and adopting a firmer approach toward Russia in the Western hemisphere.

It is impressive that [President Trump] is enforcing this quarantine against Venezuela and not letting these Russian and Venezuelan tricks of trying to reflag stand in his way.

Matthew Kroenig

The post Kroenig on DW News on US oil tanker seizures in the Caribbean appeared first on Atlantic Council.

]]>
Kroenig quoted in Politico on US policy in Venezuela https://www.atlanticcouncil.org/insight-impact/in-the-news/kroenig-quoted-in-politco/ Tue, 06 Jan 2026 02:00:00 +0000 https://www.atlanticcouncil.org/?p=897125 On January 5, Atlantic Council vice president and Scowcroft Center senior director Matthew Kroenig was quoted in Politico's "National Security Daily" on the Trump administration's Venezuela policy. He explains that administration's ambiguity is intentional and aimed at preventing fractures within the Republican party.

The post Kroenig quoted in Politico on US policy in Venezuela appeared first on Atlantic Council.

]]>

On January 5, Atlantic Council vice president and Scowcroft Center senior director Matthew Kroenig was quoted in Politico’s “National Security Daily” on the Trump administration’s Venezuela policy. He explains that administration’s ambiguity is intentional and aimed at preventing fractures within the Republican party.

Given that what happens next is so ambiguous, people can maybe read their hopes and dreams into it.

Matthew Kroenig

The post Kroenig quoted in Politico on US policy in Venezuela appeared first on Atlantic Council.

]]>
The Trump Corollary is officially in effect https://www.atlanticcouncil.org/dispatches/the-trump-corollary-is-officially-in-effect/ Mon, 05 Jan 2026 21:04:58 +0000 https://www.atlanticcouncil.org/?p=896986 The Trump administration has a unique opportunity to reimagine the contours of US hemispheric defense for years to come.

The post The Trump Corollary is officially in effect appeared first on Atlantic Council.

]]>

Bottom lines up front

WASHINGTON—The daring US operation that captured Venezuelan dictator Nicolás Maduro and transported him to the United States to stand trial for his crimes signals a dramatic shift in US foreign policy, with implications far beyond Venezuela. The Trump administration’s decision to depose the Maduro regime is the embodiment of its recent National Security Strategy (NSS), which prioritized the defense of the US homeland and the Western Hemisphere.

While most National Security Strategies are quickly forgotten, both of Trump’s strategies have served as reliable guides to his approach to foreign affairs. His 2017 NSS announced a US focus on great-power competition, principally with China, and heralded an important shift of the United States’ attention after decades of Middle Eastern preoccupation. The president’s 2025 NSS, released in December, set about prioritizing US security interests globally and identified protection of US territory and the Western Hemisphere as the central tasks of US foreign policy. Importantly, the NSS also carved out a “Trump Corollary” to the Monroe Doctrine, citing malign activity by “extra-hemispheric powers” as a serious threat to US national security.

As such, the recent Venezuela operation should be understood as of a piece with the president’s earlier focus on acquiring Greenland, his calls for resuming US control over the Panama Canal, and his interest in stemming the flow of narcotics trafficking and illegal migration in the hemisphere. In each instance, extra-hemispheric influence has played a significant role in galvanizing Washington’s concern: Chinese outfits own key facilities along the canal. Russia and China conduct military activity near Greenland and in the High North. And Beijing, Moscow, and Tehran hold long-standing influence in Caracas. With the Maduro capture, Washington is sending a powerful signal that it is taking the NSS seriously, and that it is prepared to act swiftly to enforce the Trump Corollary.

The Trump administration’s decision to depose the Maduro regime is the embodiment of its recent National Security Strategy.

Beijing’s ambitions in the Western Hemisphere have long been a concern for Washington, but recent trends are particularly alarming. In late December, reports emerged that China’s People’s Liberation Army was conducting war games simulating combat in the Western Hemisphere. This news came shortly after Beijing published an official strategy for Latin America that takes an increasingly belligerent tone in asserting its regional interests there. China actively supports the destabilizing Cuban regime, including by maintaining a surveillance post on the island just ninety miles from US territory. With Beijing increasing its efforts to extend coercive economic diplomacy across the hemisphere and its public interest in West African naval access fronting the Atlantic Ocean, the Trump Corollary seems poised to clash with China’s strategic posture.

The sheer number of potential flashpoints between the United States and great-power rivals such as China under the rubric of the Trump Corollary demonstrates an important point about the administration’s strategy: While the new NSS is primarily a document about narrowing and prioritizing US objectives globally, with a lesser focus on Europe and the Middle East, it is wholly committed to an expansive vision of US interests in the Western Hemisphere. This is likely to lead to near-term adjustments to US policy, with the goal of better operationalizing the Trump Corollary to address the hemispheric challenges facing the United States.

Here are three areas to watch in the coming months.

First, under the rubric of “hemispheric defense” that guided US security strategy in the hemisphere for decades, the Trump administration should expand the geographic definition of the hemisphere for the purpose of applying the Monroe Doctrine and the Trump Corollary. By stating unambiguously that the hemisphere is broadly defined as the Aleutian Islands to Greenland and the North American Arctic to Antarctica—with Central and South America and the Caribbean in between and the Pacific and Atlantic approaches to the hemisphere included—the administration could effectively place the region in lockdown, preventing encroachment by China, Russia, and Iran.

Second, to operationalize hemispheric defense going forward, the administration should expand the rotational and permanent deployment of US land, naval, Coast Guard, and air assets in the hemisphere. As the Trump administration works to reposition US forces from legacy bases in Europe and the Middle East, it could simultaneously expand or reopen US facilities in Puerto Rico and the US Virgin Islands. It could also seek to establish or expand rotational or permanent access agreements with US partners such as El Salvador, Ecuador, the Dutch Caribbean islands of Aruba and Curaçao, Guyana, Trinidad and Tobago, and others.

Beyond these countries, Washington could seek a more expansive agreement with Costa Rica, which lacks a permanent military and currently allows the US military access on a case-by-case basis. A new agreement with Costa Rica could look like the comprehensive defense arrangements the United States enjoys with Pacific Island partners such as the Marshall Islands, Palau, and Micronesia. Similarly, as the administration explores its options for a broader political solution to the president’s desire to acquire Greenland, the United States could request expanded access to the island under the 1951 defense agreement and begin prepositioning anti-submarine warfare and Arctic training assets there to counter Chinese and Russian malign activity in the High North.

Third, the administration can begin leveraging such force posture changes to actively deter malign activity and advance US interests in the hemisphere. Greater US forward presence in the region would, among other outcomes, help deter Chinese and Russian collaboration with the Cuban regime, which has spread chaos and destabilization across Latin America for decades. Expanding the US presence in Costa Rica and the Dutch Caribbean would help ensure access to the Panama Canal while the administration seeks broader solutions to Chinese influence. A stronger US Coast Guard and naval presence in the Caribbean would help combat narcotics trafficking and illegal migration that pose a direct threat to the US homeland. Further north, increasing US assets in Greenland would contribute to Arctic security.

While the administration’s actions in Venezuela have shocked the world and sent a strong message to US rivals in Beijing, Moscow, Havana, and Tehran, they are likely only the starting point for a longer-term and more comprehensive reappraisal of US core interests in the hemisphere and the means to achieve them. The Trump administration has a unique opportunity, built around its NSS and its audacious Venezuela operation, to reimagine the contours of US hemispheric defense for years to come.

The post The Trump Corollary is officially in effect appeared first on Atlantic Council.

]]>
Kroenig quoted in Bloomberg on Trump’s Venezuela strategy https://www.atlanticcouncil.org/uncategorized/kroenig-quoted-in-bloomberg-on-trumps-venezuela-strategy/ Mon, 05 Jan 2026 17:44:33 +0000 https://www.atlanticcouncil.org/?p=896940 On January 4, Atlantic Council vice president and Scowcroft Center senior director Matthew Kroenig was quoted in a Bloomberg article titled "Trump Snatches Maduro But Leaves His Regime in Charge for Now." He explains that the Trump administration is attempting to influence the Venezuelan vice president to secure outcomes favorable to the US.

The post Kroenig quoted in Bloomberg on Trump’s Venezuela strategy appeared first on Atlantic Council.

]]>

On January 4, Atlantic Council vice president and Scowcroft Center senior director Matthew Kroenig was quoted in a Bloomberg article titled “Trump Snatches Maduro But Leaves His Regime in Charge for Now.” He explains that the Trump administration is attempting to influence the Venezuelan vice president to secure outcomes favorable to the US.

Trump is “essentially trying to control the vice president and people around her through carrots and sticks to get the outcomes the United States wants.”

Matthew Kroenig

The post Kroenig quoted in Bloomberg on Trump’s Venezuela strategy appeared first on Atlantic Council.

]]>
Kroenig in C-SPAN on foreign policy in 2026 https://www.atlanticcouncil.org/insight-impact/in-the-news/kroenig-in-c-span-on-foreign-policy-in-2026/ Mon, 05 Jan 2026 17:08:22 +0000 https://www.atlanticcouncil.org/?p=896885 On January 2, Atlantic Council vice president and Scowcroft Center senior director Matthew Kroenig was interviewed on C-SPAN's "Washington Journal" about foreign policy challenges for 2026. He analyzes threats from the People's Republic of China, speaks about protests in Iran, and discusses the Trump administration's National Security Strategy.

The post Kroenig in C-SPAN on foreign policy in 2026 appeared first on Atlantic Council.

]]>

On January 2, Atlantic Council vice president and Scowcroft Center senior director Matthew Kroenig was interviewed on C-SPAN’s “Washington Journal” about foreign policy challenges for 2026. He analyzes threats from the People’s Republic of China, speaks about protests in Iran, and discusses the Trump administration’s National Security Strategy.

I think China is the biggest challenge the United States is facing, and maybe has ever faced, because it is so much more capable than past rivals, even Nazi Germany or the Soviet Union.

 

Matthew Kroenig

The post Kroenig in C-SPAN on foreign policy in 2026 appeared first on Atlantic Council.

]]>
Gray interviewed on Bloomberg about Trump’s Venezuela policy https://www.atlanticcouncil.org/insight-impact/in-the-news/gray-interviewed-on-bloomberg-about-trumps-venezuela-policy/ Mon, 05 Jan 2026 03:40:00 +0000 https://www.atlanticcouncil.org/?p=897155 On January 4, Alexander B. Gray, a GeoStrategy Initiative nonresident senior fellow, was interviewed on Bloomberg's "The China Show" about the decision to capture Nicolas Maduro. He explains that the Trump administration has redefined US core interests as inextricably linked to the Western hemisphere, and argues ousting Maduro eliminated a hostile regime and narrowed the strategic space for US adversaries.

The post Gray interviewed on Bloomberg about Trump’s Venezuela policy appeared first on Atlantic Council.

]]>

On January 4, Alexander B. Gray, a GeoStrategy Initiative nonresident senior fellow, was interviewed on Bloomberg about the decision to capture Nicolas Maduro. He explains that the Trump administration has redefined US core interests as inextricably linked to the Western hemisphere, and argues ousting Maduro eliminated a hostile regime and narrowed the strategic space for US adversaries.

The GeoStrategy Initiative, housed within the Scowcroft Center for Strategy and Security, leverages strategy development and long-range foresight to serve as the preeminent thought-leader and convener for policy-relevant analysis and solutions to understand a complex and unpredictable world. Through its work, the initiative strives to revitalize, adapt, and defend a rules-based international system in order to foster peace, prosperity, and freedom for decades to come.

The post Gray interviewed on Bloomberg about Trump’s Venezuela policy appeared first on Atlantic Council.

]]>
The art of war is undergoing a technological revolution in Ukraine https://www.atlanticcouncil.org/blogs/ukrainealert/the-art-of-war-is-undergoing-a-technological-revolution-in-ukraine/ Wed, 24 Dec 2025 23:52:17 +0000 https://www.atlanticcouncil.org/?p=896502 Ukraine’s battlefield experience since 2022 confirms that in order to be successful in modern warfare, armies should model themselves on technological giants like Amazon and SpaceX, writes Oleg Dunda.

The post The art of war is undergoing a technological revolution in Ukraine appeared first on Atlantic Council.

]]>
Ukraine is currently at the epicenter of radical changes taking place in the way modern wars are fought. However, much of the world is still busy preparing for the wars of yesterday. European armies are only combat-ready on paper, while the invincibility of the United States military is based largely on past victories.

The current state of affairs is far from unprecedented. In early 1940, Polish officers tried to warn their French counterparts about Nazi Germany’s new blitzkrieg tactics but were ignored. France surrendered soon after. There is still time to adapt to the transformations that are now underway, but the clock is ticking.

One of the key lessons from the war in Ukraine is the evolving role of soldiers. People are now the most expensive, vulnerable, and difficult resource to replace on the battlefield. Meanwhile, many of the core weapons systems that dominated military doctrines in the late twentieth and early twenty-first centuries are becoming less relevant. Tanks, artillery, and other traditional systems are simply too expensive and are unsuited to the challenges created by newer technologies.

Unmanned systems of all kinds have emerged since 2022 as a fundamental element of modern military doctrine. This is radically changing everything from the structure of armies to the role of the individual soldier. Remotely controlled equipment no longer needs a large crew to support it, while individual models are becoming more compact and maneuverable. As a result, the power of unmanned weapons systems is increasing exponentially, while production is expanding to industrial scale and becoming significantly cheaper.

More and more soldiers now serve as unmanned systems operators. Those who remain in more traditional roles perform tasks such as special operations, guard duties, or logistical functions. The war being waged by Ukraine has demonstrated that the modern battlefield features a kill zone up to 25 miles deep and spanning the entire front line. This zone is controlled by drones that destroy any infantry or equipment. Combat operations are increasingly conducted by drone operators located deep in the rear or in underground bunkers.

In these conditions of drone dominance over the battlefield, any attempts to stage major breakthroughs are doomed to failure. Instead of tank columns and artillery duels, offensive operations require maximum dispersal of forces and the greatest possible camouflage. The main task of troops is to gradually shift the kill zone deeper into the enemy’s rear.

Success depends upon the ability to rapidly produce large quantities of inexpensive combat drones and continually update their control systems. Initial tactics involving single drones and individual targets are already becoming a thing of a past. Instead, operators can now use artificial intelligence to control entire fleets featuring large numbers of drones deployed simultaneously. This approach allows a single soldier to manage kilometers of front line space rather than just a few hundred meters. The result is a reduction in the need for mass mobilization and an emphasis on the professionalism and technical skills of each operator manning the front.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

Combat operations now boil down to two main scenarios: Either the collapse of an enemy who is not prepared for the new intensity of combat, or a positional struggle in the style of World War I. In a protracted positional war, it is crucial to ensure control over the kill zone and maintain sufficient supplies while depriving the enemy of similar capabilities. The protection of logistics networks and the infliction of maximum damage on the enemy’s rear areas is of decisive importance.

First and foremost, this means cutting off ground supply routes. To protect logistics, armies must develop fleets of maneuverable transport drones that are not dependent on road quality and can navigate minefields. Meanwhile, to ensure the steady supply of ammunition and spare parts to underground storage points along the front lines, a mobile air defense system featuring interceptor drones is necessary.

At the strategic level, key targets are now weapons factories, logistics centers, and command posts, which are often hidden deep in the rear or located inside underground bunkers close to the front lines. Destroying these high-value targets requires guided missiles or other air strike capabilities. Military planners are therefore faced with the challenge of moving away from expensive manned aircraft toward reusable strategic drones.

Testing of fully-fledged unmanned aircraft is already underway. The transition toward unmanned aviation will open up the mass deployment of guided aerial bombs, which are significantly cheaper than missiles. In addition, strategic drones will themselves be able to act as “aircraft carriers” for kamikaze drones.

The same principles apply equally to the maritime theater of operations. Ukrainian Sea Baby naval drones have already proven themselves by destroying numerous warships from Russia’s Black Sea Fleet and carrying out attacks on Russia’s shadow fleet of oil tankers.

To ensure their future national security, states must focus on the mass production of unmanned systems and their components. China currently accounts for the lion’s share of component parts. This is a challenge for any country that seeks to play a role in global affairs. China must be deprived of the strategic advantages it enjoys due to its status as the leading producer of components for unmanned systems.

Many NATO generals appear to think that recent technological advances are making war cheaper and creating a more level military playing field. This is a mistake. In reality, any reduction in the cost of weapons is more than offset by the need for increased quantities.

It is also important to stress that unmanned technologies alone are not enough. Another key factor is an army’s access to reliable digital communications similar to Starlink. Without this capability, it is impossible to coordinate combat operations, collect data, and maintain connections between individual units and command structures. It is no coincidence that China is already investing billions to address this issue.

The transformation currently underway in the military sphere also increases the role of cyber warfare. Disruption to logistics, power outages, and communications breakdowns can all provide the enemy with the opportunity to advance. A hacked cyber system can expose vital defenses or dramatically reduce the possibility of recovery.

Looking ahead, technological innovation in the military must be recognized as a national priority when allocating defense budgets. This applies to everything from unmanned systems to the development of artificial intelligence.

The most important revolution must take place within the minds of today’s military generals. A comprehensive rethink of existing military doctrines is currently needed. Armies must be completely re-equipped. It is time for the top brass to acknowledge that they should either change or give way to a new generation of military strategists.

Ukraine’s experience since 2022 has confirmed that in order to be successful in modern warfare, armies should model themselves on technological giants like Amazon and SpaceX. They must embrace flexible thinking and be capable of competing in terms of implementing new innovations.

In an era of accelerated military change, all countries face a simple choice of adapting or accepting the inevitability of defeat. The winners will be those who embrace the lessons from the technological revolution currently underway on the battlefields of Ukraine.

Oleg Dunda is a member of the Ukrainian Parliament from the Servant of the People party.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values, and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia, and Central Asia in the East.

Follow us on social media
and support our work

The post The art of war is undergoing a technological revolution in Ukraine appeared first on Atlantic Council.

]]>
Kroenig in the Wall Street Journal on the US National Security Strategy https://www.atlanticcouncil.org/insight-impact/in-the-news/kroenig-in-the-wall-street-journal-on-the-national-security-strategy/ Fri, 19 Dec 2025 17:31:00 +0000 https://www.atlanticcouncil.org/?p=895914 On December 19, Atlantic Council Vice President and Scowcroft Center Senior Director Matthew Kroenig published an opinion letter in the Wall Street Journal titled “What Trump’s Foreign-Policy Detractors Miss.” In the article, Kroenig argues that critics of the new NSS overlook the practical roadmap it lays out for addressing core strategic challenges.

The post Kroenig in the Wall Street Journal on the US National Security Strategy appeared first on Atlantic Council.

]]>

On December 19, Atlantic Council Vice President and Scowcroft Center Senior Director Matthew Kroenig published an opinion letter in the Wall Street Journal titled “What Trump’s Foreign-Policy Detractors Miss.” In the article, Kroenig argues that critics of the new NSS overlook the practical roadmap it lays out for addressing core strategic challenges.

Many assessments have understandably focused on its provocative passages and glaring omissions. Yet by promising to revitalize our “economic and military preeminence,” the document doubles down on key pillars of U.S. grand strategy, while updating them with practical solutions to new challenges.

Matthew Kroenig

The post Kroenig in the Wall Street Journal on the US National Security Strategy appeared first on Atlantic Council.

]]>
The only winner from Ukrainian wartime elections would be Putin https://www.atlanticcouncil.org/blogs/ukrainealert/the-only-winner-from-ukrainian-wartime-elections-would-be-putin/ Tue, 16 Dec 2025 19:34:10 +0000 https://www.atlanticcouncil.org/?p=894806 Ukrainians are fighting to defend their democracy against Kremlin authoritarianism, but they are also in no rush to hold wartime elections amid relentless Russian bombardment and with millions of Ukrainians displaced, writes Yuriy Boyechko.

The post The only winner from Ukrainian wartime elections would be Putin appeared first on Atlantic Council.

]]>
Ukrainian President Volodymyr Zelenskyy is once again facing pressure to hold wartime elections after US President Donald Trump accused the Ukrainian leader of using Russia’s invasion to postpone a vote and suggested it was now time for the country to go to the polls. Zelenskyy has responded to Trump’s recent comments by expressing his readiness to organize elections in the next two to three months, while calling on Ukraine’s Western partners to play a role in preparations. “I’m asking now, and I’m stating this openly, for the US to help me, perhaps together with our European colleagues, to ensure security for the elections,” he said on December 10.

Zelenskyy’s commitment to democratic principles is commendable, but he should nevertheless resist international pressure to rush into wartime elections. Attempting to hold a national vote at a time when the country is under relentless Russian bombardment and while millions of Ukrainians remain displaced by the war would not be a demonstration of democracy; it would be a strategic blunder that could hand a propaganda victory to Moscow.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

The issue of potential wartime elections in Ukraine has been raised on numerous occasions since spring 2024 when Zelenskyy’s presidential term officially ended, with Russia frequently referencing the absence of elections in Ukraine as part of efforts to undermine the legitimacy of the current Ukrainian authorities. These Kremlin claims of illegitimacy are inaccurate. The Ukrainian Constitution specifically forbids elections while martial law is in place, which has been the case in Ukraine since the start of Russia’s full-scale invasion in February 2022.

This constitutional barrier to wartime elections is not a mere legal loophole or a convenient excuse. It is a foundational safeguard designed to ensure the continuity of governance during times of national crisis. Of course, it is possible to argue that the relevant legislation could be revised. But any attempt to change the Ukrainian Constitution would risk a constitutional crisis in the middle of a major war. It would divert the attention of Ukraine’s parliament, the country’s judicial system, and the public away from the war effort, with obvious potential for political infighting and domestic instability.

The constitutional arguments against a wartime election are convincing, but the main reason why Ukraine cannot go to the polls while the Russian invasion continues is because any such vote would fall far short of recognized democratic standards in terms of freedom, fairness, and representation. A truly democratic election requires a level playing field, security for participants, and the ability for all eligible citizens to cast their ballots. None of these conditions can be met in today’s Ukraine.

Security problems alone should be enough to rule out the idea of a wartime ballot. With Russia bombing civilian targets across Ukraine on a daily basis, candidates would be unable to stage any public campaign gatherings in safety. Likewise, polling stations would become high-value targets for Russian drones and missiles, creating unacceptable risks for thousands of election workers and millions of voters.

The logistical challenges of a wartime vote would be similarly overwhelming. Millions of Ukrainians are currently located abroad as refugees in the European Union and elsewhere. Millions more are internally displaced inside Ukraine. This creates huge issues for voter registries, which would need to be completely revised and updated. Furthermore, the voices of Ukrainian citizens living under Russian occupation would be silenced entirely, disenfranchising a large portion of the overall electorate and further undermining the credibility of any vote.

If Zelenskyy chooses to proceed with a wartime election, the potential for domestic political destabilization would be huge. An election held under wartime conditions would inevitably be a flawed process, with millions unable to vote and security restrictions placing limits on meaningful campaigning opportunities. Regardless of the outcome, Russia would seize on these flaws in order to declare the results illegitimate, sow internal discord, and undermine the credibility of the Ukrainian government in the eyes of the international community. The resulting instability could prove a far greater threat to Ukraine’s survival than any perceived democratic deficit.

According to his country’s constitution, Zelenskyy is the legally elected leader of Ukraine and will remain so until conditions in the country allow for the relaxation of martial law restrictions and the organization of genuinely free and fair elections. This will only become possible once a comprehensive and verifiable ceasefire is in place. Until the bombs stop falling, the Ukrainian government’s priority must remain the defense of the nation.

Ukrainians are fighting to defend their democracy against Russian authoritarianism, but they are also in no rush to hold a wartime vote. Instead, opinion polls consistently demonstrate that most Ukrainians oppose the idea of any elections while active hostilities continue. When the right moment arrives, Ukrainians will be the first to demand their democratic rights and will insist on new elections. However, they understand that the right moment has not yet arrived.

Yuriy Boyechko is CEO of Hope For Ukraine.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values, and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia, and Central Asia in the East.

Follow us on social media
and support our work

The post The only winner from Ukrainian wartime elections would be Putin appeared first on Atlantic Council.

]]>
Scowcroft Strategy Scorecard: Grading Trump’s second National Security Strategy https://www.atlanticcouncil.org/content-series/scorecard/scowcroft-strategy-scorecard-grading-trumps-second-national-security-strategy/ Mon, 08 Dec 2025 21:01:57 +0000 https://www.atlanticcouncil.org/?p=892685 The Trump administration recently released its new National Security Strategy, a document that represents a major departure from past strategies. Experts from our Scowcroft Center for Strategy and Security hand out their grades.

The post Scowcroft Strategy Scorecard: Grading Trump’s second National Security Strategy appeared first on Atlantic Council.

]]>

Scowcroft Strategy Scorecard:
Grading Trump’s second National Security Strategy

Last week, the White House released its new National Security Strategy (NSS), representing the Trump administration’s view of the world’s greatest challenges—and how the United States can protect its interests. The strategy marks a significant departure in framing from the first Trump administration and has caused a stir in Washington and around the world. Experts at the Atlantic Council’s Scowcroft Center for Strategy and Security dove into the document and graded it based on five criteria.

Matthew Kroenig

Vice president and senior director at the Scowcroft Center for Strategy and Security

The strategy earns a “B” grade from me. It explains what is new and different, with a new focus on the Western Hemisphere. It reaffirms longstanding principles of US grand strategy, like nuclear deterrence and preventing hostile countries from dominating important regions. It announces new policies for new problems, like how to maintain US technological leadership. On the negative side of the ledger, it dismisses longstanding principles that continue to work, such as promoting democracy and human rights. It also fails to adequately identify the threat posed by revisionist autocracies and a strategy for countering it. 

Distinctiveness

Is there a clear theme, concept, or label that distinguishes this strategy from previous strategies?

Yes. The strategy identifies the Western Hemisphere as a priority theater for US national security strategy through the “Trump Corollary” to the Monroe Doctrine. This is a change from past strategy, and the promise of new economic engagement will be welcomed by countries in the region.

Sound strategic context

Does the strategy accurately portray the current strategic context and security environment facing the United States? Is the strategy predicated on any specious assumptions?

The strategy would have benefited from a dedicated strategic context section. The discussion of the national security threats facing the nation—especially from the “Axis of Aggressors” —are only thinly sketched.

Defined goals

Does the strategy define clear goals?

Yes. The strategy is remarkably clear in its articulation of the goals on page five. This includes defined goals to achieve US dominance in emerging technologies, support allies in Europe and the Indo-Pacific, and counter adversaries in the Western Hemisphere.

Clear lines of effort

Does the strategy outline several major lines of effort for achieving its objectives? Will following those lines of effort attain the defined goals? Does the strategy establish a clear set of priorities, or does it present a laundry list of US foreign policy activities?

The strategy lists many principles and activities, but it does not aggregate these up into major lines of effort.

Realistic implementation guidelines

Is it feasible to implement this strategy? Are there resources available to sustain it?

More so than its predecessors, this strategy does specify clear priorities and rules out activities (like intervention and democracy promotion) that had been part of past strategies. One can debate the wisdom of the prioritization, but the hard-nosed prioritization does make the strategy inherently sustainable. As with all strategic documents, resourcing will be a major challenge to enacting the vision laid out within it.

Nate Freier 

Nonresident senior fellow, Geostrategy Initiative, Scowcroft Center for Strategy and Security

The 2025 National Security Strategy (NSS 25) appears to signal that the United States is no longer the broadly collaborative status quo power that the world has come to rely on since World War II. Instead, it suggests that the United States is now increasingly a more transactional revisionist power intent on altering its relationship with the rest of the world, often explicitly to its near-exclusive benefit. Since World War II, US strategy has generally exhibited an enlightened self-interest, recognizing the tangible and intangible benefits of its being a coalition-builder, a first-among-equals leader, and a reliable heavyweight international arbiter. The first has historically generated exploitable power via strength in numbers and the latter two have often preserved for the United States the right to set agendas and tilt outcomes in its favor. NSS 25 appears to mark a sharp departure from this traditional governing philosophy and, in doing so, engenders significant risk.  

Distinctiveness

Is there a clear theme, concept, or label that distinguishes this strategy from previous strategies?

In practical terms, NSS 25 is distinct in that it does articulate a clear, unambiguous, and circumspect set of vital interests and priorities. And specifically, for example in the Indo-Pacific, it does at times deliver clear strategic logic as to why continued US commitment is essential. Further, NSS 25 exhibits a novel predisposition to lead with US economic, commercial, and technological advantage as principal competitive instruments. However, there is real risk in its under-defined approach to the often-malign behavior of “larger, richer, and stronger” rival states (e.g., Russia) and their illegitimate employment of the cover of “sovereignty” to prey on vulnerable neighbors and third parties. The strategy also exhibits an explicit abandonment of some timeless US commitments to political liberalization, human rights, and human security as if these are not—even in the context of “flexible realism”—often prerequisites for the long-term security of US interests. 

Sound strategic context

Does the strategy accurately portray the current strategic context and security environment facing the United States? Is the strategy predicated on any specious assumptions?

Strategic context is the environment against which strategy is applied, within which it unfolds and adapts, and because of which it succeeds or fails. NSS 25 is excessively inward-looking and offers little substance on what is a highly contested competitive environment between rival states. The United States faces ongoing resistance from a combination of its purposeful rivals (e.g.,  the People’s Republic of China and Russia), as well as the environment within which it and they compete for advantage (e.g., physical proximity, structural vulnerability, prolific connectivity, fragile alliances and economies, and domestic and foreign disharmony). US rivals want to weaken the US position, replace the United States as the world’s indispensable great power, and force onerous constraints on US influence where it counts most. NSS 25 harbors real risk in that it focuses on what the United States wants but does not adequately portray the degree to which rivals will exploit strategic conditions, their inherent capabilities, and US action and/or inaction to advance their interests at US expense.  

Defined goals

Does the strategy define clear goals?

In combination and from a practical standpoint, an interpretation of NSS 25’s description of what the United States should want for itself and what it also wants “in and from the world” provides an adequate picture of this administration’s direction. However, it is critical that goals match context. Context should, after all, flag the kinds of hazards and opportunities that help define and realistically shape goals. Thus, NSS 25’s limited articulation of context and the lack of substance attending this gap makes it difficult to adequately assign value to the strategy’s goals in isolation. Nonetheless, as a practical matter—save for what might be called the strategy’s rebalance to the Western Hemisphere—NSS 25’s goals at home and abroad are by themselves clear and, for the most part, consistent with traditional US security objectives. But there are risks embedded in the goals. For example, the strategy’s explicit rebalance to the Western Hemisphere and its softer, more conditional commitment to European defense and security have the potential to trigger horizontal rival escalation in perceived vacuums of US interest and commitment, as well as unfavorable ally and third-party bargaining with rivals as US activism is perceived in retreat.  

Clear lines of effort

Does the strategy outline several major lines of effort for achieving its objectives? Will following those lines of effort attain the defined goals? Does the strategy establish a clear set of priorities, or does it present a laundry list of US foreign policy activities?

In some combination of NSS 25’s “Priorities,” as well as the “how” embedded in its description of regional approaches, one can discern actionable lines of effort. The “Enlist” and “Expand” elements of Western Hemisphere strategy and the three elements described under Asia (“Leading from a Position of Strength,” “Economics,” and “Deterring Military Threats”) have within them testable hypotheses for success and broad approaches to achieving it. However, NSS 25 would benefit from a more coherent design that is animated by a thorough description of the context within which it is to be implemented. Context, goals, and lines of effort, after all, provide a singular theory of the case. As described earlier, the degree to which economics dominate the amended US approach to Asia is notable and novel. But success here would seem to rely on a distinctively US commercial line of effort lying substantially outside the traditional control of US decisionmakers. Novel can be a strength and weakness. At minimum, novel here suggests an area of risk that merits significant alignment in a coherent strategic design with other complementary lines of effort where the risk associated with underperformance is mitigated by the potential for acceleration in adjacent efforts more under US policymaker control.    

Realistic implementation guidelines

Is it feasible to implement this strategy? Are there resources available to sustain it?

Overall, this is a high-risk strategy. At times, it is stripped down and minimalist. And, therefore, the prospects of the United States achieving its limited objectives are better than are the chances for success in pursuit of more expansive and ambiguous strategic ends. However, the real risk here is in the strategy’s broad thrust. As US decision makers implement a strategy that so explicitly rethinks and rescopes the United States’ global role, they should expect that those who have either relied on or resisted US influence will themselves recalculate their strategic choices in ways that ignite a disruptive and unfavorable realignment of actors and forces within the international system. Further still, there are troubling elements of values erosion, ethno-centrism, and cultural shaming throughout the strategy that—when operationalized—have the potential to change how the world sees the United States, as well as the degree to which the actors upon whom the United States relies are willing to cooperate with it. 

Alexander B. Gray

Nonresident senior fellow, Geostrategy Initiative, Scowcroft Center for Strategy and Security

The Trump NSS is a powerful break from thirty-five years of US strategies that promise to prioritize everything and end up prioritizing nothing. With shrinking resources and public aversion to global entanglements, the NSS provides defined, manageable, and clear US national interests and places them in a strategic framework that can serve to advance US strategy.  

Distinctiveness

Is there a clear theme, concept, or label that distinguishes this strategy from previous strategies?

The Trump administration’s NSS is a fundamental break with three decades of US strategy. The document is unlike anything put forward by a US administration since the end of the Cold War. Rather than assume that the United States has limitless global interests, the NSS seeks to undertake a difficult and needed referencing of “ways” and “means,” ultimately giving priority to those regions and tasks deemed most essential to core US interests. By seeking prioritization, and making the concomitant difficult choices, the NSS is truly unique and the most definitionally “strategic” document produced by the US government since 1991. 

Sound strategic context

Does the strategy accurately portray the current strategic context and security environment facing the United States? Is the strategy predicated on any specious assumptions?

The NSS accurately reflects a more constrained strategic environment, with less material resources and public support for international engagement that is ancillary to core US interests. By focusing on the “basics,” and starting with defense of the homeland and working outward, the NSS refuses to accept that US strategy must ceaselessly expand to meet global challenges rather than picking and choosing which global challenges are most directly tied to US interests. The focus on the Western Hemisphere, and the unique threat posed by extra-hemispheric actors like China, is decades overdue; the NSS makes plain that protection of the homeland and the hemisphere and the pursuit of US interests in the Indo-Pacific are interwoven for the foreseeable future.  

Defined goals

Does the strategy define clear goals?

The NSS’s goals are clear: defend the homeland; defend the Western Hemisphere, particularly from extra-hemispheric actors; prevent the rise of a dominant hegemon in Eurasia; and secure a free and open Indo-Pacific. This is a crisp, thoughtful, and calibrated elucidation of the central challenges facing US policymakers, and it forces Washington to ask difficult questions about commitments and obligations outside of these core tasks.  

Clear lines of effort

Does the strategy outline several major lines of effort for achieving its objectives? Will following those lines of effort attain the defined goals? Does the strategy establish a clear set of priorities, or does it present a laundry list of US foreign policy activities?

The NSS is the most prioritization-focused strategy produced by the US government since 1991. The challenge facing implementers of the NSS will come down to interpreting and crafting policy responses for the main lines of effort mentioned. For instance, when extra-hemispheric powers meddle in the Western Hemisphere, what should be the US response? What level of Chinese influence is acceptable, and how should it be addressed? These are the types of questions, below the level of grand strategy, that force policymakers to make difficult decisions in real time.  

Realistic implementation guidelines

Is it feasible to implement this strategy? Are there resources available to sustain it?

The most difficult part of any strategy, and particularly one as different from the recent past as this NSS, is implementation. Not only will there be extraordinary institutional resistance in Washington, and in allied and partner capitals, to this dramatic reorientation of US policy; there will also be the pressure of world events that frequently pull policymakers, even those dedicated to changing course, into unwanted entanglements. To execute this strategy, the Trump administration will require discipline to resist the “noise” of day-to-day news and focus with determination on prioritizing the core US interests named in the NSS.  

Related content

Explore the program

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

The post Scowcroft Strategy Scorecard: Grading Trump’s second National Security Strategy appeared first on Atlantic Council.

]]>
Dispatch from Warsaw: How to respond as Putin ratchets up the pressure https://www.atlanticcouncil.org/blogs/new-atlanticist/dispatch-from-warsaw-how-to-respond-as-putin-ratchets-up-the-pressure/ Wed, 19 Nov 2025 11:00:00 +0000 https://www.atlanticcouncil.org/?p=889091 A suspected act of sabotage on a Polish railway line has highlighted the need for NATO countries to respond to Russian aggression.

The post Dispatch from Warsaw: How to respond as Putin ratchets up the pressure appeared first on Atlantic Council.

]]>
WARSAW—The latest act of sabotage against European infrastructure came on November 16 in the form of explosions on a section of the rail line from Warsaw to Lublin, in eastern Poland on the way to Ukraine. On November 18, Polish Prime Minister Donald Tusk suggested that Russia, long implicated in sabotage actions in Poland, was the culprit. Polish officials and other Poles say that they regard the attack as the latest challenge from Russian President Vladimir Putin to Poland and, through Poland, to Europe and the West. And they wonder how the United States, Europe, NATO, and they themselves will respond.

Colleagues from the Atlantic Council and I spent two intense days in Warsaw this week, meeting with senior officials, former officials, entrepreneurs, executives, and experts from across Poland’s divided and contentious political spectrum. We also met with the newly arrived US Ambassador Tom Rose. This came after four days in Prague and meetings with Czech senior civilian and military officials, and with the new US Ambassador Nicholas Merrick.

News of the rail line sabotage broke the last day of our Warsaw visit. Russian sabotage and aggression against Europe—drone and fighter jet overflights; attacks against Baltic Sea cables; and various incidents in Germany, Czechia, Poland, and other countries—are not new. Everywhere we went, Poles spoke, quietly and earnestly, of the possibility of war returning to their country. Poland, like its neighbors in Central Europe, has enjoyed more than a generation of peace, democracy, and rapidly increasing prosperity. To many of the Poles we spoke with, these times may soon seem like the “before times” of wistful memory.

Russia should not have the luxury of taking action against the West without fear of countermeasures.

The Poles are neither alone nor “Russophobic” or alarmist. Senior German officials, burned and now wiser after their long and futile search for accommodation with Putin’s Russia, now speak in similar terms. The head of Germany’s intelligence service, Bruno Kahl, testified in October to the Bundestag about the possibility of a Russian attack on Europe. German Defense Minister Boris Pistorius has spoken of the possibility of open conflict with Russia as early as 2026.

What then should Europe and the United States do about this trend of actual and suspected Russian aggression? This was the question that formed the basis of many of our discussions in Warsaw and Prague.

First, Europe and the United States need to face the music. Putin is not interested in doing business with the United States or Europe except on his terms, terms that include a demand for tacit recognition of his empire acquired through war. He will not break with China; he will not do a “deal” for peace in Ukraine, except when faced with insurmountable strength. His aggression against Europe is intended to intimidate the West into stunned acquiescence while he seeks to reverse the fall of the Soviet and Russian empires.

The Trump administration has spent a lot of energy pushing for a sustainable settlement of the war in Ukraine. And rightly so. The core of the administration’s outline of a settlement could work: a cease-fire in place and security for Ukraine, with Europe in the lead but with strong US backup. But the US administration still sends mixed messages, seemingly reflecting different schools of thought within it. That won’t do. The Trump team needs to be as steady and internally united in its pushback against Putin’s aggression as it has been against Iran and other adversaries.

Second, Europe needs to get real, and fast, about doing more for its own defense. The Trump administration has often, and rightly, put that in terms of a push for greater European spending on its military. That push has met with success in the form of NATO’s agreement at its 2025 Hague summit to a target of 5 percent of gross domestic product on defense, broken down into 3.5 percent on “hard” military expenditures and 1.5 percent on associated defense spending.

But spending is an input, and the output in military capability is what matters. We spent much of our time meeting with business executives from the Czech and Polish defense sectors, talking about the rapidly changing technological challenge of new weapons such as drones and the need to move fast from a sluggish peacetime procurement cycle to rapid turnaround. That’s no abstract challenge but an immediate necessity.

Fortunately, there is good news coming from Central Europe. High-tech start-ups that move fast, working with Ukrainians to apply battlefield lessons to production, are springing up all over both countries. Some are small. Others are mid-sized and growing fast. Still others, such as one Czech company we met with, are already investing in large-scale military production, including in the United States. A Polish firm is building state-of-the art reconnaissance satellites and launching them on SpaceX rockets.

One big task for these companies is to scale up and work with their US and European counterparts to turn topline defense spending into frontline military capacity. The United States can help. The United States and Europe have been sparring over trade and risk looking at their respective defense industries on what sometimes seem like zero-sum terms. That won’t do, especially in the face of the near-term danger of Russian aggression. To use the vocabulary of the Trump administration, there are a lot of good deals to be done in the defense sector. By helping remove barriers to technology transfer, defense trade, and investment, the United States can do the right thing for common security and make good money along the way.

Third, the United States and Europe can tighten the screws on Russia’s economy. The Trump administration has finally introduced its first new Russia sanctions, on the energy giants Rosneft and Lukoil. Now the administration must enforce them. And if it turns out that Russia is behind the latest attack on Polish rail lines, the United States and Europe should scale up sanctions. A full financial embargo, with limited and defined exceptions, might be a good place to start.

Fourth, the United States and Europe should speed up provision to Ukraine of weapons to target Russian infrastructure. And they can consider asymmetrical measures to counter Russian physical sabotage. These can be covert, but Russia should not have the luxury of taking action against the West without fear of countermeasures.

Even a brief visit to Warsaw, with its history of wartime destruction, communist oppression, and present prosperity and vulnerable peace, can concentrate the mind. Poles, whatever their politics, look to the United States, whatever its politics. And the Poles are pulling their weight on defense, with other Europeans starting to do the same. Putin represents the latest incarnation of the old adversary of the twentieth century—an aggressive tyranny. He’s on the march. But countries of the free world have good options if they will take them.


Daniel Fried is the Weiser family distinguished fellow at the Atlantic Council and a former US ambassador to Poland.

The post Dispatch from Warsaw: How to respond as Putin ratchets up the pressure appeared first on Atlantic Council.

]]>
El futuro de la alimentación en las Américas https://www.atlanticcouncil.org/in-depth-research-reports/report/el-futuro-de-la-alimentacion-en-las-americas/ Tue, 11 Nov 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=885594 Un informe del Centro Scowcroft para la Estrategia y la Seguridad evalúa los mayores desafíos y oportunidades que enfrenta la seguridad alimentaria del hemisferio occidental en un panorama estratégico cambiante.

The post El futuro de la alimentación en las Américas appeared first on Atlantic Council.

]]>

Introducción

La seguridad alimentaria está en el núcleo de la seguridad nacional, regional y global. Cuando las sociedades tienen garantizado el acceso a los alimentos, poseen una probabilidad mucho mayor de mantener la estabilidad social y política; cuando carecen de ella, sucede lo contrario. Afortunadamente, el hemisferio occidental—las Américas—es una región con seguridad alimentaria. Aunque el acceso a los alimentos sigue siendo un desafío constante, la abundancia alimentaria caracteriza en general a las Américas, gracias a una base favorable de recursos naturales, condiciones geopolíticas benignas y una amplia cooperación pública y privada orientada a mejorar los métodos de producción y fomentar la innovación. 

Sin embargo, el futuro podría no parecerse al pasado. Varios factores clave de cambio podrían alterar la trayectoria de la seguridad alimentaria hemisférica, amenazando la estabilidad y productividad de los actuales sistemas agroalimentarios o, por el contrario, ofreciendo esperanza de que estos se vuelvan aún más sólidos y resilientes. Estos factores incluyen el deterioro de ecosistemas sanos y estables, la rápida transformación de la geopolítica, la erosión de las instituciones multilaterales, la creciente inflación y volatilidad de los precios de los alimentos, la promesa de la innovación y las tecnologías emergentes, y los cambios generacionales en la agricultura y la producción agropecuaria. 

Aunque estas fuerzas se cruzan, muchos líderes las perciben como desafíos aislados. Su interacción multiplica el dinamismo del sistema, lo que exigirá que los responsables de políticas públicas, líderes empresariales, inversionistas y agricultores encuentren soluciones innovadoras frente a un panorama agroalimentario que cambia rápidamente y cuyo futuro no es del todo predecible. 

Maíz duro, semillas, frijoles, pimientos y otros productos secos se exhiben en un estante de madera montado en la pared en el pueblo indígena de Zinacantán, México. (Unsplash/Alan De La Cruz)

Alimentación, sociedad y política 

Ningún otro bien tiene un impacto tan profundo en la sociedad y la política como los alimentos, porque las personas necesitan comer todos los días. A menudo, basta con un solo gran aumento en los precios de los alimentos para alterar las dinámicas sociales y políticas dentro de un país o incluso de toda una región. Aunque los precios altos de los alimentos afectan de manera desproporcionada a los países vulnerables, pobres y frágiles, también pueden tener un gran impacto en naciones que, en principio, son ricas y estables

La definición estándar de seguridad alimentaria, adoptada en 1996 por la Organización de las Naciones Unidas para la Alimentación y la Agricultura (FAO) y solo ligeramente revisada desde entonces, establece que: 

La seguridad alimentaria existe cuando todas las personas, en todo momento, tienen acceso físico, social y económico a alimentos suficientes, inocuos y nutritivos que satisfacen sus necesidades dietéticas y preferencias alimentarias para llevar una vida activa y sana. 

Sin embargo, faltan algunos elementos importantes en esta formulación de la seguridad alimentaria. Uno de ellos es la estabilidad ecológica. La seguridad alimentaria depende de la sostenibilidad de los sistemas naturales de la Tierra que son esenciales para la producción de alimentos. Un segundo elemento es la estabilidad del sistema internacional, específicamente la estabilidad de un orden comercial basado en normas que garantice que los alimentos puedan desplazarse fácilmente desde los países con excedentes hacia aquellos con déficits alimentarios. 

Estas condiciones no deben darse por sentadas. Mirando hacia el futuro, es probable que el mundo se vuelva más dinámico y menos estable, con aspectos tanto positivos como negativos. Para prosperar, los sistemas agroalimentarios mundiales deberán volverse más resilientes y adaptables. 

Estantes completamente abastecidos de arroz y frijoles empacados a la venta en un supermercado en Utiva, Costa Rica. (Unsplash/Bernd Dittrich)

Seguridad alimentaria en las Américas 

El hemisferio occidental desempeña un papel indispensable en la seguridad alimentaria global. 

Lado de la oferta: Producción agrícola en las Américas 

Los cinco países con mayor producción primaria de cultivos (por tonelaje) en el mundo se encuentran todos en las Américas: Brasil, Estados Unidos, Argentina, México y Canadá. El hemisferio también cuenta con los principales exportadores de los cuatro cultivos básicos: soya, maíz, trigo y arroz. Además, las Américas producen una amplia variedad de cultivos especializados, entre ellos café, aguacates, limones, limas, naranjas, arándanos, cranberries, quinua, almendras y muchos más. 

La agricultura continúa siendo un componente esencial de las economías nacionales en las Américas. La participación de la agricultura en el PIB supera el 5% en la mayoría de los países y llega a más del 10% en algunos de ellos. 

Lado de la demanda: Calorías y nutrición 

La definición de seguridad alimentaria de la FAO subraya que, si las personas no pueden acceder a una dieta nutritiva a precios estables y asequibles, no se puede hablar de seguridad alimentaria. 

En las últimas décadas, el hemisferio occidental ha reducido gradualmente su nivel de inseguridad alimentaria. En términos comparativos, ha tenido un buen desempeño. Entre 1990 y 2015, América Latina y el Caribe fue la única región del mundo que logró reducir el hambre a la mitad. Actualmente, el hemisferio presenta mejores resultados que el promedio mundial en cuanto a subalimentación, inseguridad alimentaria severa y prevalencia de emaciación infantil (niños pequeños con bajo peso). 
(Aunque varios países tienen un rendimiento inferior, como Haití, Bolivia, Honduras, Ecuador y Guatemala.) 

En los indicadores relacionados con dietas poco saludables, como el sobrepeso y la obesidad, las Américas muestran un desempeño menos favorable. 

Finalmente, las mujeres en las Américas son ligeramente más propensas que los hombres a sufrir inseguridad alimentaria. 

Un tráiler llena cajas de semillas en un campo de Míchigan. (Unsplash/Loren King)

Factores de cambio en las Américas y más allá

La seguridad alimentaria en las Américas enfrenta varios factores de cambio significativos que se cruzan e interactúan entre sí. 

Cambio ecológico 

Los riesgos ecológicos se encuentran entre las mayores amenazas para la seguridad alimentaria. Los principales riesgos incluyen el cambio climático, la deforestación, la pérdida de biodiversidad y la erosión y degradación del suelo. Quizás la amenaza más grave para la producción agrícola sea la combinación de sequía y calor extremo, condiciones “secas-calientes” que se volverán más frecuentes tanto en el mundo como en las Américas. 

Una posibilidad desalentadora para el futuro es la aparición de fallas simultáneas en múltiples regiones productoras de granos básicos (“fallas en las canastas de pan” del mundo). Las Américas, hogar de varios de los principales productores mundiales de cultivos básicos, enfrentan esta posibilidad. El cambio climático también afectará negativamente a la mayoría de los cultivos especializados, incluidos el café y los plátanos

Los agricultores se verán afectados de manera diferente dependiendo de dónde trabajen dentro del hemisferio, el tamaño y los recursos de sus fincas (financieros y de otro tipo), si son agricultores de subsistencia o están integrados en los mercados nacionales, regionales y globales, y los tipos de cultivos que producen. Los pequeños agricultores en contextos más pobres estarán en mayor riesgo debido al tamaño reducido de sus parcelas y a la falta de acceso a seguros y otros recursos. 

Potencialmente, los cambios ecológicos con impactos a gran escala podrían generar importantes déficits en el suministro mundial de alimentos, provocando pánicos en los mercados, precios altos, acaparamiento y una ruptura del comercio internacional. La inseguridad alimentaria se dispararía. 

Turbulencia geopolítica y geoeconómica 

Un segundo conjunto de riesgos proviene de la incertidumbre geopolítica y geoeconómica creciente. Un sistema comercial abierto y basado en normas ha sido esencial para mejorar la seguridad alimentaria, al fomentar una mayor integración económica que, a su vez, contribuye a la seguridad alimentaria mediante mayor crecimiento económico, más empleo, aumento de ingresos, reducción de la pobreza y dinamismo económico. 

Sin embargo, el sistema mundial de comercio de alimentos ha sido perturbado por varios acontecimientos geopolíticos importantes, incluyendo guerras (como la de Ucrania), políticas comerciales y sanciones que generan choques imprevistos en los insumos agrícolas, las cadenas de suministro y las exportaciones agroalimentarias, lo que resulta en mayores costos de producción y precios de los alimentos. 

El sistema agroalimentario mundial podría estar regresando a un orden proteccionista previo a los años 1990, cuando los países solían aplicar aranceles elevados solo a unos pocos cultivos políticamente sensibles (como el azúcar o el algodón). Hoy, el proteccionismo emergente es mucho más amplio, afecta a un número mayor de cultivos y lo implementa una lista cada vez más larga de países. 

Los patrones comerciales también están cambiando debido a la geopolítica. El comportamiento de China es un ejemplo significativo. Hace una década, China importaba más productos agrícolas de Estados Unidos que de Brasil; hoy, importa casi el doble de Brasil que de EE. UU. La desvinculación de China del mercado agrícola estadounidense ha ayudado a que Brasil se convierta en el mayor exportador mundial de soya. 

Además, después de que Estados Unidos impusiera aranceles en agosto de 2025 a ciertos productos agrícolas brasileños, Brasil probablemente intensificará su interés en desarrollar mercados de exportación alternativos, incluidos los acuerdos con China. 

Incertidumbre institucional 

Las instituciones multilaterales han contribuido a generar una prosperidad sin precedentes—aunque desigual—al fomentar el comercio global y hemisférico. Sin embargo, hoy estas instituciones están bajo una enorme presión. Las principales potencias comerciales del mundo, junto con muchas naciones más pequeñas, han estado dispuestas a romper normas establecidas y leyes internacionales de comercio, creando una gran incertidumbre en torno a las reglas comerciales. 

Las Américas se benefician más que otras regiones de un sistema global de comercio agrícola abierto. La agricultura siempre ha sido un tema controvertido en las negociaciones comerciales, desde los orígenes del Acuerdo General sobre Aranceles Aduaneros y Comercio (GATT) en la década de 1940. A pesar de ello, las instituciones multilaterales funcionales son de gran valor porque crean un mercado global estable y basado en normas, lo cual posibilita el comercio de alimentos a gran escala. 

Inflación y variabilidad de precios 

La inseguridad alimentaria se agrava con una inflación rápida de precios y una alta variabilidad de precios. Desde los años 2000, los sucesivos choques han generado nuevos niveles base de precios más altos. Los alimentos son menos asequibles, y los hogares enfrentan más dificultades para mantener una dieta saludable. 

La inflación y la volatilidad de los precios de los alimentos son tan problemáticas en las Américas como en otras partes del mundo, y se han convertido en un tema clave social y político. En América Latina, el aumento de los precios de los alimentos ha sido un principal impulsor de la inflación regional, mientras que en América del Norte, el alza de precios ha sido una de las principales causas de la crisis del costo de vida que afecta a muchos hogares. 

Un supermercado colombiano exhibe una variedad de verduras a la venta. (Unsplash/nrd)

Inversión: Innovación, tecnología e infraestructura 

Las innovaciones y aumentos de productividad dentro y fuera del ámbito agrícola —derivadas de los avances tecnológicos, las mejoras en los procesos y las inversiones en infraestructura— han sido fundamentales para aumentar la oferta de alimentos y satisfacer la creciente demanda mundial. 

Desde la década de 1990, las ganancias globales en eficiencia han superado ampliamente otros factores, como el uso de más insumos por hectárea, la expansión del riego en tierras de cultivo o la apertura de nuevas áreas agrícolas (por ejemplo, la conversión de tierras forestales en agrícolas). 

Sin embargo, el crecimiento mundial de la Productividad Total de los Factores (PTF) —una medida de eficiencia que evalúa los insumos agrícolas en relación con los resultados— se está desacelerando. Después de aumentar de forma constante durante décadas, la PTF ha comenzado a caer, especialmente en las Américas

Las inversiones en infraestructura en gran parte del hemisferio también siguen siendo insuficientes, con trillones de dólares necesarios para mejorar las redes de transporte, energía y logística. 

Por ejemplo, en Canadá, el déficit de infraestructura, estimado en casi 200 mil millones de dólares, es particularmente relevante para las exportaciones agrícolas de ese país, que incluyen tanto productos alimenticios (como granos) como insumos agrícolas clave (como fertilizantes) producidos en su vasto interior. Reducir los costos y aumentar la eficiencia del transporte de estos bienes hacia los mercados internacionales exigirá modernizar la infraestructura de transporte

Cambios demográficos 

El empleo agrícola como proporción del PIB mundial lleva décadas en descenso. El hemisferio occidental ha seguido esta tendencia, lo que demuestra que la agricultura se está volviendo más intensiva en capital y más productiva. 
Hoy se produce más alimento por persona empleada en el sector. 

Sin embargo, existe un efecto generacional negativo asociado a esta tendencia. En todo el mundo, los agricultores están envejeciendo, en parte porque las oportunidades laborales en las fincas están disminuyendo. 
Esta tendencia es más pronunciada en las regiones más ricas, donde la proporción de empleo agrícola es menor, como en la Unión Europea y los Estados Unidos

Un dron sobrevuela un campo. (Unsplash/Job Vermeulen)

Hacia un futuro con seguridad alimentaria 

El mundo necesita una nueva y audaz forma de pensar sobre la seguridad alimentaria, una que incorpore una comprensión integral de cómo fuerzas divergentes están creando un panorama agroalimentario dinámico e inestable, que moldeará el futuro de maneras impredecibles. 

Ecología 

Un desafío central será garantizar que la producción de alimentos siga siendo rentable y resiliente frente a los cambios ecológicos disruptivos. 
Las sinergias entre los servicios ecosistémicos saludables, una producción agrícola robusta y la rentabilidad pueden encontrarse mediante la aplicación adecuada de imaginación, creatividad, formulación de políticas, inversión y acción práctica, utilizando el conocimiento y la participación de los agricultores y sus comunidades. 

La agricultura es un importante impulsor del cambio ecológico, incluido el uso del suelo y las emisiones de carbono. Sin embargo, al mismo tiempo, la agricultura posee un enorme potencial —bajo las condiciones nacionales e internacionales adecuadas— para ofrecer soluciones sólidas y duraderas. 

Los enfoques sinérgicos incluyen una amplia gama de técnicas y prácticas agrícolas alternativas, así como tecnologías novedosas, entre ellas: 

  • La agricultura regenerativa 
  • La siembra directa (no-till farming)
  • La agroforestería 
  • La agricultura climáticamente inteligente 
  • El Manejo 4R de Nutrientes (Right sources, Right rates, Right times, Right places: fuentes, dosis, momentos y lugares correctos para aplicar nutrientes). 

Aunque muchos de estos enfoques se consideraban antes experimentales o no comprobados, hoy eso es mucho menos cierto. Por ejemplo, la agricultura regenerativa cuenta con un número creciente de adeptos —incluidos agricultores— que creen que puede generar beneficios ambientales tangibles sin sacrificar los rendimientos en las fincas. Existe una enorme cantidad de tierras y suelos degradados que podrían revitalizarse mediante estas prácticas.

 
En las Américas, la degradación representa un problema serio, pero también una gran oportunidad. Brasil, por ejemplo, posee vastas extensiones de pastizales degradados que podrían volver a ser productivas utilizando métodos regenerativos, lo que ayudaría a reducir la presión sobre la conversión de bosques en las regiones del Cerrado y la Amazonía. 

Comercio, geopolítica e instituciones 

El aumento del proteccionismo y la competencia geopolítica socavan la cooperación entre Estados y erosionan la confianza internacional. El comercio mundial de alimentos depende de la fortaleza de las instituciones multilaterales y de los acuerdos internacionales, que suelen ser contribuyentes subestimados a la seguridad alimentaria global. Hoy, estas instituciones están siendo erosionadas, y el riesgo es la posible caída de todo el sistema multilateral de comercio. 

Una mayor cantidad de diálogo entre los Estados es un antídoto necesario. 
Un objetivo podría ser la creación de nuevas instituciones regionales, empezando, por ejemplo, con los principales productores agrícolas del hemisferio —un posible grupo “A5” compuesto por Estados Unidos, Brasil, México, Canadá y Argentina— para reunir a los ministros de agricultura en torno al diálogo comercial. 

Los resultados de dicho esfuerzo podrían incluir: 

  • Pactos regionales de seguridad alimentaria 
  • Compromisos de inversión en investigación agrícola
  • Acuerdos para evitar políticas comerciales que distorsionen los mercados 

Una idea relacionada es la creación de un Consejo Hemisférico Permanente de Seguridad Alimentaria, que reúna a los gobiernos para coordinar respuestas a crisis y choques, identificar vías para una mayor cooperación científica y tecnológica, y reforzar la norma que reconoce la responsabilidad del hemisferio como principal proveedor de alimentos para el resto del mundo. Instituciones hemisféricas existentes, como la Organización de los Estados Americanos (OEA) y el Banco Interamericano de Desarrollo (BID), podrían desempeñar un papel clave en la convocatoria y apoyo de este consejo. 

Tres locomotoras transportan mercancías sobre el paso de Ascotán hacia la frontera con Bolivia. (Wikimedia/Kabelleger)

Inversión en innovación, tecnología e infraestructura

La mejora constante de las actividades dentro y fuera de las fincas —incluyendo el uso innovador de nuevas tecnologías y procesos, así como la inversión de capital en los factores que las posibilitan (como la infraestructura)— es fundamental para garantizar que el hemisferio y el mundo sean seguros en materia alimentaria. 

La agricultura regenerativa y otros sistemas agroalimentarios sostenibles pueden potenciarse mediante la aplicación de tecnologías avanzadas. Algunos ejemplos incluyen

  • Fuentes de energía alternativas que mejoran las operaciones dentro y fuera de la finca, reduciendo al mismo tiempo la huella de carbono. 
  • Herramientas de teledetección geoespacial aplicadas a la agricultura de precisión, que permiten identificar y proteger los activos ecológicos. 
  • Robótica y tecnologías digitales móviles (incluyendo una mayor integración de dispositivos portátiles en las prácticas agrícolas) que pueden mejorar la eficiencia y reducir el impacto ambiental. 
  • Analítica impulsada por inteligencia artificial (IA), que puede integrar y utilizar flujos de datos provenientes de múltiples aplicaciones. 
  • Biotecnologías que mejoran la productividad agrícola y la eficiencia en el uso de nutrientes, al tiempo que protegen activos ecológicos como el suelo y el agua. 

Los agricultores son tanto usuarios como creadores de tecnologías y procesos innovadores, y deben tener la capacidad de adoptar y aprovechar estos avances. Sin embargo, la adopción en el campo no es lo mismo que la invención en laboratorio. 

Las encuestas globales de agricultores muestran que muchos son reacios a adoptar nuevas tecnologías o procesos cuando enfrentan altos costos iniciales de inversión y rendimientos inciertos. 

Por ello, los programas públicos de extensión agrícola, que conectan a investigadores y agricultores para fomentar el aprendizaje mutuo y la transferencia tecnológica, son críticos. Fortalecer los servicios de extensión debe ser una prioridad central para lograr una adopción amplia de innovaciones agrícolas. 

Asimismo, mejorar la infraestructura para fortalecer las cadenas de suministro agroalimentarias es esencial. Se necesitan estrategias que aborden este desafío desde la perspectiva de la resiliencia social e incluso transfronteriza (internacional). 

Una cosechadora recolecta maíz en un campo en el sur de Míchigan. (Unsplash/Loren King)

Los agricultores del futuro 

Para evitar el declive demográfico del sector agrícola, es fundamental que la agricultura se vuelva financieramente, socialmente y culturalmente atractiva para las nuevas generaciones. 

Para muchos jóvenes —especialmente aquellos sin una herencia familiar agrícola—, dedicarse al campo puede parecer anticuado, poco rentable, difícil, ajeno o poco atractivo… o todo lo anterior. 

No existe un conjunto único de soluciones reconocidas para revertir esta tendencia demográfica. Sin embargo, la evidencia global sugiere que una combinación de intervenciones podría ser suficiente

  • Facilitar el acceso a la agricultura, reduciendo las barreras de entrada, como el acceso limitado al financiamiento asequible y a la tierra cultivable. 
  • Cerrar las brechas de conocimiento y habilidades mediante programas de capacitación en campo, becas y programas de aprendizaje. 
  • Incentivar la participación de candidatos no tradicionales, como mujeres jóvenes, en la agricultura. 
  • Resaltar el papel creciente de la tecnología digital, la robótica, los macrodatos (Big Data), la teledetección, la inteligencia artificial y otras aplicaciones técnicas que resultan atractivas para los jóvenes ambiciosos y con afinidad tecnológica. 

En resumen, el futuro de la agricultura dependerá de su capacidad para integrar la innovación con el atractivo social y económico, de modo que las nuevas generaciones vean en el campo una oportunidad de progreso y liderazgo, no una ocupación del pasado. 

Conclusión breve 

Una cuestión central es si los actores clave del hemisferio —gobiernos, agricultores, sector privado, investigadores, fundaciones, grupos de la sociedad civil y el público— estarán dispuestos a invertir en procesos y enfoques transformadores que reduzcan riesgos a la vez que incrementen la prosperidad, la sostenibilidad y la resiliencia. 

Promover la difusión de innovaciones críticas para la seguridad alimentaria será una parte importante de esta ecuación. Es imperativo que los países y las instituciones multilaterales del hemisferio encuentren financiamiento y compartan el conocimiento tecnológico necesario para apoyar programas adaptados a las necesidades de la región. 

Otros actores no gubernamentales, incluyendo inversores, sector privado, investigadores, científicos, analistas y comunidades agrícolas, también deben actuar de manera concertada para visualizar, crear y fortalecer las herramientas necesarias que aseguren un futuro con seguridad alimentaria. 

agradecimientos

Este reporte fue elaborado por el Atlantic Council con el apoyo de The Mosaic Company como parte del proyecto Seguridad alimentaria: alineación estratégica en las Américas

Acerca de los autores

Peter Engelke es experto sénior del Centro Scowcroft para Estrategia y Seguridad del Atlantic Council, y experto sénior del Centro Global de Energía. Su diverso portafolio de trabajo abarca previsión estratégica; geopolítica, diplomacia y relaciones internacionales; cambio climático y sistemas terrestres; seguridad alimentaria, hídrica y energética; tecnologías emergentes y disruptivas y ecosistemas de innovación basados en tecnología; y demografía y urbanización, entre otros temas. Es el creador de la serie de publicaciones extensas más leída del Consejo, Global Foresight. Las afiliaciones previas de Engelke han incluido el Centro de Política de Seguridad de Ginebra, la Fundación Robert Bosch, el Foro Económico Mundial y el Centro Stimson.

Matias Margulis es profesor asociado de la Escuela de Políticas Públicas y Asuntos Globales y miembro de la facultad de Tierras y Sistemas Alimentarios de la Universidad de Columbia Británica. Sus intereses de investigación y docencia se centran en la gobernanza global, el desarrollo, los derechos humanos, el derecho internacional y la política alimentaria. Además de su investigación académica, Margulis tiene una amplia experiencia profesional en el ámbito de la formulación de políticas internacionales y fue representante canadiense ante la Organización Mundial del Comercio, la Organización para la Cooperación y el Desarrollo Económicos y la Organización de las Naciones Unidas para la Alimentación y la Agricultura.

Explora el programa

La Iniciativa GeoStrategy, alojada dentro del Centro Scowcroft para Estrategia y Seguridad, utiliza el desarrollo estratégico y la previsión a largo plazo para servir como el principal referente y convocante de análisis y soluciones relevantes para las políticas públicas, con el fin de comprender un mundo complejo e impredecible. A través de su trabajo, la iniciativa se esfuerza por revitalizar, adaptar y defender un sistema internacional basado en normas para fomentar la paz, la prosperidad y la libertad durante las próximas décadas.

The post El futuro de la alimentación en las Américas appeared first on Atlantic Council.

]]>
O futuro da alimentação nas Américas https://www.atlanticcouncil.org/in-depth-research-reports/report/o-futuro-da-alimentacao-nas-americas/ Tue, 11 Nov 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=885644 Um relatório do Centro Scowcroft para Estratégia e Segurança avalia os principais desafios e oportunidades que a segurança alimentar enfrenta no Hemisfério Ocidental em um cenário estratégico em transformação.

The post O futuro da alimentação nas Américas appeared first on Atlantic Council.

]]>

Introdução

A segurança alimentar está no núcleo da segurança nacional, regional e global. Quando as sociedades possuem segurança alimentar, elas têm muito mais chances de alcançar estabilidade social e política; quando não a possuem, ocorre o contrário. Felizmente, o hemisfério ocidental — as Américas — é uma região com segurança alimentar. Embora o acesso aos alimentos continue sendo um desafio constante, a abundância de alimentos geralmente caracteriza as Américas, graças a uma base favorável de recursos naturais, condições geopolíticas estáveis e ampla cooperação entre os setores público e privado para aprimorar os métodos de produção e promover a inovação.

Entretanto, o futuro pode não se parecer com o passado. Diversos fatores determinantes de mudança podem alterar a trajetória da segurança alimentar no hemisfério, ameaçando a estabilidade e a produtividade dos atuais sistemas agroalimentares ou, alternativamente, oferecendo a esperança de que esses sistemas se tornem ainda mais fortes e resilientes. Esses fatores incluem o declínio de ecossistemas saudáveis e estáveis, as rápidas transformações na geopolítica, a erosão das instituições multilaterais, o aumento da inflação e da volatilidade dos preços dos alimentos, o potencial da inovação e das tecnologias emergentes, bem como as mudanças geracionais na agricultura e na produção agropecuária.

Embora essas forças se interconectem, muitos líderes as veem como desafios isolados. A interação entre elas multiplica o dinamismo do sistema, o que exigirá que formuladores de políticas públicas, líderes empresariais, investidores e produtores rurais encontrem soluções inovadoras diante de um cenário agroalimentar em rápida transformação — e não totalmente previsível.

Milho duro, sementes, feijões, pimentas e outros produtos secos são exibidos em uma prateleira de madeira na comunidade indígena de Zinacantán, México. (Unsplash/Alan De La Cruz)

Alimentação, sociedade e política           

Nenhum outro bem exerce impacto tão significativo sobre a sociedade e a política quanto os alimentos, pois as pessoas precisam se alimentar todos os dias. Muitas vezes, basta um único grande choque nos preços dos alimentos para alterar as dinâmicas sociais e políticas dentro de um país ou até mesmo em toda uma região. Embora preços elevados de alimentos tenham um impacto desproporcionalmente negativo sobre países vulneráveis, pobres e frágeis, eles também podem afetar de maneira significativa países que, de outra forma, seriam ricos e estáveis.

A definição padrão de segurança alimentar, adotada em 1996 pela Organização das Nações Unidas para a Alimentação e a Agricultura (FAO/Food and Agriculture Organization) e apenas ligeiramente revisada desde então, é:

A segurança alimentar existe quando todas as pessoas, em todos os momentos, têm acesso físico, social e econômico a alimentos seguros, nutritivos e em quantidade suficiente para atender às suas necessidades dietéticas e preferências alimentares, permitindo uma vida ativa e saudável.  

Algumas peças importantes do quebra-cabeça da segurança alimentar estão ausentes nesta formulação. Uma delas é a estabilidade ecológica. A segurança alimentar depende da sustentabilidade dos sistemas terrestres subjacentes, essenciais à produção de alimentos. A segunda é a estabilidade do sistema internacional, especificamente a estabilidade de uma ordem comercial baseada em regras, que garante que os alimentos possam se mover com facilidade de países com excedentes para países com déficits alimentares.

Essas condições não devem ser tratadas como garantidas. Olhando para o futuro, é provável que o mundo se torne mais dinâmico — e não o contrário — com ganhos e perdas. Para prosperar, os sistemas agroalimentares globais precisarão se tornar mais resilientes e adaptáveis.

Prateleiras repletas de arroz e feijão embalados à venda em um supermercado em Utiva, Costa Rica. (Unsplash/Bernd Dittrich)

Segurança alimentar nas américas

O hemisfério ocidental desempenha um papel indispensável na segurança alimentar global.

Lado da oferta: Produção agrícola nas Américas

Os cinco maiores países produtores de culturas agrícolas primárias do mundo (em volume) estão todos nas Américas: Brasil, Estados Unidos, Argentina, México e Canadá. O hemisfério também abriga os principais exportadores das quatro principais culturas globais: soja, milho, trigo e arroz. Além disso, as Américas produzem uma ampla variedade de culturas especiais, incluindo café, abacate, limões, limas, laranjas, mirtilos, cerejas, quinoa, amêndoas e outras.

A agricultura continua sendo uma peça fundamental das economias nacionais nas Américas. Em grande parte dos países, sua participação no PIB é superior a 5%, e em alguns casos ultrapassa 10%.

Lado da demanda: Calorias e nutrição

A definição de segurança alimentar da FAO enfatiza que, se as pessoas não tiverem acesso a uma dieta nutritiva a preços acessíveis e estáveis, elas não estarão em situação de segurança alimentar.

Nas últimas décadas, o hemisfério ocidental reduziu gradualmente seu nível de insegurança alimentar. Comparativamente, teve um bom desempenho. Entre 1990 e 2015, a América Latina e o Caribe foram as únicas regiões do mundo a reduzir a fome pela metade. Atualmente, o hemisfério apresenta desempenho superior à média mundial em indicadores de desnutrição, insegurança alimentar grave e prevalência de emagrecimento em crianças pequenas, (embora vários países apresentem desempenho inferior, incluindo Haiti, Bolívia, Honduras, Equador e Guatemala). Em métricas relacionadas a dietas inadequadas, como sobrepeso e obesidade, as Américas tiveram desempenho menos favorável.

Por fim, as mulheres nas Américas têm uma probabilidade ligeiramente maior do que os homens de enfrentar insegurança alimentar.

Um caminhão carrega caixas de sementes em um campo em Michigan. (Unsplash/Loren King)

Fatores de transformação nas américas, e além

A segurança alimentar nas Américas enfrenta diversos fatores significativos e interconectados de transformação.

Transformações ecológicas

Os riscos ecológicos estão entre as maiores ameaças à segurança alimentar. Os principais riscos incluem mudanças climáticas, desmatamento, perda de biodiversidade e erosão e degradação do solo. Talvez o mais preocupante para a produção agrícola seja a combinação de seca e calor — as chamadas condições “quentes e secas” — que ameaçam se tornar mais frequentes em todo o mundo e nas Américas. Um cenário desanimador para o futuro é a ocorrência de múltiplas falhas nas “breadbaskets (quebras simultâneas de safra em regiões produtoras de grãos-chave). As Américas, que abrigam vários dos principais produtores mundiais de culturas alimentares básicas, enfrentam essa possibilidade. As mudanças climáticas também terão impacto negativo sobre a maioria das culturas especiais, incluindo café e bananas.

Os agricultores serão impactados de maneiras diferentes, dependendo de onde se localizam no hemisfério, do tamanho e dos recursos de suas propriedades (financeiros e de outra natureza), de serem agricultores de subsistência ou estarem integrados aos mercados nacionais, regionais e globais, e dos tipos de culturas que cultivam. Os pequenos produtores em contextos menos favorecidos estarão sob maior risco, devido ao tamanho reduzido de suas propriedades e à falta de acesso a seguros e a outros recursos.

Potencialmente, transformações ecológicas com impactos em larga escala podem gerar déficits significativos na oferta global de alimentos, provocando pânico nos mercados, elevação de preços, acúmulo de estoques e colapso do comércio. A insegurança alimentar aumentaria drasticamente

Turbulência geopolítica e geoeconômica

Um segundo conjunto de riscos decorre da crescente incerteza geopolítica e geoeconômica. Um sistema comercial aberto e baseado em regras tem sido essencial para o avanço da segurança alimentar, promovendo maior integração econômica — o que beneficia a segurança alimentar por meio de crescimento econômico mais elevado, maior geração de empregos, aumento de renda, redução da pobreza e dinamismo econômico.

Ainda assim, o sistema global de comércio de alimentos tem sido impactado por diversos eventos geopolíticos significativos, incluindo guerras (como a guerra na Ucrânia), políticas comerciais e sanções que geram choques inesperados sobre insumos agrícolas, cadeias de suprimentos e exportações agroalimentares — resultando em aumento dos custos de produção e dos preços dos alimentos.

O sistema de comércio agroalimentar pode estar retornando a uma ordem protecionista anterior aos anos 1990, quando os países costumavam aplicar tarifas elevadas apenas sobre algumas culturas politicamente sensíveis (como açúcar ou algodão). O protecionismo atual, no entanto, é significativamente mais amplo, afetando um número maior de culturas e sendo implementado por uma lista cada vez mais extensa de países.

Os padrões de comércio estão se transformando em função da geopolítica. O comportamento da China é um exemplo significativo. Há uma década, a China importava mais produtos agrícolas dos Estados Unidos do que do Brasil; atualmente, importa quase o dobro do Brasil em relação aos EUA. Esse processo de desacoplamento da China em relação ao mercado agrícola norte-americano contribuiu para que o Brasil se tornasse o maior exportador mundial de soja. Além disso, após a imposição de tarifas pelos Estados Unidos, em agosto de 2025, sobre determinados produtos agrícolas brasileiros, é provável que o Brasil intensifique seu interesse em desenvolver mercados de exportação alternativos para produtos agrícolas, incluindo a China.

Incerteza institucional

As instituições multilaterais têm contribuído para proporcionar uma prosperidade sem precedentes — embora desigual — ao impulsionar o comércio global e hemisférico. No entanto, essas instituições estão agora sob enorme pressão. As maiores potências comerciais do mundo, assim como muitos países menores, têm demonstrado disposição para romper normas estabelecidas e leis internacionais de comércio, gerando incertezas em torno das regras que regem o sistema comercial.

As Américas se beneficiam mais do que outras regiões de um sistema global de comércio aberto de produtos agrícolas. A agricultura sempre foi um tema controverso nas negociações comerciais, desde a origem, na década de 1940, do Acordo Geral sobre Tarifas e Comércio (GATT/General Agreement on Tariffs and Trade). Apesar disso, instituições multilaterais funcionais são valiosas, pois criam um mercado global estável e baseado em regras, que, por sua vez, possibilita o comércio de alimentos em larga escala.

Inflação e volatilidade dos preços

A insegurança alimentar se agrava com a rápida inflação de preços e a elevada volatilidade dos preços. Desde os anos 2000, choques geraram novos patamares mais altos de preços. Os alimentos se tornaram menos acessíveis, e as famílias enfrentam maior dificuldade para consumir uma dieta saudável.

A inflação e a volatilidade dos preços dos alimentos são tão problemáticas nas Américas quanto em outras regiões do mundo, tornando-se uma questão social e política fundamental. Na América Latina, o aumento dos preços dos alimentos tem sido um dos principais impulsionadores da inflação em toda a região, enquanto na América do Norte, o aumento dos preços dos alimentos é uma das principais causas da crise do custo de vida enfrentada por muitas famílias.

Um supermercado colombiano exibe uma variedade de vegetais à venda. (Unsplash/nrd)

Investimento: Inovação, tecnologia e infraestrutura

A inovação dentro e fora das propriedades rurais, aliada ao aumento da produtividade, decorrentes de avanços processuais e tecnológicos, além de melhorias na infraestrutura, têm sido fundamentais para aumentar a oferta de alimentos e atender à crescente demanda. Desde a década de 1990, os ganhos globais de eficiência superaram amplamente os demais fatores, incluindo o uso de mais insumos por hectare de terra, a extensão da irrigação em áreas cultivadas e a expansão de novas terras agrícolas (por exemplo, a expansão da agricultura em áreas anteriormente florestadas).

Infelizmente, o crescimento global da Produtividade Total dos Fatores (PTF — métrica de eficiência que relaciona os insumos agrícolas aos resultados obtidos) está desacelerando. Após décadas de crescimento contínuo, a PTF passou a registrar queda, especialmente nas Américas.

Os investimentos em infraestrutura em grande parte das Américas também permanecem subdesenvolvidos, sendo necessários trilhões de dólares para impulsionar a infraestrutura do hemisfério. No caso do Canadá, por exemplo, o déficit de infraestrutura — estimado em cerca de US$ 200 bilhões — é particularmente relevante para as exportações agrícolas do país, que têm importância global. Essas exportações incluem produtos alimentares como grãos e insumos agrícolas essenciais, como fertilizantes produzidos no vasto interior canadense. Para viabilizar o transporte desses produtos volumosos aos mercados externos de forma mais barata e eficiente, será necessário modernizar a infraestrutura logística do país.

Mudanças demográficas

A participação do emprego agrícola no PIB global vem diminuindo há décadas. O hemisfério ocidental tem seguido essa tendência, evidenciando que a agricultura está se tornando mais intensiva em capital e mais produtiva. Cada vez mais alimentos são produzidos por pessoa contratada no setor.

No entanto, há um efeito geracional negativo associado a essa tendência demográfica. Os agricultores em todo o mundo estão envelhecendo, em parte devido à redução das oportunidades de emprego no campo. Essa dinâmica é mais acentuada nas regiões mais ricas, que apresentam a menor participação relativa de empregos no setor agrícola, como a União Europeia e os Estados Unidos.

Um drone paira sobre um campo. (Unsplash/Job Vermeulen)

Construindo a segurança alimentar do futuro

O mundo precisa de uma nova e ousada forma de pensar sobre a segurança alimentar — uma abordagem que incorpore uma compreensão abrangente de como forças divergentes estão criando um cenário agroalimentar dinâmico e instável, que moldará o futuro de maneiras imprevisíveis.

Ecologia

Um dos principais desafios será garantir que a produção de alimentos continue sendo lucrativa e resiliente diante das mudanças ecológicas disruptivas. É possível encontrar sinergias entre serviços ecossistêmicos saudáveis, uma produção agrícola robusta e lucratividade, por meio da aplicação adequada de imaginação, criatividade, formulação de políticas públicas, investimentos e ações práticas, baseadas na contribuição e no conhecimento de agricultores e comunidades rurais.

A agricultura é um dos principais vetores das mudanças ecológicas, incluindo as relacionadas aos padrões de uso da terra e emissões de carbono. No entanto, ao mesmo tempo, a agricultura também possui um enorme potencial — sob as condições domésticas e internacionais adequadas — para oferecer soluções sólidas e duradouras.

Abordagens sinérgicas incluem uma variedade de técnicas e práticas agrícolas alternativas, bem como tecnologias emergentes, como agricultura regenerativa, cultivo sem revolvimento do solo (no-till farming), sistemas agroflorestais, agricultura inteligente para o clima (climate-smart agriculture) e o Manejo 4R de Nutrientes (4R Nutrient Stewardship) — um conjunto de práticas de gestão de nutrientes que prioriza o uso das fontes corretas, nas doses certas, nos momentos adequados e nos locais apropriados.

Embora muitas dessas abordagens tenham sido consideradas, no passado, experimentais, inovadoras e não comprovadas, hoje essa percepção mudou significativamente. A agricultura regenerativa, por exemplo, conta hoje com um número crescente de adeptos — incluindo produtores rurais — que acreditam em seu potencial para gerar benefícios ambientais concretos sem comprometer a produtividade das lavouras. Há uma quantidade expressiva de terras, incluindo solos, que poderiam ser revitalizadas por meio dessas práticas. Nas Américas, a degradação representa um problema grave, mas também uma grande oportunidade. O Brasil, por si só, possui extensas áreas de pastagens degradadas que poderiam ser reincorporadas à produção agrícola por meio de métodos regenerativos, contribuindo para reduzir a pressão por conversão de florestas nas regiões do Cerrado e da Amazônia. 

Comércio, geopolítica e instituições

O aumento do protecionismo e da competição geopolítica enfraquece a cooperação entre os Estados, desgastando a confiança internacional. O comércio global de alimentos depende da força das instituições multilaterais e dos acordos internacionais — instituições que, muitas vezes, não recebem o devido reconhecimento por sua contribuição à segurança alimentar mundial. Atualmente, essas instituições vêm sendo enfraquecidas, e o risco é o colapso de todo o sistema multilateral de comércio.

Mais diálogo entre os Estados é um antídoto para esse cenário. Um dos objetivos deve ser a construção de instituições alternativas — por exemplo, começando com os maiores produtores agrícolas do hemisfério, um grupo “A5” formado por Estados Unidos, Brasil, México, Canadá e Argentina — para reunir ministros da agricultura em torno de um diálogo sobre comércio. Os resultados potenciais incluem convenções regionais de segurança alimentar, compromissos de investimento em pesquisa agrícola e acordos para evitar as políticas que mais distorcem o comércio.

Uma ideia relacionada é a criação de um conselho hemisférico permanente de segurança alimentar, destinado a reunir governos para discutir respostas a choques, identificar caminhos para uma cooperação científica e tecnológica mais ampla e reforçar a norma que reconhece a responsabilidade do hemisfério perante o restante do mundo como um dos principais fornecedores de alimentos. Instituições hemisféricas, como a Organização dos Estados Americanos (OEA) e o Banco Interamericano de Desenvolvimento (BID), podem ser mobilizadas para convocar esse conselho.

Três locomotivas transportam mercadorias pela Passagem de Ascotán até a fronteira com a Bolívia. (Wikimedia/Kabelleger)

Investimento em inovação, tecnologia e infraestrutura

A melhoria contínua das atividades dentro e fora das propriedades rurais — incluindo o uso inovador de novas tecnologias e processos, além do investimento de capital nos elementos que os viabilizam (como a infraestrutura) — é fundamental para garantir a segurança alimentar no hemisfério e no mundo.

A agricultura regenerativa e outros sistemas agroalimentares voltados à sustentabilidade podem ser aprimorados por meio da aplicação de tecnologias avançadas. Exemplos incluem:

  • Fontes alternativas de energia podem aprimorar os sistemas dentro e fora das propriedades rurais, ao mesmo tempo em que reduzem as marcas das emissões de carbono.
  • Ferramentas de sensoriamento remoto geoespacial aplicadas à agricultura de precisão podem identificar e contribuir para a preservação dos recursos ecológicos.
  • Tecnologias robóticas e digitais móveis (incluindo a integração mais ampla de dispositivos portáteis às práticas agrícolas) podem aumentar a eficiência da produção agrícola, ao mesmo tempo em que reduzem o impacto ambiental.
  • As análises orientadas por inteligência artificial podem integrar e utilizar fluxos de dados provenientes de diversas aplicações.
  • As biotecnologias podem melhorar a produtividade no campo e a eficiência no uso de nutrientes, ao mesmo tempo em que protegem recursos ecológicos, como o solo e a água.

Os agricultores são tanto utilizadores quanto criadores de tecnologias e processos inovadores, e precisam ter condições de adotar e aplicar essas inovações. A adoção no campo não é o mesmo que a invenção em laboratório. Pesquisas globais indicam que os produtores rurais tendem a hesitar em adotar novas tecnologias e práticas quando os custos iniciais de investimento são elevados e os retornos financeiros são incertos.

Programas de extensão agrícola financiados com recursos públicos — que conectam pesquisadores a produtores, promovendo aprendizado mútuo e transferência de tecnologia — são fundamentais. O fortalecimento dos serviços de extensão deve estar no centro das estratégias para ampliar a adoção de inovações pelos agricultores.

Aprimorar a infraestrutura para fortalecer as cadeias de suprimento do sistema agroalimentar também é fundamental. Há uma necessidade premente de desenvolver estratégias que enquadrem esse desafio em termos de resiliência social e até mesmo transfronteiriça (internacional).

Uma colheitadeira colhe milho em um campo no sul de Michigan. (Unsplash/Loren King)

Agricultores para o futuro

Para evitar o declínio demográfico da agricultura, é fundamental tornar a atividade agrícola financeiramente, social e culturalmente atrativa para as novas gerações. Para os jovens — especialmente aqueles sem vínculo familiar com o setor —, a agricultura pode ser percebida como uma atividade ultrapassada, pouco lucrativa, difícil, distante da realidade ou “sem apelo” — ou todas essas coisas ao mesmo tempo.

Não existe um único conjunto de soluções reconhecidas para reverter as tendências demográficas no setor agrícola. No entanto, evidências de diversas partes do mundo indicam que uma combinação de intervenções pode ser eficaz: facilitar o acesso à atividade agrícola, por meio da redução de barreiras de entrada (como o acesso a financiamento acessível e a terras cultiváveis); reduzir lacunas de conhecimento e habilidades por meio de programas de capacitação prática nas propriedades rurais, bolsas de estudo e estágios supervisionados; incentivar a entrada de perfis não tradicionais na agricultura — como jovens mulheres — e destacar o papel cada vez mais relevante desempenhado pelas tecnologias digitais, pela robótica, pelo Big Data, pelo sensoriamento remoto, pela inteligência artificial e por outras aplicações técnicas que despertam o interesse de jovens ambiciosos e familiarizados com tecnologia.

Breve conclusão

Uma questão crucial é saber se os principais atores do hemisfério — governos, produtores rurais, setor privado, pesquisadores, fundações, organizações da sociedade civil e o público em geral — estarão dispostos a investir em processos e abordagens transformadoras capazes de reduzir riscos e, ao mesmo tempo, aumentar a prosperidade, a sustentabilidade e a resiliência.

Promover a difusão de inovações essenciais para a segurança alimentar será um elemento crucial dessa equação. É indispensável que os países e as instituições multilaterais do hemisfério encontrem fontes de financiamento e reúnam o conhecimento tecnológico necessário para apoiar programas adaptados às necessidades específicas da região.

Outras partes interessadas, não governamentais — incluindo investidores, o setor privado, pesquisadores, cientistas, analistas, além de agricultores e comunidades agrícolas — também deve agir em conjunto para conceber, criar e fortalecer as ferramentas que serão necessárias à garantia de um futuro com segurança alimentar.

agradecimentos

Este relatório foi produzido pelo Atlantic Council com o apoio da The Mosaic Company como parte do projeto Segurança alimentar: Alinhamento estratégico nas Américas.

Sobre os autores

Peter Engelke é pesquisador sênior do Scowcroft Center for Strategy and Security do Atlantic Council, bem como pesquisador sênior do seu Global Energy Center. Seu portfólio diversificado abrange prospecção estratégica; geopolítica, diplomacia e relações internacionais; mudanças climáticas e sistemas terrestres; segurança alimentar, hídrica e energética; tecnologias emergentes e disruptivas e ecossistemas de inovação baseados em tecnologia; e demografia e urbanização, entre outros temas, sendo o criador da série de publicações de formato longo mais lida do Atlantic Council, Global Foresight. As afiliações anteriores de Engelke incluem o Geneva Centre for Security Policy, a Robert Bosch Foundation, o World Economic Forum e o Stimson Center.

Matias Margulis é professor associado da School of Public Policy and Global Affairs e membro do corpo docente de Sistemas Agrícolas e Alimentares da University of British Columbia. Seus interesses de pesquisa e ensino abrangem governança global, desenvolvimento, direitos humanos, direito internacional e política alimentar. Além de sua pesquisa acadêmica, Margulis possui vasta experiência profissional na área de formulação de políticas internacionais e foi representante canadense na Organização Mundial do Comércio, na Organização para a Cooperação e Desenvolvimento Econômico e na Organização das Nações Unidas para a Alimentação e a Agricultura.

explore o programa

A GeoStrategy Initiative, sediada no Scowcroft Center for Strategy and Security, utiliza o desenvolvimento de estratégias e a prospecção de longo prazo para servir como principal referência e articuladora de análises e soluções relevantes para políticas públicas, visando a compreensão de um mundo complexo e imprevisível. Por meio de seu trabalho, a iniciativa busca revitalizar, adaptar e defender um sistema internacional baseado em regras, a fim de promover a paz, a prosperidade e a liberdade nas próximas décadas.

The post O futuro da alimentação nas Américas appeared first on Atlantic Council.

]]>
The future of food in the Americas https://www.atlanticcouncil.org/in-depth-research-reports/report/the-future-of-food-in-the-americas/ Tue, 11 Nov 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=883923 Though the Americas have traditionally been a food-secure region, even moderate shocks can have profound consequences for agriculture. But there are concrete steps policymakers can take to protect the Western Hemisphere's breadbaskets from climate disruption, rising protectionism, and other risks. 

The post The future of food in the Americas appeared first on Atlantic Council.

]]>

Bottom lines up front

  • The Americas have traditionally been a food-secure region, but interlocking ecological, technological, and political trends could change that.
  • Ecological risks pose the greatest threat to hemispheric food production, though rising protectionism and the resultant market uncertainty also have a destabilizing effect.
  • There is little margin for error, as even moderate shocks can have profound consequences, and food insecurity raises the risk of political and social instability.

Table of contents

Introduction

Food security is at the core of national, regional, and global security. When societies are food secure, they stand a much greater chance of social and political stability; when they are food insecure, the opposite is true. Fortunately, the Western Hemisphere—the Americas—is a food-secure region. Although access to food is an ongoing challenge deserving greater attention in every country (as there are hungry people across the hemisphere), food abundance generally characterizes the Americas. Historically, the hemisphere has owed its unique position to several factors: a favorable natural resource base; equally benign geopolitical conditions; and extensive public and private cooperation to improve production methods and support innovation.

However, the future is not guaranteed to look like the past. Several key drivers of change are afoot that could alter the trajectory of hemispheric food security. These drivers bring with them uncertain outcomes, alternatively threatening the stability and productivity of current agrifood systems or offering hope that they could become even stronger and more resilient in the years to come.

This report assesses the future of food in the Western Hemisphere. It focuses on the major uncertainties that are driving change in the agrifood systems within the hemisphere and the world. These drivers represent risks or opportunities, and sometimes both. They include the decline of healthy and stable ecosystems, rapidly changing geopolitics, the erosion of multilateral institutions, increasingly inflationary and volatile food prices, the promise of innovation and emerging technologies, and generational shifts in farming and agricultural production.

These forces are not siloed. Rather, they intersect. There might be an awareness that these individual drivers of change represent obstacles to (or opportunities for) achieving durable food-security solutions in the future, yet many leaders see them as isolated challenges rather than as intersecting ones, obscuring the bigger picture.

The drivers discussed in this report therefore are not just accumulating layers of risks and opportunities. Rather, their interaction multiplies the system’s dynamism. This emerging dynamism will require policymakers, business leaders, investors, and farmers to find innovative solutions in the face of a rapidly changing, and not entirely predictable, agrifood landscape. Yet such outlooks may not arise. Complacency is a big risk, if leaders believe that the status quo will continue to improve, requiring changes only at the margins. In such a situation, the hemisphere would become far more vulnerable to unexpected shocks because there would not be enough appreciation for how ecological, technological, geopolitical, and institutional changes are reshaping the future.

This concern is not hyperbolic. A very recent external shock—the COVID-19 pandemic—erased major progress that the hemisphere had made on reducing hunger, which should remind us that the foundations of food security remain shaky. Looking ahead, there is little margin for error, as even moderate shocks can have profound consequences.

Flint corn, seeds, beans, peppers, and other dried goods are displayed on a wooden wall-mounted rack in the indigenous town of Zinacantán, México. (Unsplash/Alan De La Cruz)

Food, society, and politics

Food security is at the core of national, regional, hemispheric, and global security. When societies are food secure, they stand a much greater chance of social and political stability; when they are food insecure, the opposite is true.

This axiom, although a simple one, has been demonstrated time and again throughout history. High food prices occasioned by war, poor harvests, or high taxation of the peasantry (or all three) preceded the onset of the French Revolution in 1789 and the Russian revolutions of 1905 and 1917, to name just a couple of famous examples from history.

Today, despite far greater agricultural production at national and global levels, such disturbances still recur with alarming frequency: The 2007–2008 food riots across Africa followed commodity price spikes for agricultural inputs (oil, principally) that inflated the price of food; the 2010–2011 Arab Spring was preceded by food-price spikes owing to multiple breadbasket harvest failures across several world regions; and Russia’s war in Ukraine, which disrupted wheat, fertilizer, and natural gas exports, blocked the flow of agricultural inputs and outputs and dramatically raised food prices globally. Millions of additional people became food insecure around the world.

No other good has such an impact on society and politics as food because people need to eat every day. “Food riots are as old as civilization itself,” as one food security analyst summarized the impact of food on social and political stability. Often, it will only take a single big food-price shock to change social and political dynamics within a country or even an entire region. Although high food prices have a disproportionately negative impact on vulnerable, poor, and fragile countries, they also can have an outsized impact on otherwise wealthy and stable ones. Japan offers a recent example. In July 2025, soaring rice prices in Japan directly contributed to the defeat of Prime Minister Shigeru Ishiba’s Liberal Democratic Party in parliamentary elections.

The Food and Agriculture Organization (FAO) adopted a definition of food security at the 1996 World Food Summit (see box 1 for the history of the concept), which has persisted with only slight revision:

  • Food security exists when all people, at all times, have physical, social, and economic access to sufficient safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life.

This definition contains four main dimensions, or pillars:

  1. The physical, supply-side availability of food, typically assessed at the national level and consisting of domestic agricultural production plus food imports.
  2. Household access to food, which is dependent on household incomes and food prices (set by a combination of market and nonmarket forces).
  3. Nutritional intake by individuals, which is not the same thing as caloric intake; nutrition depends in part on dietary diversity.
  4. Stability of the first three pillars over time.

A couple important pieces of the food security puzzle are missing from this formulation. One is ecological stability. Food security depends on the sustainability of the underlying Earth systems that are essential to food production. Maintaining the integrity of these Earth systems, including the integrity of the world’s soils, water, biodiversity, nutrients, and atmospheric conditions (precipitation and temperature, primarily), is critical. A second missing piece is the stability of the international systems, specifically stability of a rules-based trading order that ensures that food moves easily from food-surplus to food-deficit countries. Such a trading order improves food security through enhancing agriculture productivity and (under emergency conditions) enables swift distribution of humanitarian aid in the form of food. Such a system helps to avoid trade conflicts and establishes international norms for the notion that food security is in the collective interest and responsibility of all parties.

The capacity of the current international system to encourage global production and trade in food has increased over time, dramatically so over the past several decades: The FAO reported that in 2021, the world traded some 5,000 trillion kilocalories of food, more than double the amount that it did in 2000. A central piece of this equation has been the existence of key multilateral institutions that have had the credibility and authority to provide a forum for states to negotiate trade agreements, resolve trade disputes, and monitor and enforce commitments.

None of these conditions should be treated as a given. Looking ahead, the odds are high that the world will become more dynamic rather than less so, with no guarantee that dynamism will have more upside than downside. To adapt and thrive within changing conditions (with both positive and negative impacts), the world’s agrifood systems will need to become more resilient and adaptable. The good news is that humankind has the tools—or can develop the necessary tools—to ensure such outcomes.

Box 1: Food security: History of a concept
Although concerns surrounding hunger and famine are ancient, dating to human prehistory, the formal concept of food security is only about a half century old. Its institutional origins are often traced to a 1974 World Food Conference that defined the concept in terms of the global supply of food. The thinking at the time linked hunger with global supply (chiefly of staple crops, especially cereals), the idea being that hunger would be solved through adequate supply. Over the following decades, the concept of food security evolved in multiple key respects including: moving away from a sole focus on food supply and toward food distribution and access, especially by households and individuals; an acknowledgment that food security is not just a function of quantitative intake of calories but also of nutrition; the acceptance that importing food is a legitimate national means of achieving food security (as opposed to defining a food-secure country as one that domestically produces the entirety of its needs); an incorporation of social considerations (for example, inequalities in food access owing to ethnicity or gender). The definition adopted at the 1996 World Food Summit has become the default definition of food security: “Food security exists when all people, at all times, have physical, social, and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life.” (The word “social” in this definition postdates the 1996 summit.)

Food security in the Americas

The Western Hemisphere is in a fortunate position regarding agriculture and food. Its natural endowment is significant, consisting of arable soils and plentiful rainfall distributed across numerous regions suitable for agriculture (temperate, subtropical, and tropical). The hemisphere’s highly productive agriculture benefits from relatively stable political and economic environments, medium-to-high income levels, and reasonably well-functioning domestic and international markets, all stimulated by public, private, and academic sector investments in agricultural research and development (R&D).

As a result, the hemisphere’s aggregate production capacity in both staple and specialized crops gives it an indispensable role in providing domestic food security but also meeting the world’s food needs.

There are several caveats to this picture, which this report endeavors to make clear. First, several driving forces are changing baseline conditions that will alter the hemisphere’s future, for better or worse. Second, the Americas might be fortunate in many respects, but it is not a single bloc of countries acting in unison. Trade disputes, unfortunately, are becoming a sharper and more common part of the hemisphere’s diplomatic landscape, for example. Finally, as this report also makes clear, food security is not just about supply-side agricultural production. Food insecurity remains a problem in the Americas as it does everywhere in the world.

Supply side: Agricultural production
in the Americas

The five largest primary crop producing countries (by tonnage) in the world are all in the Americas: Brazil, the United States, Argentina, Mexico, and Canada. As shown in table 1 and figure 1, the hemisphere also contains top exporters of all four primary crops: soybeans, corn, wheat, and rice. The largest producers of food in the Americas are, therefore, critical for ensuring global food security. What happens in the region matters greatly, because developments in the Americas have an outsized effect on global trade in food.

In addition to the largest primary crop producers, the Americas also lead in the production of a wide range of specialty crops, including coffee, avocados, lemons, limes, oranges, blueberries, cranberries, quinoa, almonds, and more. Numerous countries in the hemisphere are leading producers of these crops. For example, Peru is in the top three global producers of avocados, blueberries, and quinoa, while Colombia is a leading global producer of coffee, sugar cane, avocados, and agave fibers.

For many countries in the Americas, agriculture continues to be a critical piece of their national economies. As shown in figure 2, agriculture’s share of gross domestic product (GDP) is above five percent in most countries and is above ten percent in a handful of countries in Central America, the Caribbean, and South America. Over the 2023–2024 period, agriculture’s share of Brazil’s GDP was 6.24 percent while its agricultural exports represented nearly half (49 percent, at $164 billion) of Brazil’s total exports by value. Both figures demonstrate the spectacular growth in Brazil’s intensive farming, especially of soybeans (see also box 2).

Box 2. Case study: Brazil
Brazil might be the single most interesting agrifood production story in the entire hemisphere, and perhaps the most important as well. Brazil today is one of the world’s great breadbaskets, being among the largest producers and exporters of primary crops and many specialized ones as well. Yet Brazil was a net food importer for much of its history, becoming a net exporter only over the past several decades. Starting in the 1960s, an agrifood production revolution occurred in Brazil, based on both extensification (expansion of agricultural land) and, just as critically if not even more so, an intensive modernization program based around research, capital investment, and technological development. Brazil’s modernization program included cutting-edge research conducted by universities and its now world-famous agricultural research agency, Embrapa, into tropical soybean and corn cultivation. These efforts led to new seed varieties and technologies that in turn enabled primary crop production to occur at scale in vast regions of Brazil including the Cerrado. Over roughly the same period, the liberalization of agricultural trade allowed Brazil to grow into a global agricultural exporter. On the demand side of the food security equation, a combination of rising wealth plus innovative social safety programs, including the Bolsa Familia and Fome Zero (zero hunger) programs, helped to reduce hunger among the poor in Brazil. Yet Brazil’s story has not been without its downsides, which in the past have included high deforestation rates in the Cerrado and Amazon regions, and related ecological damage.

Demand side: calories and nutrition

The FAO’s definition of food security, which is broadly accepted among experts, emphasizes that food security is as much about access and affordability, especially by vulnerable populations, as it is about the aggregate production of food. If people cannot access a nutritious diet at affordable and stable prices, they will not be food secure.

In recent decades, the Western Hemisphere has gradually decreased its level of food insecurity. In comparative terms, it has done well. Between 1990 and 2015, for example, Latin America and the Caribbean (LAC) was the only region in the world to reduce hunger by half.

As shown in table 2, the FAO’s latest data indicates that the Western Hemisphere continues to be relatively food secure. Over 2022–2024, the two major subregions in the Americas, North America on the one hand and LAC on the other, performed better than the world average. This is reflected in several key metrics related to the reduction of caloric intake of food, in particular undernourishment (calorie deprivation over time), severe food insecurity (a measurement of households going without food for periods of time), and the prevalence of wasting in small children (an indicator of undernourishment). On metrics related to poor diets such as overweight and obesity (both of which are indicators of too many calories rather than too few), the Americas performed less well.

These outcomes are consistent with levels of wealth. Although an oversimplification, as national wealth increases, per capita consumption of food rises. Most countries in the Americas are classified by the World Bank as either high- or upper middle-income countries. (Note, however, that lower-income populations, including those within both lower- and higher income economies, are at increasing risk of obesity, in part due to easy availability of inexpensive processed foods with low nutritional value.)

There are several countries in the Americas that underperform. According to the FAO, over half (54.2 percent) of Haitians are undernourished, while just 10.7 percent of adults are obese (compared with over 40 percent of US citizens); Haiti is the most fragile state in the Americas. Although undernourishment is much lower across the hemisphere now than in previous decades, it nonetheless remains high in several countries including Bolivia (21.8 percent), Honduras (14.8 percent), Ecuador (12.1 percent), and Guatemala (11.8 percent).

There is a gendered dimension to deprivation, with women being more likely to be food insecure than men. This difference worsened during the COVID-19 pandemic, increasing to a 3.3 percent gap between the genders in Latin America in 2021, before reducing again by 2024. In North America, the gap has worsened every year since 2020, from 0.1 percent in 2020 to 0.5 percent in 2024.

Fully stocked shelves of packaged rice and beans for sale in a grocery store in Utiva, Costa Rica. (Unsplash/Bernd Dittrich)

Drivers of change in the Americas and beyond

Strategic foresight asserts that the future likely will not conform to our expectations. It is risky to assume that the future will consist of a simple linear extrapolation of one or two current trends. Hence, the discipline focuses as much on the intersections of the drivers that together will drive multiple possible futures. Food security in the Americas is no different, as there are several significant intersecting drivers of change that will
shape the hemisphere’s future.

Changing ecology

Ecological risks are among the greatest threats to food security in the Americas. A rapidly changing climate creates the primary set of risks, from rising heat and worsening drought and flooding. Other ecological risks exist as well in specific subregions, for example deforestation, biodiversity loss, and soil erosion and degradation.

Of these changing ecological conditions, perhaps the worst for agricultural production is the combination of drought and heat, or “dry-hot” conditions. Trend data show that such conditions are becoming more frequent and intense. An Organisation for Economic Co-operation and Development (OECD) study of drought patterns, released in July 2025, found that the share of land globally exposed to drought has doubled since 1900.

Dry-hot conditions threaten to become more frequent across the Americas. In North America, for example, scientists estimate that the now decades-long megadrought that has impacted northern Mexico and the southwestern United States might be the worst in 1,200 years. In South America, the frequency of dry, hot, and flammable weather has increased across much of the continent since the early 1970s. Such changes are highly consequential for agriculture. A 2021 study, for instance, showed that increases in Brazil’s dry-hot conditions, combined with the impacts of deforestation on temperature and rainfall, have already pushed 28 percent of the country’s agricultural land beyond its optimum productive range, with further projections of 51 percent by 2030 and 74 percent by 2060.

One of the more discouraging climate-driven outcomes is the possibility, even probability, of future multiple breadbasket failures (i.e., “simultaneous harvest failures across major crop-producing regions” around the world). Climate change likely will make such failures more common in the future. A 2021 study projected that the probability of multiple harvest failures globally was “as much as 4.5 times higher by 2030 and up to 25 times higher by 2050.”21 Another, focusing on the impacts that oscillations such as the El Niño-Southern Oscillation (ENSO) and North Atlantic Oscillation (NAO) might have under future warming, concluded that shifting ENSO and NAO patterns might “expose an additional 5.1–12% of global croplands” to such oscillations, with strong ENSO/NAO negative phases “likely to cause simultaneous yield losses across multiple key food-producing regions.”

The Americas, home to several of the world’s major producers of staple crops including soybeans, corn, and wheat, faces the possibility of multiple breadbasket failures. It is entirely possible that in the years to come, severe dry-hot conditions could strike simultaneously in the United States, Mexico, Brazil, and Argentina. The consequences for agricultural production and global food security would be enormous.

A changing climate also will negatively impact most—perhaps all—of the other crops grown across the Americas. Coffee and banana production, to name just two examples, likely will be severely affected by increased heat and altered precipitation patterns. A recent scientific study conducted by the University of Exeter forecasts that 60 percent of the regions currently producing bananas—including regions in Central America—will be unable to do so before the end of this century, owing principally to increased temperature. The world will not have to wait nearly that long to see such effects because climate-driven impacts are already occurring. In 2024, the FAO reported a 38.8 percent annual increase in global coffee prices “primarily driven by supply-side disruptions, stemming from adverse weather conditions” including drought, heat, and flooding in major coffee-producing countries including Brazil, Vietnam, and Indonesia.

Because farmers are on the receiving end of changing ecological conditions, it is critical to understand how they are impacted by such change and how they process those changes.

Doing so will assist in defining the policy and investment options with the greatest likelihood of mass adoption on farms and in farming communities. Farmers will be impacted differently depending on where in the hemisphere they farm, their farm sizes and resources (financial and otherwise), whether they are subsistence farmers or integrated into national, regional, and global markets, and the types of crops they grow. Taken together, farmers do not experience changing ecological conditions in the same way at the same time. Smallholder farmers in poorer settings, for example, will be at greatest risk from climate-driven impacts given the small size of their landholdings and a lack of access to insurance and other sources of resilience. It follows that farmers’ perceptions of ecological impacts on their farming operations will not follow a straight line. Farmers will parse the impacts of environmental hazards such as drought, heat, or flooding differently.

In sum, ecological change dramatically increases the risk of declining crop yields while shifting the locations where crops can be grown. Potentially, ecological change with impacts at scale could generate significant shortfalls in global food supply, causing market panics, high prices, hoarding, and a breakdown of trade. Food insecurity would spike.

A tractor trailer fills seed boxes in a Michigan field. (Unsplash/Loren King)

Geopolitical and geoeconomic turbulence

A second set of risks stems from rising geopolitical and geoeconomic competition and uncertainty. An open, rules-based trading system has been essential to improving hemispheric and global food security. Trade in that system has precipitated more economic integration of the region—more bilateral trade and investment agreements, greater investment flows, and exchange of technical know-how—which benefits food security via higher economic growth, greater employment opportunities and rising incomes, poverty reduction, and general economic dynamism. It also has allowed governments to see that a set of policies, including more focus on innovation and competitiveness and less on trade distortions and protectionism, is the best path forward.

Yet this trajectory is now subject to geopolitical risk. Over the past two decades, the global food trading system has been disrupted by several significant events including wars and related phenomena (e.g., civil strife, terrorism). Such events generate (largely) unanticipated shocks to agricultural inputs, supply chains, and agrifood exports, resulting in higher production prices and, therefore, consumer prices. The most well-known and significant of these events is the full-scale war in Ukraine, which upon its onset in 2022 immediately resulted in higher global prices for key commodities including natural gas and nitrogen fertilizers (because Russia is the world’s third ranking natural gas exporter and natural gas is a critical input for nitrogen fertilizers); potash fertilizers (primarily from Russia and Belarus) and wheat (before the war, Ukraine was the world’s seventh-largest wheat exporter).

Although global input markets, for example for fertilizers, are broadly resilient, at the same time they also clearly are affected by geopolitical turbulence arising from trade policies, sanctions, shocks such as wars, and other phenomena. While the war in Ukraine is an important case, it hardly exhausts the list of current examples. In July 2025, the World Bank said that sanctions and restrictive trade policies “are playing an increasingly significant role in reshaping global fertilizer markets,” citing China’s discretionary export restrictions on nitrogen and phosphate fertilizers to protect its domestic agriculture, and the European Union’s (EU) June 2025 tariffs against Belarusian and Russian fertilizers to reduce EU dependence on these countries.

An even more difficult problem is the risk that the hemispheric and global agrifood trading system is returning to a protectionist order, which risks the benefits that have accrued since the emergence of a rules-based trading model in the 1990s for agriculture established under the World Trade Organization (WTO) 1994 Agreement on Agriculture. Under that model, countries tended to place high tariffs only on a few politically sensitive crops (such as sugar or cotton). Yet today’s rising protectionism is much broader, affecting a larger number of crops, including staple crops, and implemented by an ever-longer list of countries. The result is likely to undermine food security by increasing food prices—with impacts falling most harshly on poor households—and reducing profitability by raising both producers’ and exporters’ costs, lowering investment and decreasing productivity.

Over the past several decades, the largest agricultural producers in the Americas, including the United States and Brazil, have become the world’s largest agrifood exporting nations. Southern Cone states have pushed agricultural exports as key pieces of their export-led growth strategies, especially to China given its rapidly growing demand for commodities. With such a high dependence on global agricultural exports, the biggest agricultural producers in the Western Hemisphere ought to be the most heavily invested in a global agrifood free-trading regime. Tariff and nontariff barrier uncertainty negatively impacts agrifood producers, processors, distributors, and consumers.

These disruptions have other distorting effects. Trade patterns within the Americas, and between the Americas and the rest of the world, are shifting because of trade tensions. China’s behavior in international agricultural markets is a significant example, with direct relevance to the Western Hemisphere. A decade ago, China imported more agricultural goods from the United States than from Brazil; today, China imports almost twice as much from Brazil as from the United States, including in soybeans and corn. China’s shift toward non-US sources (including but not limited to Brazil) began even before the 2018 trade dispute with the United States. In addition to supply diversification, China also has dramatically increased its stockpiling of food (grains, soybeans, and frozen meat), which it defines as a strategic good.

Further, China’s decoupling from the US agricultural market has had major consequences for trade patterns in that it has helped Brazil become the world’s largest exporter of soybeans. Since the 2018 Sino-American trade dispute, Brazil’s global soybean exports have increased by 40 percent, while those from the US have remained flat.

Geopolitical and geoeconomic turbulence has distorting effects on global trade in food. The biggest concern for global food security is the impact on food prices, both in terms of inflation but also price variability. Such turbulence also can generate trade disputes and, therefore, contribute to fractured relations among states. After the United States levied tariffs in August 2025 of up to 50 percent against certain Brazilian agricultural goods including coffee, beef, and sugar, Brazil immediately asked the WTO for consultation, arguing that the tariffs violate international trade rules. A likely immediate effect of the tariffs is to hasten Brazil’s interest in developing alternative markets for its agricultural products, including with China. A second and (often) underappreciated concern is that unstable trade rules and fluctuating market access make it more difficult for farmers to plan and make production and investment decisions, increasing their economic uncertainty.

Geopolitical tensions and rising trade protectionism are also likely to lead to slower economic growth. This is important because in the Americas, as everywhere, economic growth coupled with rising incomes are keys to increased food security. If slower economic growth combines with higher food prices owing to increasing trade friction, then there is a greater risk of more food insecurity in the future. International food trade is being shaped increasingly by geopolitical considerations rather than market signals, thereby realigning trade patterns in unpredictable ways.

Institutional uncertainty

Multilateral institutions are a hallmark of the current international order. Most of the world’s biggest and most important institutions that exist today were created after 1945. Although not without criticism, much of it deserved, these institutions have been central to building a global order which has delivered unprecedented—if also uneven—prosperity. When it comes to trade, the data say as much: Today’s global trade is 45 times by volume and 382 times by value greater than it was in 1950. Moreover, since the mid-1990s, global trade growth has accelerated, averaging 4 percent growth by volume annually and 5 percent by value.

However, the multilateral institutions that have facilitated this growth in trade now are under enormous pressure from all sides. One reason is that the world’s largest trading powers as well as many smaller ones have been willing to bend or even break established norms and international trade law. China, for example, has taken advantage of its status as a developing country under the WTO to engage in unfair practices, including massive subsidies, heavy use of state-owned enterprises, forced technology transfer, and protection of its domestic market (for example, limiting foreign companies’ and investors’ access to its technology and financial markets).36 Further, the United States is preventing the WTO’s Appellate Body from functioning as designed, preventing the organization from enforcing its own rules.

Such developments are important because they create uncertainty surrounding trading rules and thereby increase friction among countries when it comes to trade. Even worse, these developments create space wherein the breaking of rules by some countries prompts others to believe they can as well. Both India and Indonesia, for example, recently have taken advantage of the lack of a functioning Appellate Body to
implement policies that likely are in violation; Indonesia instituted a ban on nickel exports (to induce nickel processors to relocate to Indonesia) while India heavily subsidized steel and pharmaceuticals. By some estimates, two-thirds of initial WTO rulings made about trade disputes have been appealed, but the Appellate Body cannot convene itself.

The decline of multilateral institutions is significant because the Americas benefit more than other regions from an open global trading system in agricultural goods, per table 1 above. Agriculture always has been a controversial topic in trade negotiations, extending back to the origins of the Global Agreement on Tariffs and Trade (GATT) in the 1940s. Despite this fact, functional multilateral institutions are valuable because
they create a stable, rules-based global marketplace that in turn enables trade in food at scale.

In sum, a breakdown of multilateral institutions and rising protectionism portend headwinds for agriculture in the years to come, increasing risks and possibly disincentivizing investments by farmers. Such developments erode the open agrifood trading system that globalization made possible. The Americas have utilized open trade to expand agriculture production and exports and, therefore, is most at risk from the unraveling of that system

Price inflation and variability

The price of food is a core metric for food security: For the world’s consumers, the most desirable food prices are both low and stable over time. Food insecurity is made worse when the opposite applies: rapid price inflation combined with high price variability. Unfortunately, as shown in figure 3, the latter situation has characterized global food prices for much of the past quarter century.

Since the 2000s, shocks have occurred with such frequency that prices settle on a new higher baseline rather than returning to previous levels. The FAO noted this trend as early as 2009: Prior to the 2006–2008 global food-price shock, “real prices [in food had] shown a steady long-run downward trend punctuated by typically short-lived price spikes.” But by the mid-2000s, the FAO observed, this trend no longer held. As of 2008, its own food-price index “still averaged 24 percent above 2007 and 57 percent above 2006.” Indeed, as shown in figure 3, since the mid-2000s, global food prices have risen to a new and higher level after each exogenous shock. The most recent global shocks—the COVID-19 pandemic followed by the full-scale invasion of Ukraine—has had the greatest impact on sustained high food prices.

The upward trend in the price of food has important implications for food security around the world. Food is less affordable; households have more difficulty consuming a healthy diet, and they are forced to switch to less nutritious foods and/or reduce their total consumption of food. This cost-of-living crisis erodes food security gains and threatens to make societies less stable.

Food-price inflation and volatility is as problematic in the Americas as elsewhere in the world, increasing food insecurity and becoming a key social and political issue. In Latin America, rising food prices have been a major driver of inflation across the region. In some cases, such as Argentina, food prices have contributed to extreme inflation rates. In North America, food prices also continue to rise and are a major cause of the cost-of-living crisis experienced by many households.

Investment: Innovation, technology, and infrastructure

Public- and private-sector investments in on- and off-farm innovation and productivity have been critical enablers of modern agrifood systems. A question to be answered in the years to come is whether such investments will increase agricultural productivity and sustainability enough to match or exceed demand-side pressures for more food (from population and income growth), even as baseline conditions from other drivers—ecological, institutional, geopolitical—become more challenging.

Historically, on- and off-farm innovation and productivity increases, which stem from process and technological developments plus infrastructural improvements, have been fundamental to increasing the supply of food to meet rising demand. Since the 1990s, global efficiency gains have been the largest contributors to global growth in agricultural output. Efficiency gains have far outstripped the other contributors, including the use of more inputs per hectare of land, greater extension of irrigation to cropland, and expansion of new agricultural land (e.g., expansion of agriculture into previously forested lands).

In agriculture, efficiency is gauged using total factor productivity (TFP), a metric of inputs relative to outputs. If total on-farm output (e.g., volume of crops produced) is growing faster than inputs (defined as labor, capital, and material resources), then TFP is increasing.

That is the good news. The bad news is that global TFP growth is now slowing. After steadily increasing from a 0.55 percent annual growth rate during the 1970s to a peak of 1.97 percent annual growth rate in the 2000s, TFP has since fallen back to 1.1 percent annually (figure 4). Within the Americas, the picture is even more dire. Between 2011 and 2020, TFP increased by only 0.9 percent annually in Latin America and the Caribbean. In North America, typically at the global forefront in productivity and efficiency gains, TFP grew over the same period by just 0.2 percent annually. The Americas significantly lagged the global average (figure 5).

The decline in TFP over the past fifteen years is a worrisome development, as it threatens to undermine progress toward an elusive goal, which is to produce enough food to meet growing global demand while simultaneously retaining on-farm profitability and reducing environmental impact. Analysts at the US Department of Agriculture recently made this argument. “At the global level,” they wrote, “improvements in agricultural productivity have not been rapid or universal enough to make a significant dent in the effect of agriculture on the environment.” If TFP were to continue to slow down in the future, the impact “could [negatively] affect food prices, [lead to] the expansion of agriculture into more natural lands, and [threaten] global food security.”

Nor is underinvestment in innovation the only form of investment risk. Despite the hemisphere’s reliance on trade in agriculture and food, infrastructure across much of the Americas remains underdeveloped. The so-called infrastructure gap in the Americas refers to how the hemisphere’s ports, railways, bridges and roads, telecommunications, and other forms of infrastructure are insufficiently robust in kind, quality, and/or maintenance. In 2021, for example, the Inter-American Development Bank (IDB) estimated that countries in Latin America and the Caribbean alone would need to invest $2.2 trillion in “water and sanitation, energy, transportation, and telecommunications infrastructure” to meet the UN’s Sustainable Development Goals. The IDB’s estimate included not just funds for new infrastructural investment but for maintenance and replacement as well (at some 41 percent of the total).

North America is not exempt from this problem, as both Canada and the United States face large infrastructure deficits. As is well-known, for decades the United States has largely underinvested in infrastructure. Despite passage of the 2021 Infrastructure Investment and Jobs Act, which directed the federal government to spend some $1.2 trillion over five years on infrastructure, investment levels in the United States will remain insufficient absent systematic changes in how funds are raised by local, state, and federal governments.

Likewise, in Canada, the infrastructure deficit, which is estimated at $196 billion, is of particular importance to that country’s globally important agricultural exports, which include foodstuffs such as grains (wheat, principally) and key agricultural inputs such as fertilizers, largely produced in the country’s vast interior. Getting bulky grains and inputs to external markets more cheaply and efficiently will require Canada to upgrade its transport infrastructure, including railway lines, bridges, and ports, which are key in all circumstances but especially so during periods when unexpected disruptive factors, such as recent port labor strikes or extreme weather events, create choke points that necessitate rerouting. The recent announcements by the government of Canada to expand the Port of Montreal is a step in the right direction. However, significantly greater ambition will be required to push Canada’s infrastructure investments to levels comparable to other leading OECD countries.

Policymakers, the private sector, farmers, investors, and the scientific and technological communities will need to find solutions to these challenges. Doing so will require some combination of enhanced public and private investment in on- and off-farm infrastructure, R&D, improved piloting and scaling of new technologies, and implementation of policies to encourage farmers to become more innovative, productive, and efficient.

A Colombian grocery store displays a variety of vegetables for sale. (Unsplash/nrd)

Demographic shifts

Agricultural employment as a share of global GDP has been trending downward for decades, owing to the ongoing mechanization of farmwork, increasing urbanization and industrialization, and other factors. According to the World Bank, in 1991, 43 percent of the world’s population was employed in agriculture. By 2023, that figure had fallen by almost half, to 26 percent.

The Western Hemisphere has followed this trendline. In Latin America and the Caribbean, agricultural employment fell over the same 1991–2023 period from 21 percent to 13 percent and in North America from 2.8 percent to 1.6 percent. As can be expected, given differences in income levels, structure of national economies, and crop specialization, there are widespread differences in agricultural employment across the hemisphere. In 2023, several countries still had employment levels in agriculture above 20 percent: Haiti (by far the most, at 45 percent), Ecuador, Guatemala, Bolivia, Nicaragua, Peru, and Honduras. In contrast, the hemisphere’s biggest producers of staple crops—the United States, Canada, Mexico, Brazil, and Argentina—are all well below the global average of 26 percent, in most cases in low single digits.

This demographic transition underscores how agriculture is becoming more capital-intensive and productive: more food is being produced per person employed in the sector. The largest food producers also typically have the lowest share of farmers and agricultural workers employed in the national economy, as the United States, Canada, and Argentina all show (each is at less than 2 percent of their populations employed
in agriculture).

However, there is a generational downside to this demographic trend: farmers worldwide are aging in part because on-farm employment opportunities are declining. The trend appears to be worse in the wealthiest regions having the smallest share of employment in agriculture. In the EU, for example, only 11.9 percent of farmers were under forty years old in 2020.52 In the United States, only 9 percent were under thirty-five years of age in 2022.

Toward a food-secure future

The world needs a bold new way of thinking about food security, one that incorporates a comprehensive understanding of how divergent forces, including those identified in this report, are creating a dynamic and unsettled agrifood landscape that will shape the future in unpredictable ways. To avoid negative future scenarios and increase the odds of positive ones, what is needed is a shift in the prevailing debate about food security that incorporates all these driving forces. That debate should stress that these forces combine in important and not entirely predictable ways to disrupt agrifood systems.

Such an outlook recognizes, for example, that geopolitical tensions add risk to other phenomena such as climate change to make an already perilous situation more difficult.

Policymakers and other leaders across the Americas should recognize that these drivers intersect and combine, in turn reshaping the hemisphere’s agrifood outlook. The challenge is clear: They will need to develop strategies and design policies that will lead to resilient and sustainable food systems that minimize the impact of shocks—both natural and human-made—on the production, distribution, and access to food.

Ecology

As stated above in the introduction, a central challenge will be to ensure that food production can remain profitable and resilient in the face of disruptive change. Ecological changes and the environmental resources that the world relies upon for productive and healthy agriculture systems are critical pieces of this equation.

A key task concerns how best to frame this problem for policymakers, business leaders, and farmers, to relay that ecological changes threaten to undermine progress toward a food-secure future. How these stakeholders act through policies, investments, and practices to mitigate and adapt to ecological changes will go a long way to determining whether the hemisphere’s future is food secure or insecure.

Farming is inherently uncertain because of the vagaries of weather and disease, so efforts to minimize the instability caused by ecological changes, including climate change, extreme weather, disasters, and other phenomena, will help farmers to manage this complex set of risks. Integration across risks is an important way to frame the problem, not only because the problem itself is multifaceted but so too are the solutions. Synergies among healthy ecosystem services, robust agricultural production, and profitability can be found with the right application of imagination, creativity, policymaking, investment, and on-the-ground application by utilizing input and knowledge from farmers and farming communities.

Agriculture is a major driver of ecological change, including land-use patterns and carbon emissions. Yet at the same time, agriculture also holds enormous potential, under the right domestic and international conditions, to provide robust and lasting solutions. Doing so would require that policymakers, investors, farmers, scientists, and technologists and society writ large coordinate efforts toward effecting scalable change.

Synergistic approaches include a range of alternative farming techniques and practices as well as novel technologies that collectively hold great potential not only to perform at a high level of output but at the same time go some way toward repairing the natural world. These strategies, which overlap in practice, include regenerative agriculture, no-till farming, agroforestry, climate-smart agriculture, and 4R nutrient stewardship practices (referring to nutrient-management practices focusing on the right sources, right rates, right times, and right places for nutrients). Such approaches aim to improve resource efficiency, reduce waste, protect ecosystems and ecosystem services including freshwater sources, soils, and biodiversity, while retaining profitability. Through the more efficient use of resources, carbon sequestration in soils, land and forest conservation, and improved management (for example, of water and waste processes), these strategies also can mitigate the agricultural sector’s significant greenhouse gas emissions.

Although many of these approaches once were considered experimental, novel, and unproven, that is far less the case today. Regenerative farming, for example, now has more adherents (including farmers) who believe that the diverse methods falling under it deliver tangible environmental benefits without sacrificing on-farm yields—a claim that is also drawing greater financial-sector interest and investment. A global survey of farmers, conducted in 2024 by McKinsey and Company found that over three-quarters of farmers in Argentina, Brazil, Canada, and the United States were adopting no-till or reduced tillage practices. Farmers’ willingness to adopt these and other regenerative practices were “underpinned by economics,” according to McKinsey, with respondents in the Americas ranking increased yields as their primary motive for adoption, followed by lower production costs and additional revenue streams.

There is an enormous amount of land worldwide and in the Americas that could be revitalized through such approaches. Land degradation, which by extension means the degradation of the world’s soils, is a massive problem. The world is losing at least one hundred million hectares of productive land each year, with some forecasts suggesting up to 95 percent of the world’s arable land could be in some kind of degraded state
by 2050.

In the Americas, degradation is a serious problem but also a big opportunity for soil and land regeneration. Brazil alone has enormous swathes of degraded pastureland. Embrapa, Brazil’s agricultural research agency, estimated in 2024 that the country has approximately twenty-eight million hectares of degraded pastureland (classified as intermediately or severely degraded). Bringing this land back into production using regenerative methods would help alleviate forest conversion pressures in Brazil’s Cerrado and Amazon regions.

One important consideration for policymakers is that if trade in agriculture and food becomes more costly, there is a risk that the fiscal capacity to invest in policies to make agrifood systems more productive and resilient in the face of ecological change will be reduced. Hence, this report focuses on understanding how these issues are linked and addressing them through greater international cooperation to promote more sustainable and resilient agrifood systems.

Trade, geopolitics, and institutions

Rising protectionism and geopolitical competition undermine the incentives for states to cooperate. Trade tensions risk spilling over into diplomatic tension, eroding international trust. In such conditions, states will be less likely to collaborate, which can sour international relations. If the world’s biggest economies are becoming more protectionist and eschewing a rules-based trading system, a zero-sum world returns, with many states, concerned by protectionist measures placed on them from elsewhere, believing they must adopt such policies. More dialogue among states, not less, is an antidote.

An increasing number of governments around the world appear to no longer see the equation in these terms. China, for example, is seeking greater self-reliance in food through stockpiling and other measures. It also has weaponized tariffs for its own purposes, imposing large tariffs on grain imports from Australia and more recently on Canada. These are not isolated incidents but part of how China exercises its power, given its outsized impact on world markets.

As articulated in this report, global trade in food depends on the strength of multilateral institutions and international agreements. These institutions are often underappreciated contributors to global food security. Today these institutions are being eroded by rising geopolitical and diplomatic conflict and other forces. The rapid rate of their erosion is worrisome.

Despite the WTO’s flaws—of which there are many—it remains valuable because it has the reach and standing to create and enforce global trading rules. Yet the organization is failing at doing so, in large part because of its own rules (decisions are made by consensus) and even more so because the largest trading countries no longer want to abide by a rules-based system. The risk is a collapse of the entire multilateral trading system. “The reversal of global economic integration [if the multilateral trading system were to fail] would bring with it growing lawlessness, conflict, and disorder in the global economy,” one scholar writes, and with it “the international system at large.”

One aim should be to build alternative institutions within the hemisphere consisting of states having the critical mass to achieve desired outcomes. One such solution would be to mimic the Group of Seven and Group of Twenty, two examples of institutions that bring leaders from the world’s largest economies together to attempt to coordinate solutions to various global challenges. One possibility would be to start with just the largest agricultural producers in the hemisphere—an “A5” consisting of the United States, Brazil, Mexico, Canada, and Argentina—to bring agriculture ministers together for systematized dialogue about hemispheric trade. Dialogue outcomes might include regional food-security compacts that generate commitments to invest in agricultural research leading to breakthrough technologies (“agtech”), to avoid the most trade distorting policies (export bans, for example), and more.

A related idea is to construct a standing (as opposed to episodic) hemispheric food security council to bring willing governments together for discussing responses to future shocks, identifying pathways for greater scientific and technological cooperation, and buttressing the norm regarding the hemisphere’s responsibility to the rest of the world as a major food supplier. Hemispheric institutions such as the Organization of American States (OAS) and Inter-American Development Bank can be leveraged to convene this council, given their credibility in addressing hemispheric affairs, including in trade. Using the inter-American system to convene a hemispheric food security council consisting of foreign, environment, and agriculture ministers—alongside representatives from industry and producer groups—should appeal to a wide set of stakeholders.

A drone hovers above a field. (Unsplash/Job Vermeulen)

Investment in innovation, technology, and infrastructure

The constant improvement of on- and off-farm activities, including innovative use of new technologies and processes, and capital investment in the phenomena that enable them (including infrastructure), are central to ensuring that the hemisphere and the world are food secure. Innovation and investment also are critical components of agrifood systems that not only are productive but also sustainable and resilient, given
the need to prepare for climate-driven shocks in the future. Innovative technologies and processes, and the infrastructure that undergirds them, can build redundancy and efficiency into the agrifood system in anticipation of such shocks.

Regenerative agriculture and other agrifood systems focused on sustainability can be enhanced through the application of advanced technologies. Examples include:

  • Alternative energy sources can enhance on- and offfarm systems while reducing carbon footprints.
  • Geospatial remote sensing tools for precision farming can identify and help safeguard ecological assets.
  • Robotics and mobile digital technologies (including deeper integration of handheld devices into farming practices) can improve agricultural efficiencies while reducing environmental impact.
  • AI-driven analytics can integrate and utilize data streams from numerous applications.

Such technologies will become more critical in the future, as ecological changes make farming more difficult. Rising heat, for example, will create harsher working conditions for farm labor, in turn requiring machines and other technologies to alleviate workers’ outdoor exposure during periods of extreme heat.

Biotechnologies should be added to this list, given their promise to improve on-farm productivity and nutrient use efficiency while protecting ecological assets such as soils and water. Biofertilizers, for example, aim to improve soil fertility and nutrient use efficiency through application of living organisms including bacteria, fungi, and algae, with crop yields increasing by an estimated 10 percent to 40 percent. They also help
plants withstand abiotic stressors, some brought on by climate change, including drought, salinity, and extreme temperatures.

How can governments, the private sector, and other actors together ensure that the right mix and scale of investments are being made that will lead to innovative technologies and processes across the hemisphere’s agrifood systems? Additionally, how can they ensure that innovative technologies and processes are transformative at all scales, including for the hemisphere’s millions of smallholder farmers in addition to its largest producers? Some technologies and processes are more suitable for large-scale applications because of high cost or other considerations, for example. Improving access to the benefits of such technologies will require improved pathways for dissemination of knowledge, practical know-how, access to capital, and other services (e.g., training).

Every year, researchers at Virginia Tech produce the Global Agricultural Productivity Report, which tracks and analyzes TFP trends. The 2025 version asserts that reversing the decline in TFP growth—including low growth in the Americas—will require five “policy, investment and research priorities,” which are:

  • Invest more in strengthening and expanding multistakeholder dialogues, agriculture extension services, and incentive structures for technology transfer to smallholder farmers.
  • Expand access to markets for all participants in the agrifood value chain, including smallholder farmers.
  • Strengthen trade as it “enhances competitive prices” which incentivizes investment in improved inputs and technologies” while facilitating “the exchange of knowledge, innovations, and best practices across borders, driving productivity gains.”
  • Reduce food loss and waste.
  • Invest in public-private partnerships, joint ventures, knowledge sharing agreements and platforms, and interdisciplinary research.

These types of innovative practices have real impact on agrifood systems at every level, down to the farm itself. Innovation delivers new seeds and crop varieties, creates more efficient production methods, solves practical problems faced by farmers (pests and disease), and creates new markets for goods and services provided by farmers (such as using sugarcane to produce ethanol to reduce carbon emissions of transport
fuels).

Farmers are both users and creators of innovative technologies and processes, so their knowledge and experience should be included in robust feedback loops. Moreover, farmers must be able to adopt and utilize innovative technologies and processes to realize their full positive contributions. This is not an automatic process, as on-farm adoption is not the same thing as laboratory invention. When making investment decisions, farmers are businesspersons, concerned about the upfront costs and return on investment (ROI). Global surveys of farmers indicate they are hesitant to adopt new technologies and processes if the technologies and processes are unfamiliar or they face high initial investment costs or uncertain ROI.

Publicly funded agricultural extension programs, which connect researchers at universities and other institutions to farmers—in the process, enabling mutual learning and successful technology transfer—are critical to improving agtech adoption. Maintaining and strengthening extension services (including public funding) should be central to any country’s aspiration to build world-class agrifood systems based on widespread technology and process adoption by farmers.

Improving infrastructure to strengthen agrifood supply chains is also critical, especially as higher temperatures, changing precipitation patterns, more frequent and powerful disasters, and other problems will put more infrastructure—e.g., ports, bridges, roads, railroads, canals— at risk. Ports are especially at risk, with most food trade moving by cargo ships. The Panama Canal, which in recent years has had low water levels due to Central American drought, is a good example. (Chinese ownership of port facilities also has proven controversial in the United States.) Beyond adaptation measures designed to improve individual pieces of infrastructure, there is much need for strategies that will frame the challenge in terms of societal and even transboundary (international) resilience. Canada, for example, in 2023 released a whole-of-society National Adaptation Strategy that emphasizes the need to make physical infrastructure (and communities) more resilient to climate-driven impacts.

Three locomotives haul goods over the Ascotán Pass to the Bolivian border. (Wikimedia/Kabelleger)

Farmers for the future

Ensuring a food-secure future in the Americas must place human beings at its center. This formula long has been the focus on the demand side of the food-security equation: The goal always is to ensure that all humans always have access to affordable and nutritious food.

Yet the same logic also holds on the supply side of the equation. To avoid the demographic decline of farming amid the chronic aging of the world’s farmers, it is imperative that farming be made financially, socially, and culturally attractive to younger generations. Unfortunately, such conditions are not prevalent in many countries (perhaps most) around the world. The reasons for this are many. To young people, particularly those without a family heritage in agriculture, farming can be perceived as backward, unprofitable, difficult, alien, or uncool—or all the above.

There is no single set of recognized solutions to assist in turning the demographic trendlines around. However, evidence from around the world suggests that a combination of interventions, some obvious and others not so much, might suffice. The obvious ones are to make it easier to gain access to farming in the first place by reducing barriers to entry (access to affordable financing or access to farmland through ownership or long-term contract), and closing knowledge and skills gaps through on-farm training programs, scholarships, and apprenticeships. There are less obvious interventions, too. One such intervention is to incentivize nontraditional candidates to enter farming, for example, young women, in addition to traditional candidates (typically men). Another is to stress the increasingly important role played by digital technologies, robotics, big data and remote sensing, artificial intelligence, and other technical applications that appeal to tech-savvy and ambitious young people.

Although none of these solutions will guarantee a demographic rebound in farming, there are examples of where the curve has been bent toward youth. Brazil’s farmers are getting younger rather than older. They appear to be attracted by the prospect of getting rich in Brazil’s booming, forward-facing, and tech-savvy industry.

A combine harvests corn in a field in Southern Michigan. (Unsplash/Loren King)

Conclusion

The issues outlined in this report should be seen as a starting point for discussion. The challenges and the opportunities facing agrifood systems in the Americas in the coming decades will be profound. A central question is whether the hemisphere’s key actors—governments, farmers, the private sector, researchers, foundations, civil society groups, and the public—will be willing to invest in the transformative processes and approaches that will reduce risk while increasing prosperity, sustainability, and resilience.

This report has put great emphasis upon generating productive dialogues among key stakeholders. Promoting the diffusion of critical innovations for food security will be an important piece of this process. It is imperative that governments and multilateral institutions in the hemisphere find financing and pool technological know-how to support programs tailored to meet the needs of the region.

Beyond that, however, it is critical that nongovernmental stakeholders, including investors, the private sector, researchers, scientists, analysts, farmers, and farming communities, act in concert with one another. They must themselves build the transnational dialogues to assist in envisioning, creating, and strengthening the tools that will be needed to ensure a food-secure future.

Acknowledgments

This report was produced by the Atlantic Council with support from The Mosaic Company as part of the Food security: Strategic alignment in the Americas project.

About the authors

Peter Engelke is a senior fellow with the Atlantic Council’s Scowcroft Center for Strategy and Security as well as a senior fellow with its Global Energy Center. His diverse work portfolio spans strategic foresight; geopolitics, diplomacy, and international relations; climate change and Earth systems; food, water, and energy security; emerging and disruptive technologies and tech-based innovation ecosystems; and demographics and urbanization, among other subjects, and he is the creator of the Council’s most widely read long-form publication series, Global Foresight. Engelke’s previous affiliations have included the Geneva Centre for Security Policy, the Robert Bosch Foundation, the World Economic Forum, and the Stimson Center.

Matias Margulis is associate professor of the School of Public Policy and Global Affairs and a faculty member of Land and Food Systems at the University of British Columbia. His research and teaching interests are in global governance, development, human rights, international law, and food policy. In addition to his academic research, Margulis has extensive professional experience in the field of international policymaking and is a former Canadian representative to the World Trade Organization, Organisation for Economic Co-operation and Development, and the UN Food and Agriculture Organization.

Explore the program

The GeoStrategy Initiative, housed within the Scowcroft Center for Strategy and Security, leverages strategy development and long-range foresight to serve as the preeminent thought-leader and convener for policy-relevant analysis and solutions to understand a complex and unpredictable world. Through its work, the initiative strives to revitalize, adapt, and defend a rules-based international system in order to foster peace, prosperity, and freedom for decades to come.

The post The future of food in the Americas appeared first on Atlantic Council.

]]>
Representative Adam Smith on the NDAA, Venezuela, and the United States’ role in the world https://www.atlanticcouncil.org/blogs/new-atlanticist/representative-adam-smith-on-the-ndaa-venezuela-and-the-united-states-role-in-the-world/ Fri, 07 Nov 2025 17:08:42 +0000 https://www.atlanticcouncil.org/?p=886472 The congressman discussed the National Defense Authorization Act and the Trump administration’s attacks on alleged drug-smuggling boats in the Caribbean and Pacific.

The post Representative Adam Smith on the NDAA, Venezuela, and the United States’ role in the world appeared first on Atlantic Council.

]]>
Watch the event

“I don’t think simply committing this large number of assets—hundreds of millions, probably billions of dollars by the time it’s done—to blow up some drug boats in international waters in Latin America is going to make an appreciable difference” in the fight against drug trafficking, said Representative Adam Smith (D-WA), the ranking member of the House Armed Services Committee, at an Atlantic Council Front Page event on Thursday. 

The event, part of the Atlantic Council’s Commanders Series, came amid uncertainty over whether the Trump administration’s campaign of attacks on boats that it claims are trafficking drugs will escalate into an effort to overthrow Venezuelan autocrat Nicolás Maduro.

Based on a briefing he received from the State Department and Department of Defense on Wednesday, Smith said he thinks that “the administration does not want to go to war with Venezuela.” But, Smith added, US President Donald Trump sometimes “very quickly” changes his mind. “So who knows?”

Thursday’s event also came amid the longest US government shutdown in history, with the House out of session even as the National Defense Authorization Act (NDAA) for the next fiscal year has yet to be passed, a situation Smith called “unbelievably disruptive.”

Read below for more highlights from this conversation with Smith, which was moderated by Fox News Chief National Security Correspondent Jennifer Griffin. 

The NDAA

  • “The NDAA itself is moving forward,” Smith said of the annual bill, noting that different versions have been passed by the House of Representatives and the Senate, and now the two versions need to be reconciled.
  • One of Smith’s priorities for the bill is acquisition reform: “My position is we’ve had the risk wrong for a long time” on defense acquisition policy, said Smith. “We’ve been only focused” on the risk of corruption in the procurement process “as opposed to the risk of not moving fast enough,” he said. One way to speed up acquisition, he said, is “consolidating the decision makers” in the process “instead of having to go through nine or ten different layers.”
  • Smith also said he wants to “have procurement people stay in their job longer.” Constant turnover in procurement roles, he said, “doesn’t really help with corruption. It just means that the person doesn’t know the system as well when they’re working on it.”

US strikes on boats in the Caribbean and Pacific

  • Transnational drug-trafficking gangs in the Western Hemisphere are “a problem for our national security” and “a problem for Latin America,” Smith said. “You’ve got budding narco-states down there. They’re having a harder and harder time dealing with that. We need to be engaged and involved in that.”
  • However, Smith was critical of the Trump administration’s campaign of attacks on alleged drug-trafficking boats in the Caribbean and the Pacific. “It seems very problematic to me that we have decided that drug dealing will now have the death penalty attached to it,” with “no process whatsoever.”
  • “They’re certainly bad policy in my view,” Smith said of the strikes.

US military presence abroad

  • “I think one of the mistakes that we have made is to assume that our global presence is just a cost that isn’t benefiting us,” Smith said of US troop deployments abroad. 
  • Citing threats posed by Russia, China, Iran, North Korea, and transnational terrorist organizations, Smith said that to pull US troops back from allied countries now and “ignore” these dangers “places us at risk.”
  • Smith took issue with the Trump administration’s decision to draw down its forces in Romania and noted that there is “bipartisan, bicameral support” in the House and Senate armed services committees “to maintain our presence in Europe and defend them.”
  • “If any of you have been to Romania, the Baltics, Poland,” said Smith, addressing the crowd, “they want a lot of things, but the one thing they want more than anything is us,” meaning a US military presence. “They don’t believe Russia wants to come in and kill a bunch of US troops. So a little bit of presence can give us a maximum amount of deterrence, and we’re going to fight that out in the defense bill.”

Daniel Hojnacki is an assistant editor on the editorial team at the Atlantic Council.

Watch the event

The post Representative Adam Smith on the NDAA, Venezuela, and the United States’ role in the world appeared first on Atlantic Council.

]]>
Why China is here to stay in Iraq’s energy sector https://www.atlanticcouncil.org/blogs/menasource/why-china-is-here-to-stay-in-iraqs-energy-sector/ Wed, 05 Nov 2025 19:40:19 +0000 https://www.atlanticcouncil.org/?p=885449 Regardless of the specific makeup of the next Iraqi government, it is likely that Chinese firms will continue to enjoy an advantage.

The post Why China is here to stay in Iraq’s energy sector appeared first on Atlantic Council.

]]>
Even as Iraqi Prime Minister Mohammed Shia al-Sudani has worked to increase US involvement in Iraq’s energy sector, his government has also expanded already-deep ties with Beijing by awarding new upstream projects to Chinese companies and increasing the scope of critical energy infrastructure projects financed by China.

China was already the biggest international player in Iraq’s upstream sector—operating several large oil fields across southern Iraq—before Chinese companies were awarded new oil and gas blocks under al-Sudani’s premiership. The only oil and gas contract auction held during al-Sudani’s administration—the May 2024 “Fifth+ and Sixth” licensing round—was dominated by a combination of Chinese national oil companies and privately held Chinese exploration and production (E&P) companies. Interest from large Western oil companies (supermajors) was tepid (only Shell placed a bid, and it was unsuccessful), and interest from US companies was virtually nonexistent. Beijing’s dominance of the bid round was so complete that the only non-Chinese company to land an asset was an Iraqi firm, KAR Group.

Chinese financing has also appeared to give Chinese companies an inside track to winning critical energy infrastructure projects. Under a program that was initiated well before al-Sudani’s government, in 2019, Iraq now directs about 150,000 barrels per day worth of oil revenues into an escrow account, which then functions as collateral to unlock loans via the state-owned firm Sinosure. In its early days, this vehicle was used to fund projects outside of the energy sector, but al-Sudani’s government has recently leveraged the Chinese financing program to push forward two pieces of critical energy-sector infrastructure:

  • A $2.6 billion pipeline project to bring treated seawater to giant oil fields for water injection, awarded to the China Petroleum Engineering and Construction Corporation
  • A one-billion-dollar gas pipeline project linking an Anbar province gas field to power generation facilities, some of which are also built by Chinese companies.

Chinese financing is also likely to make or break an $18 billion integrated project that was awarded earlier this year to China’s Geo-Jade Petroleum for the upstream development of the Tuba oil field in the Iraqi city of Basra and the construction of an oil refinery, two power plants, a petrochemical plant, and a fertilizer plant.

China’s appeal to Iraq is obvious. On the upstream side, Chinese companies will accept commercial terms that Western majors and US E&Ps simply will not. Indeed, China’s success in Iraq’s 2024 oil and gas contract auction was less a function of any deliberate Iraqi strategy to favor Chinese companies than it was a reflection of the structure of the auction, in which the sole criterion for deciding a winning bid was a company’s willingness to accept a narrow profit margin. This structure put Chinese companies at an advantage, because vertically integrated Chinese national oil companies can make money on projects by assigning major contracting opportunities to their subsidiary entities. At the same time, small Chinese E&Ps can operate at a lower cost than their Western counterparts. Chinese companies can also access state financing with relative ease since Beijing sees a strong presence in Iraq’s upstream sector as a strategic priority for securing long-term crude supply.

Supermajors and US E&Ps have also found al-Sudani’s government eager to do business, even as these companies cannot compete with Chinese firms in open bid rounds. Al-Sudani’s administration inked major contracts with both TotalEnergies and BP after bilateral negotiations, and it is holding ongoing talks with both Chevron and ExxonMobil. Sudani’s government has also signed a memorandum of understanding with the privately owned US E&P company HKN Energy.

Al-Sudani’s government appears to see significant strategic value in courting supermajors and US E&Ps, even if the terms these companies demand are less advantageous for Iraq than those accepted by Chinese companies. Successive Iraqi governments have long been wary of creeping Chinese consolidation over Iraq’s upstream sector. For example, Iraq’s former oil minister, Ihsan Ismaael, told the Iraq Oil Report in 2021 that he rejected an effort by Lukoil to pursue an asset sale at West Qurna-2 to a Chinese company, because, “we need to keep the same balance of market share in the south.”

Additionally, a range of oil officials have told the authors that Iraqi oil officials often voice a preference for the technology and approach of supermajors. Meanwhile, increased US investment in Iraq’s energy sector is perceived by policymakers in Baghdad—based on our research and conversations with key leaders speaking on background—as a tool for mitigating the risk of sanctions enforcement against Iraqi entities by the US Treasury Department.

With Iraqi parliamentary elections looming, US and Chinese companies alike will be engaging a new government at some point in 2026. Even if there is a new prime minister at the helm, the next Iraqi government’s policy toward international energy investment is likely to be shaped by the same forces that have informed al-Sudani’s approach. Regardless of the specific makeup of the next Iraqi government, it is likely that Chinese firms will continue to enjoy an advantage—stemming from Iraq’s desire for favorable commercial terms and the relative ease of access to Chinese financing. At the same time, Iraq is also likely to continue soliciting megaprojects with supermajors due to their technical capacity and potential geopolitical value.

Jared Levy is the director of the Iraq Oil Report‘s research services division. He oversees a team of data collectors and analysts that provide private sector and government clients with a range of subscription products and bespoke research and briefing services. He previously ran the Iraq office of a market entry advisory company.

Ben Van Heuvelen is the editor-in-chief of the Iraq Oil Report. His work has also been published in the Washington Post, Bloomberg, the Atlantic, and Foreign Policy. He regularly briefs investors, diplomats, governments, and nongovernmental organizations on Iraq’s political and business environment. He previously worked as a research fellow at the New America Foundation in Washington, DC.

The post Why China is here to stay in Iraq’s energy sector appeared first on Atlantic Council.

]]>
A next-generation agenda: South Korea-US-Australia security cooperation https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/a-next-generation-agenda-south-korea-us-australia-security-cooperation/ Tue, 04 Nov 2025 13:00:00 +0000 https://www.atlanticcouncil.org/?p=885110 Growing collaboration and cooperation between the United States, South Korea, and Australia could be key to maintaining security and prosperity in the Indo-Pacific. The Atlantic Council and the Korea Foundation gathered rising experts from the United States, South Korea, and Australia to identify obstacles to that cooperation and opportunities to overcome them.

The post A next-generation agenda: South Korea-US-Australia security cooperation appeared first on Atlantic Council.

]]>

Bottom lines up front

  • There is great potential for expanded trilateral cooperation among the United States, South Korea, and Australia, but they will need to overcome the “tyranny of distance” and the resulting diverging threat perceptions.
  • The three partners should do more to take advantage of the varied applications of critical and emerging technologies, as well as engage further with other partners in the region on these topics.
  • The partners can focus their efforts on concretely developing cooperation through public-private collaboration through avenues such as defense industry cooperation, research and development (R&D), and infrastructure projects.

South Korea and Australia have consistently built upon cooperation as two “middle powers” in a region of ever-growing global importance and dynamism. At the same time, the two countries have bolstered their respective alliances with the United States, building regional bilateral and multilateral collaboration. Ultimately, capitalizing on the potential for growing collaboration and cooperation between the United States, South Korea, and Australia could be key to maintaining security and prosperity in the Indo-Pacific. However, when it comes to bringing several countries together in a collaborative environment, there are inherent challenges to reaching a consensus.

To meet that challenge, the Atlantic Council and the Korea Foundation gathered mid-career and junior experts from the United States, South Korea, and Australia in two private workshops. The group identified several obstacles to cooperation—namely, differing geostrategic circumstances, diverging threat perceptions, different strategies for engaging with China, and a lack of consistent engagement between the countries. Despite this, there are several key opportunities to bolster cooperation—namely, defense industrial cooperation, joint endeavors in science and technology, developing maritime security, and collaborating on engaging additional partner countries and multilaterals.

The rising generation of policymakers we spoke with zeroed in on four ways to improve the trilateral relationship:

  • cultivate defense industry collaboration and public-private cooperation;
  • institutionalize relationships and expand joint exercises;
  • foster expanded R&D of critical technologies; and
  • develop disaster-resilient infrastructure projects and early warning systems.

view the full issue brief

about the authors

Lauren D. Gilbert is the deputy director of the Atlantic Council’s Indo-Pacific Security Initiative housed within the Scowcroft Center for Strategy and Security. In this role, she oversees research and programming focused on engaging with US, allied, and partner governments and other key stakeholders to shape strategies and policies to mitigate the most important rising security challenges facing the region.

Kester Abbott is a research associate at the United States Studies Centre at the University of Sydney and a non-resident James A. Kelly Korea fellow at the Pacific Forum. He works on US Indo-Pacific strategy, defense industry issues, and Northeast Asian security dynamics, with a focus on South Korean foreign relations.

Hannah Heewon Seo is the events administrator at The Australia Institute, with a background in international affairs organizations in Australia and South Korea. Her focus centers on foreign relations and diplomacy, particularly engagement with the Asia-Pacific, and the opinions expressed do not represent those of The Australia Institute.

related content

explore the program

The Indo-Pacific Security Initiative (IPSI) informs and shapes the strategies, plans, and policies of the United States and its allies and partners to address the most important rising security challenges in the Indo-Pacific, including China’s growing threat to the international order and North Korea’s destabilizing nuclear weapons advancements. IPSI produces innovative analysis, conducts tabletop exercises, hosts public and private convenings, and engages with US, allied, and partner governments, militaries, media, other key private and public-sector stakeholders, and publics.

The post A next-generation agenda: South Korea-US-Australia security cooperation appeared first on Atlantic Council.

]]>
US power utilities must prepare for a crisis in the Indo-Pacific. Here’s how they can start. https://www.atlanticcouncil.org/blogs/new-atlanticist/us-power-utilities-must-prepare-for-a-crisis-in-the-indo-pacific-heres-how-they-can-start/ Mon, 03 Nov 2025 16:35:20 +0000 https://www.atlanticcouncil.org/?p=884061 The private sector—not just the government and military—must prepare for attacks on the US electrical grid resulting from a geopolitical crisis in the Indo-Pacific.

The post US power utilities must prepare for a crisis in the Indo-Pacific. Here’s how they can start. appeared first on Atlantic Council.

]]>
As the last US National Security Agency director warned in alarming comments last month, China is hacking into American electrical infrastructure. Public reporting and government advisories also point to China pre-positioning backdoors in power grid control systems and electrical power supply chains. Through these means, China is establishing leverage over critical infrastructure, and it could use this leverage to threaten, disrupt, or degrade services in a crisis, especially if Beijing seeks to block US involvement if it moves against Taiwan.

This kind of access gives China options for coercion, deterrence, and signaling, pursued through temporary and targeted effects in a “gray zone” crisis, as well as for conducting larger-scale attacks in the event of a major conflict. With this in mind, it is essential that the private sector—not just the US government and military—better prepare for attacks on the US electrical grid resulting from a geopolitical crisis or conflict in the Indo-Pacific. Importantly, this preparation should include both assessing the geopolitical risks and practicing what to do in a crisis.

During a recent industry forum in California, we heard from senior utility executives, grid operators, market strategists, and other experts about the range of complex challenges that the energy sector faces. Utilities must, for example, keep costs in check, meet regulatory standards, manage load growth, and advance the energy transition. At the same time, we contend that they need to treat Chinese cyber and supply-chain exposure as a standing threat—part of the context of overall strategic planning and risk mitigation—given the geopolitical risks the United States faces. During the forum, we discussed a pressing question on a panel with an unusual focus for industry: how to protect the mission to deliver reliable, safe, and affordable power as geopolitical risks rise, particularly the threat China could pose to US electrical infrastructure in the context of a regional crisis or conflict. Based on our discussions, we came to three overall takeaways.

First, utilities should identify practical geopolitical crisis indicators to monitor that, when the indicators occur, should move utility leaders from watchful to active measures. One such indicator is Chinese military exercises that move beyond the routine and are on a scale indicative of invasion preparation and/or involve live-fire training that interferes with access to Taiwan. Other indicators could be narratives from Chinese official sources that aim to justify imminent “defensive” military action, sudden pressure on key vendors, or export controls that signal possible supply disruptions. None of these signposts require classified sources, as they are visible in publicly available information and sector channels.

Second, utility leaders need to take action now. Addressing cyber and supply chain infiltration risks to power infrastructure is not only a job for cybersecurity professionals and government officials, nor can it wait until a geopolitical crisis or attack. Grid operators, supply-chain leaders, control system engineers, and procurement officials each have roles in ensuring resilience.

A range of actions can help mitigate risk. For example, contract language can clarify product security and transparency requirements. Steps can be taken to harden control system equipment and network pathways, particularly for China-sourced devices. And utilities should regularly and thoroughly test controls on vendors’ remote access to operational technology. More broadly, utilities should seek to de-risk: diversify suppliers before a crisis, keep targeted spares for the most critical equipment, and engineer by focusing on addressing high consequence events so the most important grid functions have robust fail-safe controls.

The third—and clearest—takeaway from our conversations in California was about the need for preparation rather than prediction or reaction. Regular, realistic, leadership-level tabletop exercises are the single best way to build discipline for the first forty-eight hours of a fast-moving event, especially since misinformation is likely to surge.

Tabletop exercises, long used by the US military and government as a low-cost way to improve preparedness for a high-intensity crisis or conflict, can serve the same purpose for the private sector. Comprehensive exercises expose single points of failure, validate who decides what, test communications, and force hard choices on where to deploy resources. They also create a common picture of risk and available response options that hold under pressure.

These issues have important implications for a broader audience, given the potential implications of energy disruptions for all aspects of the United States’ national security and economy. This basic three-point approach is simple and practical, even if implementing it while balancing other considerations will be complex for the industry:

  • Watch for indicators that geopolitical risks are rising;
  • Keep sharing and implementing best practices within the energy sector and with its partners to strengthen resilience; and
  • Run regular leadership-level tabletop exercises that simulate the key decisions that leaders in a vital sector will face in a geopolitical crisis.

Introducing this three-step approach into response systems and building on it will go a long way toward making sure that essential services stay running, even if a crisis erupts halfway around the world.


Victor Atkins is a nonresident fellow with the Indo-Pacific Security Initiative at the Atlantic Council’s Scowcroft Center for Strategy and Security, where he specializes in cyber intelligence, national security, and industrial cybersecurity issues. A former Department of Energy official, he served as deputy director for operations of its Cyber Intelligence Directorate, and after details to the National Security Council staff and US intelligence community. He is the director for critical infrastructure security consulting at 1898 & Co., part of Burns & McDonnell.

Markus Garlauskas is the director of the Indo-Pacific Security Initiative at the Atlantic Council’s Scowcroft Center for Strategy and Security. He is a former senior US government official with two decades of service as an intelligence officer and strategist, including twelve years stationed overseas in the region.

The Best Practices Forum that helped inform this analysis, and the authors’ participation in it, was hosted and sponsored by Burns & McDonnell. The event adhered to the Chatham House Rule to foster transparency, candor, and forward-thinking approaches. The views expressed here are the authors’ own.

The post US power utilities must prepare for a crisis in the Indo-Pacific. Here’s how they can start. appeared first on Atlantic Council.

]]>
Russia’s advance on Pokrovsk exposes Ukraine’s growing manpower crisis https://www.atlanticcouncil.org/blogs/ukrainealert/russias-advance-on-pokrovsk-exposes-ukraines-growing-manpower-crisis/ Thu, 30 Oct 2025 21:25:28 +0000 https://www.atlanticcouncil.org/?p=884728 As Russian troops close in on the strategically crucial city of Pokrovsk in eastern Ukraine, Kyiv’s growing manpower shortages are becoming increasingly apparent, writes Peter Dickinson.

The post Russia’s advance on Pokrovsk exposes Ukraine’s growing manpower crisis appeared first on Atlantic Council.

]]>
As the Russian army closes in on the strategically crucial city of Pokrovsk in eastern Ukraine, Kyiv’s growing manpower shortages are becoming more and more apparent. Ukrainian President Volodymyr Zelenskyy stated this week that Ukrainian troops on the Pokrovsk front are currently outnumbered eight to one by Russian forces, highlighting the scale of the problem. After three and a half years of heroic and exceptionally bloody resistance, the fear is that Ukraine may now be approaching the point when the country no longer has enough fighters to effectively defend the full length of the front lines in Europe’s largest war since World War II.

Ukraine’s mobilization challenges are no secret and have been steadily mounting for much of the war. During the initial days of the full-scale invasion in early 2022, an unprecedented flood of volunteers made it possible to dramatically expand the size of the Ukrainian armed forces to around one million troops. However, as the conflict has dragged on into a fourth year amid consistently high casualty rates and escalating problems with desertion, this initial flow has slowed to a relative trickle. Individual units have responded by launching their own slick advertising campaigns to attract fresh recruits, while military mobilization officials have become notorious for dragging eligible men off the streets straight to military bases.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

The mobilization issue has been exacerbated by President Zelenskyy’s reluctance to lower the age for compulsory military service from twenty-five to eighteen. This has led to criticism from Ukraine’s Western partners, who have argued that it is unrealistic to wage a major war while exempting so many young Ukrainians from mobilization. Rather than take the politically dangerous decision to reduce the conscription age, Zelenskyy has backed an incentive scheme to attract volunteers in the eighteen to twenty-five age bracket. However, the initiative has so far failed to fill the gaps in Ukraine’s decimated front line units.

The recent decision to lift international travel restrictions on young Ukrainian men aged eighteen to twenty-two has further complicated Ukraine’s manpower problems. Around 100,000 Ukrainian males have left the country since restrictions were eased around two months ago, Britain’s Daily Telegraph reports. This exodus deprives the country of potential future army recruits and has created a range of more immediate personnel issues that are already reverberating throughout the Ukrainian economy. While some of these men may plan on returning to Ukraine, experience since 2022 suggests that many will seek to settle elsewhere in the European Union.

Moscow is also facing difficulties replenishing its invasion force amid catastrophic losses in Ukraine that dwarf the death toll from every other Kremlin war since 1945. Putin initially sought to address this problem by launching a partial mobilization in September 2022, but the move proved hugely unpopular and led to around one million young Russians fleeing the country. Instead, the Kremlin has introduced a system a lavish financial incentives including huge enlistment bounties and generous monthly salaries in order to attract volunteers willing to join the invasion of Ukraine. While it has proved necessary to repeatedly increase the sums on offer, this approach has made it possible to secure around thirty thousand new recruits per month.

Based on the current trajectory of the war, Russia’s manpower advantage over Ukraine will only grow wider during the coming year. This is already making itself on the battlefield, with Russian forces exploiting gaps in Ukraine’s defenses along the more than one thousand kilometers of front line and edging forward at multiple points. While Putin’s troops have so far been unable to achieve any major breakthroughs, Russia’s territorial gains are slowly but surely adding up.

The most intensive fighting is currently taking place in the Donetsk region as Russia seeks to complete the capture of Pokrovsk. If Putin’s commanders succeed in taking the city, it will be seen by many as vindication of the Kremlin strategy to grind out victory by relying on the sheer size of the Russian army. Putin has long believed that he can win the war by outlasting the West and overwhelming Ukraine. He will view Kyiv’s increasingly evident infantry shortage as a strong indication that time is on his side.

For Zelenskyy, there are no easy options. Lowering the mobilization age would generate a new wave of recruits but could also pose a significant threat to Ukrainian national morale. Reforming the terms of military service to provide greater rotation guarantees while also adopting a more meritocratic approach to the appointment of army commanders may help restore flagging public confidence and attract more volunteers, but this would take time that Ukraine quite frankly no longer possesses.

For now, the battle-hardened but exhausted and outnumbered Ukrainian army has little choice but to remain in a defensive posture. Ukraine’s commanders must be prepared to cede ground when necessary in order to preserve precious fighting strength, while looking for opportunities to maximize enemy casualties. The goal should be to withstand the Russian onslaught until a combination of punishing front line losses, escalating long-range strikes inside Russia, and deepening economic woes finally forces Putin to the negotiating table.

Peter Dickinson is editor of the Atlantic Council’s UkraineAlert service.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values, and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia, and Central Asia in the East.

Follow us on social media
and support our work

The post Russia’s advance on Pokrovsk exposes Ukraine’s growing manpower crisis appeared first on Atlantic Council.

]]>
Wieslander interviewed in Al Jazeera https://www.atlanticcouncil.org/insight-impact/in-the-news/wieslander-interviewed-in-al-jazeera/ Tue, 28 Oct 2025 02:28:00 +0000 https://www.atlanticcouncil.org/?p=884487 Director for Northern Europe, Anna Wieslander, was interviewed October 27 in an Al Jazeera article on Russian hybrid warfare against European countries. Wieslander warns that the goal of the hybrid warfare is to exhaust Europe towards being “more recipient towards the final goal that Russia has for Europe, which is a division again into spheres […]

The post Wieslander interviewed in Al Jazeera appeared first on Atlantic Council.

]]>

Director for Northern Europe, Anna Wieslander, was interviewed October 27 in an Al Jazeera article on Russian hybrid warfare against European countries.

Wieslander warns that the goal of the hybrid warfare is to exhaust Europe towards being “more recipient towards the final goal that Russia has for Europe, which is a division again into spheres of interest”.

There is currently no coordinated policy for European countermeasures against Russian hybrid warfare, and Wieslander calls for tougher and more coordinated countermeasures against the shadow fleet and on a much lager scale.


The post Wieslander interviewed in Al Jazeera appeared first on Atlantic Council.

]]>
How the US and Europe can deter and respond to Russia’s chemical, biological, and nuclear threats https://www.atlanticcouncil.org/in-depth-research-reports/report/how-the-us-and-europe-can-deter-and-respond-to-russias-chemical-biological-and-nuclear-threats/ Wed, 15 Oct 2025 19:19:48 +0000 https://www.atlanticcouncil.org/?p=879392 A willingness to use chemical weapons has long been a feature of Russian aggression, on the battlefield in Ukraine and on the streets of Europe. Will Russia escalate to the use of biological weapons? And what about the country’s nuclear saber-rattling? An in-depth study of how Russia uses these threats calls for a strong NATO response.

The post How the US and Europe can deter and respond to Russia’s chemical, biological, and nuclear threats appeared first on Atlantic Council.

]]>

Table of contents

Key findings

  1. Russia will likely continue using chemical weapons in Europe in a range of scenarios over the next five to ten years, particularly if doing so undermines Alliance unity and disrupts Ukraine’s integration into the West. Based on its recent behavior, however, Russia appears less likely to use biological weapons. Furthermore, while Russia has threatened nuclear use, a large-scale nuclear attack appears unlikely.
  2. To credibly deter Russia from nuclear escalation, the United States and its European allies and partners must ensure that Russia understands that using—or threatening to use—chemical and biological weapons would both fail to achieve its intended outcome and incur intolerable costs.
  3. Since the end of the Cold War, CBRN (chemical, biological, radiological, and nuclear) defense has been deprioritized among NATO allies, including the United States. Amid calls for increased defense spending, CBRN defense capability development is an area primed for greater investment.
  4. The United States should leverage NATO to facilitate greater coordination between civilian and military entities to enhance whole-of-society resilience to CBRN threats. 
  5. Information and intelligence sharing is critical to achieving a common threat perception among NATO allies and partners. Expanded information sharing and effective strategic communications can deter Russian use of chemical or biological weapons and ensure a coordinated response if deterrence fails. 
  6. The United States and its European allies and partners should take steps to raise the public IQ related to CBRN threats, particularly as it pertains to chemical and biological threats.
  7. The governance of emerging and applied technologies is difficult within the bounds of existing treaty regimes. Sanctions and export controls can complement treaty organizations to monitor and contain potential CBRN threats from such technologies, including dual-use systems and components.

Introduction

This report presents the findings and recommendations of the Atlantic Council project, Sustaining Allied Responses to the Threat of Russian Chemical, Biological, Radiological, and Nuclear (CBRN) Escalation. The objective of the project was to analyze the prospects for Russian use of chemical or biological weapons specifically in Europe over the next five to ten years; identify how the United States and its European allies and partners could deter and prevent Russian use of these weapons in Europe; and, should deterrence fail, assess response options.

Background

Russia has a well-established and clearly demonstrated strategic objective of undermining stability in the Euro-Atlantic region to reverse its loss of status following the end of the Cold War.1 This strategy is characterized by hostility toward the United States and its allies and partners in Europe.2

Over recent years, Russia has demonstrated its intent to provoke instability in Europe by acting with malign aggression that is both overt and hybrid in nature. The starkest example of Russia’s revanchist aggression is its full-scale illegal invasion of Ukraine, launched in 2022. Russia has also been conducting hybrid attacks—hostile activities using tools of statecraft below the threshold of conventional warfare to shift the balance of power in its favor—against the United States and its allies in Europe.3

A willingness to use chemical weapons has long been a feature of Russian aggression, both on the battlefield in Ukraine (specifically chloropicrin), and on the streets of Europe.4 As a result, Russia was described as “the most acute nuclear, biological, and chemical threat in the near-term” in the United States’ 2023 Strategy to Counter Weapons of Mass Destruction.5 This parallels the same terminology used in the 2022 National Defense Strategy and 2022 National Security Strategy.6 Undermining the cohesion of the United States and its NATO allies is a core goal of Russia’s political and military strategy. The Kremlin has shown that it is willing to use, or threaten to use, whatever capabilities it possesses, including CBRN weapons, to achieve this goal.

Research question

Our primary research question was, “What are the prospects for Russian use of chemical or biological weapons in Europe over the next five to ten years, and how can the United States and its European allies and partners counter such threats?” To address this question, the project team examined the following:

  • In what scenarios might Russia use its arsenal of chemical and biological capabilities to achieve its geopolitical goals in the five-to-ten-year time frame? What developments in European security more broadly over the same period would increase or decrease the risk of Russian use of chemical or biological weapons?
  • How might the United States and its European allies and partners enhance their overall defense and deterrence posture to reduce the risk of potential chemical or biological weapons use in the next five to ten years?
  • How can the United States work with European allies and partners to coordinate and standardize comprehensive responses to the potential deployment of Russian chemical and biological weapons?
  • To what extent could Russian use of chemical or biological weapons in Europe escalate further to the use of nuclear weapons, and how can the United States work with its European allies and partners to reduce the risk of escalation?

Key findings summary

Our project illuminated several findings for US and European decision-makers:

  • Russia will likely continue using chemical weapons in Europe in a range of scenarios over the next five to ten years, particularly if doing so undermines Alliance unity and disrupts Ukraine’s integration into the West. Based on its recent behavior, however, Russia appears less likely to use biological weapons. Furthermore, while Russia has threatened nuclear use, a large-scale nuclear attack appears unlikely.
  • To credibly deter Russia from nuclear escalation, the United States and its European allies and partners must ensure that Russia understands that using—or threatening to use—chemical and biological weapons would both fail to achieve its intended outcome and incur intolerable costs.
  • Since the end of the Cold War, CBRN defense has been deprioritized among NATO allies, including the United States. Amid calls for increased defense spending, CBRN defense capability development is an area primed for greater investment.
  • The United States should leverage NATO to facilitate greater coordination between civilian and military entities to enhance whole-of-society resilience to CBRN threats.
  • Information and intelligence sharing is critical to achieving a common threat perception among NATO allies and partners. Expanded information sharing and effective strategic communications can deter Russian use of chemical or biological weapons and ensure a coordinated response if deterrence fails.
  • The United States and its European allies and partners should take steps to raise the public IQ related to CBRN threats, particularly as it pertains to chemical and biological threats.
  • The governance of emerging and applied technologies is difficult within the bounds of existing treaty regimes. Sanctions and export controls can complement treaty organizations to monitor and contain potential CBRN threats from such technologies, including dual-use systems and components.
Ground crew in protective gear decontaminate an aircraft as part of NATO’s efforts to prepare first responders to address CBRN incidents, September 15, 2013. NATO

Methodology

The project team adopted two principal research methods for this project: a series of scenario-based workshops and interviews with subject matter experts and officials from the United States, Europe, and NATO. The team also conducted secondary research to develop the workshop methodology and to corroborate information and insights gleaned during the workshops and interviews.

Scenario-based workshops

In January 2025, the project team convened experts and officials to take part in two scenario-based exercises. The first group, which was convened virtually, consisted of subject matter experts and researchers from the United States and Europe, while the second group (convened in hybrid format) consisted of officials from the United States, NATO, and European governments. See Appendixes B and C for more information about the participants and the methodology, respectively.

The project team created a plausible exploratory scenario in which tensions between Russia and the United States and its European allies and partners (primarily Ukraine) had grown over a five-year time frame. The scenario provided a framework for participants to consider the key questions of Russian strategic intent, and implications for allied deterrence and responses to Russian aggression.

The workshops presented two scenarios in the year 2030: one in which Russia carried out a chemical attack against NATO allies based in Ukraine, and one in which Russia carried out targeted biological attacks against allied officials in Europe. These attacks concerned low-level use of chemical and biological agents, rather than major battlefield use of such weapons. Thus, the focus was on how Russia might use these capabilities to test escalatory dynamics, rather than to achieve major military objectives. The workshops divided participants into two groups; each group focused on either the chemical or biological scenario. The workshops primarily asked participants to analyze why Russia might consider the use of chemical or biological weapons strategically advantageous in these scenarios; propose how to deter Russia from further use of chemical and biological weapons; and recommend how the United States and Europe should respond to Russia’s use of such weapons. The two groups reconvened after the exercise to share key findings from their discussions.

Interviews with officials and experts

Informed by the insights from the workshops, the project team conducted interviews with US, European, and NATO officials and experts. The interviews provided direct perspectives on the potential for Russian CBRN escalation over the next five to ten years and how the alliance can deter and respond to possible Russian chemical and biological escalation. The interview stage also enabled the project team to explore the additional question of nuclear escalation following Russia’s potential use of chemical or biological weapons.

The following report presents our analysis of Russia’s intent to use CBRN weapons, possible deterrence considerations to be employed by the United States and its European allies and partners, and response options for the United States and Europe to respond should deterrence fail. The report concludes with our overall findings and recommendations.

Part I: Russian intent

Vladimir Putin described the breakup of the Soviet Union as “the greatest geopolitical catastrophe of the 20th century.”7 NATO’s 2022 Strategic Concept makes clear that Putin’s ambition to reverse the outcome of the Cold War is at the heart of Russia’s efforts to reestablish spheres of influence and direct control over its former Soviet empire, including NATO allies.8 Russia’s hostile actions seek to undermine the rules-based international order that defines the worldview of NATO and its members.9

At the 2007 Munich Security Conference, Putin signaled clearly to the world that he believed undermining the international rules-based system was necessary to carry out his revanchist ambitions.10 Russia has since demonstrated repeatedly that it is willing to use violent and aggressive means to further this ambition. This includes conventional military aggression, as demonstrated by Russia’s 2008 invasion of Georgia, 2014 annexation of Crimea, and 2022 full-scale invasion of Ukraine.11

Russia’s hybrid campaign of aggression

In addition to conventional military aggression, Russia’s campaign has included a well-documented and long-running “shadow war” of hybrid tactics against NATO and its allies.12 This hybrid campaign has included critical infrastructure attacks, acts of violence, weaponized migration, election interference, and information campaigns, which have intensified in volume since Russia’s full-scale invasion of Ukraine in 2022.13

The threat and the use of Russia’s CBRN capabilities has been a feature of Moscow’s hybrid campaign. In spite of the long-standing norms against using CBRN weapons, enshrined in international treaties and conventions, Russia has demonstrated that it is able and willing to deploy these weapons,14 including in NATO territory.15 Russia has also demonstrated a willingness to use chemical weapons during its illegal invasion of Ukraine and long supported the former Assad regime in Syria that used chemical weapons against civilians.16

The psychological value of chemical and biological weapons

For Russia, chemical and biological weapons have many potential uses and bring many advantages. At their most basic level, chemical and biological weapons, either in a battlefield scenario or a civilian context, are agents of terror. Several interviewees noted the Russian state employs these weapons—or threatens to—to instill fear in European populations and among Russian dissidents in exile.17 Russian willingness to use chemical weapons in this manner also sends a clear signal to the domestic Russian population about the Putin regime’s tolerance for any potential threats and challenges. A clear demonstration of this tactic was the 2020 Novichok poisoning of Russian opposition leader Alexei Navalny, which took place in Russia.18 While untested, it can be safely assumed that Putin would resort to extreme measures, including using CBRN weapons as necessary, to ensure the survival of his regime.

Some participants described public awareness in much of Europe about how chemical or biological weapons are used and the effects they can have as generally low. Those participants suggested that Russian use of CBRN weapons would be a means of causing widespread panic and manipulating emotions and public actions. The confusion they could potentially sow could create fertile ground for disinformation campaigns designed to undermine public trust in their governments.19 Such an attack could also expose frailties in broader social resilience in the target community.

Challenging norms–and NATO

Many participants in both the workshops and interviews reflected that a significant incentive for the use of chemical or biological weapons is to further degrade the broadly accepted international norms and standards in place since World War II. Russia’s documented use of chemical weapons sends a signal that it does not consider itself to be constrained by rules, norms, or obligations like other countries. It is an assertion that, as a supposed great power with an extensive and sophisticated CBRN toolbox (a legacy maintained from the Soviet era), and a permanent seat on the United Nations (UN) Security Council, Russia can act with relative impunity to flout and degrade the rules-based system that it opposes. Allies should continue to acknowledge and challenge this behavior, but more public reporting on Russian chemical and biological weapons and how they compare to restrictions outlined in the Chemical Weapons Convention (CWC) and Biological Weapons Convention (BWC) could improve awareness of Russia’s possible intent.

In more general terms, the actions of the Russian regime demonstrate that Russia places lower value on human life than the United States and its allies, whether that is of Ukrainian civilians, unwitting bystanders to Russian crimes, or its own military personnel.20 This cultural disregard for the suffering of even its own people affords Russia the space to conduct more reckless attacks and bear the subsequent consequences that the United States and its European allies and partners would not.

By their nature, different chemical and biological weapons have a broad range of properties, methods of delivery, rates of contagion, and lethality.21 While the CWC includes verification measures, the BWC does not. Participants noted that Russia could calibrate the nature, scale, and target of any chemical or biological weapon attack to create maximum uncertainty, exploit potential differences in threat perceptions and willingness to stand up against Russian aggression, and degrade international conventions. In many senses, the greater utility of chemical or biological weapons is not their lethality, but their impact on the adversary’s thinking. As one participant put it, “the intention isn’t to kill, but to complicate.”

This coercive element confers chemical and biological weapons and the range of effects they can create, with significant strategic value for Russia. Through the use (or threatened use) of different chemical or biological weapons in a range of scenarios, Russia might hope to influence allied decision-making and actions, such as potential Ukrainian integration into Western-oriented institutions. Participants observed that Russian use of chemical and biological weapons in these scenarios could be a means of Russia signaling that it considers the West has crossed its political red lines.

In a hypothetical battlefield context, the threat of chemical weapons use could limit the efficiency of allied military operations by imposing extra precautionary measures and influencing battlefield planning. In Iraq, the fear that Saddam Hussein could use chemical weapons degraded efficiency on the battlefield.22 After decades of underinvestment and neglect in the principles of operating in CBRN contaminated environments, Russia may be tempted to expose shortfalls in allied CBRN readiness on the battlefield.

For Russia, chemical and biological weapons serve an additional military function of making up for potential conventional military shortcomings. Where the Russians might be outmatched by NATO in conventional terms, unencumbered by moral or legal constraints, they might consider it a legitimate part of their doctrine to use asymmetric capabilities that can tilt the scales in their favor.23 Participants in our exercises speculated that the likelihood of Russia resorting to chemical or biological weapons would increase should Russia face imminent conventional defeat on the battlefield, either against Ukraine or NATO. This assumption is supported by the 2024 change in Russian nuclear doctrine, which lowered the threshold for first use of nuclear weapons to a new, lower standard.24

A Dutch Air Force F-35 fighter jet conducts air operations during exercise Steadfast Noon. Thirteen NATO allies participated in NATO’s annual nuclear deterrence exercise in 2024. October 21, 2024. NATO

The escalatory dilemma

Russia’s recent changes to its military doctrine, and the potential use of chemical and biological weapons either in civilian or battlefield contexts, must be considered within the framework of political and military escalation.25 Several interviewees noted that, because these are weapons that NATO allies do not and would not use, Russia’s previous use of chemical weapons and potential willingness to turn to biological weapons give the Kremlin an extra rung on the escalatory ladder.

Unlike nuclear escalation—which is well-studied, more clearly defined, and more widely considered taboo in the case of first-use of nuclear weapons—the escalatory dynamics of chemical and biological weapons use are more ambiguous and less certain. The scale and severity of chemical or biological weapon use could be calibrated to avoid crossing an obvious threshold that demands a military response, while at the same time clearly crossing a normative line that NATO allies would not cross, all the while posing a difficult conundrum about the appropriate and proportionate response.

Additionally, the dual-use nature of many of these chemical or biological agents (which may have legitimate and peaceful origins and uses) makes attribution challenging and presents sufficient deniability. This makes it difficult to establish clear lines of acceptable use and potentially hampers efforts to cohere a forceful and united response. At the same time, it allows Russia to simultaneously send a message of intent to allies and sow further confusion and distrust, while mostly avoiding (or limiting) punishment. In short, per one workshop participant, “it helps Russia to establish escalation dominance without committing to war.”

However, in many discussions throughout the project, there was considerable uncertainty over whether and how escalation to chemical and biological weapons use would increase the subsequent prospects of nuclear escalation. While many participants recognized that Russia’s willingness to disregard norms when it comes to chemical weapons in particular could logically lead to nuclear escalation and that Russia had invoked rhetoric around nuclear weapons use in recent years, participants agreed that taboos around nuclear weapons use exert more of a constraining force on Russia. Several participants noted the reported influence that China and India were able to wield against Russia in October 2022 to help de-escalate Moscow’s nuclear rhetoric at the time.26

Participants noted that where chemical or biological weapons can be deployed in such a way as to sow confusion and inject escalatory ambiguity, the line that nuclear weapons use would cross is much more definitive. No participants envisaged these scenarios escalating to the use of nuclear weapons unless Putin felt it was the last and only option for his personal survival.

Part II: Deterrence

As outlined above, Russia has and could continue to use chemical or biological weapons depending on the state of its conventional capabilities. The United States and its European allies and partners play a crucial role in deterring Russia from using any CBRN weapon. It is therefore critical to consider the scenarios in which Russia might turn to such weapons. Russia might even assume that previous responses to chemical attacks give them scope to escalate to larger-scale strategic weapons.27

For deterrence to be effective, like-minded nations must make clear that they are prepared to impose intolerable costs (economic, geopolitical, or military) on Russia should it use chemical or biological weapons, while also maintaining some ambiguity as to the exact nature of a response. Demonstrations of intelligence sharing among allies to present a unified threat assessment may clarify how the United States observes the Russian threat in the CBRN domain. Given how critical it is for civilian institutions to be integrated in the response to a potential CBRN attack, particularly related to chemical and biological threats, a whole-of-government approach to deterrence is essential for how the United States and its European allies and partners should position themselves vis-à-vis Russia. Outside-the-box thinking around potential partners and nontraditional allies may also aid in strengthening deterrence. The following takeaways emerged from our analysis, including discussions with key stakeholders in the United States and Europe.

Deterrence can yield powerful results

Deterrence by punishment would be harder to inflict if Russia were to use a chemical or biological weapon, given that there would not be a proportional response.28 However, the United States and Europe still have options for precise, measured, and consequential actions. Workshop participants agreed that specific actions or escalation using CBRN threats from Russia would have severe consequences warranting a response, including stringent economic sanctions, diplomatic pressure campaigns, and, in some instances, retaliatory military strikes. With the nuclear deterrent as the foundation for any response from the United States (alongside that of the United Kingdom and France), any threat of retaliation against Russia will be stronger.29 In addition, the United States and European countries could implement measures such as export controls, sanctions, international condemnation, or stationing NATO troops closer to Russia’s borders to deter Russian CBRN use.

Participants reflected that the most likely scenario in which Russia would turn to CBRN threats would include hybrid attacks on the United States and Europe. Deterrence of such threats remains a “riddle” as one interviewee put it, where more degrees of ambiguity are present that do not apply to conventional (or nuclear) escalation. When approaching the more tactical use of chemical or biological weapons, there is more opaqueness given the dual-purpose nature of substances, technologies, and delivery systems. Workshop participants did not come to consensus on how the United States and its European allies should view (or respond to) such threats within the hybrid domain or at the tactical applications of chemical or biological weapons.

The role of attribution in deterring CBRN use

During the workshops and interviews, participants continuously reiterated that attribution is critical to deterring Russian chemical and biological threats and holding Russia accountable for past use of chemical weapons. Intelligence and information sharing play an important role in attribution. One interviewee remarked that Russia may think twice about staging chemical and biological attacks if there is more publicly available information about their chemical and biological capabilities, facilities, and deployment means.

However, timely technical collection and forensic analysis capabilities are lacking among NATO allies, leading to questions about the accuracy and reliability of attributing attacks. Several existing capabilities—including detection, intelligence, and surveillance systems—could prevent escalation with chemical and biological weapons, but these systems are not well resourced across the Alliance. Many NATO member states lack adequate expertise in sample collection, robust laboratory infrastructure, and the requisite instruments to conduct analysis, all of which impede attribution.

Some participants we spoke to, particularly on NATO’s eastern flank, reflected on a need to strengthen intelligence, monitoring, and detection capabilities to improve their overall deterrence and response posture. Investment in capabilities to investigate and attribute attacks could prevent Russian escalation. For attribution to be effective, the United States and European allies and partners must also possess a shared understanding of indicators and warning signals ahead of an attack.

Russian President Vladimir Putin conducts an exercise of Russia’s strategic nuclear deterrence forces in Moscow via video conference. Putin approved Russia’s new nuclear doctrine in 2024. Mikhail Metzel/Reuters

Preparedness and resilience are essential

Participants described the need for the United States and its European allies and partners to limit the consequences of Russian chemical and biological attacks. The notion of “deterrence by resilience” or “deterrence by preparedness” (a subcategory of the broader notion of “deterrence by denial”) is one paradigm for thinking of how the United States could successfully prevent Russia from turning to chemical or biological weapons. The following considerations came up most frequently as areas for investment.

Capability development and deployment

Allied military representatives broadly agreed that CBRN-related equipment—either related to attribution (including detection and surveillance systems) or response (such as decontamination or personal protective equipment [PPE])—is often overlooked in favor of high-caliber defense systems. Counter-CBRN capabilities are frequently considered too niche for broader collective defense.

Investment in CBRN defense capabilities, discussed further in the response section of this report, provides a deterrent signal in addition to preparing allies to fight through a chemical or biological attack. However, nearly everyone we interviewed recognized that these capabilities are often siloed to specialist forces and not broadly integrated within general purpose forces. Ministries of defense across the Alliance should set baselines for CBRN defense-capability targets, including PPE, gas masks, and treatment, across the total force and resource these priorities accordingly.

Exercises and training

Regular and comprehensive exercises that incorporate a variety of US and European military forces would underpin an effective deterrence strategy toward Russia. Some participants described the importance of joint training among special operations forces (SOF) that might be equipped to respond to chemical and biological weapons use. Components of these exercises should be incorporated into broader training, which can enable preparedness in times of crisis. Participants pointed to several preexisting multinational exercises as examples to demonstrate readiness to deter CBRN escalation.30

Other training—including tabletop exercises and war-games—can be deployed to help decision-makers design more effective standards to aid and inform how the United States and its European allies and partners can deter potential Russian use of CBRN threats. Tabletop exercises and war-games leveraged by the Pentagon and DTRA with their European counterparts can be used to strengthen strategic and operational thinking about how to deter Russian escalation by providing opportunities to try new approaches under the guidance of expert facilitators.

Whole-of-society resilience

To be effective, deterrence by resilience must incorporate all facets of society to respond to instances of crisis or threats.31 To deter potential CBRN threats through preparedness, European allies and partners must warn the public, without fear-mongering, of the risk of escalation. Several participants noted the importance of preparing populations to withstand and defy threats from Russia, which includes activating and sustaining civilian institutions such as hospitals that would treat those affected by a chemical or biological attack. As part of a whole-of-society approach, greater awareness of chemical and biological threats is needed; public health personnel, first responders, law enforcement, teachers, and others ought to understand the effects of chemical and biological agents and how to respond appropriately. Similar to the military, civilian agencies should procure and maintain CBRN defense capabilities to protect and treat civilian populations in the event of a chemical or biological attack.

One phrase that is often repeated in expert circles is “raising the IQ” on nuclear threats. This concept applies to chemical and biological threats as well so that more individuals are cognizant of their scale and severity. Mental and emotional preparedness would enable the public to resist Russian efforts and contain the potential consequences associated with a Russian attack. Demonstrating societal resilience, in which wider social and civil functions can withstand CBRN escalation, could deter Russia from employing CBRN weapons.

Wielding the information space

Russia consistently utilizes the information space to instill fear, distrust, and confusion.32 In addition to responding to these types of stories with clear, fact-based information that demonstrates why Russian claims are false, the United States and its European allies and partners can also pre-bunk and dispel any false or misleading claims that Russia produces about CBRN-related threats. Participants pointed to the importance of sharing proactive messages about resistance to such narratives through a variety of means—including traditional media, official government communications, and social media—to dissuade Russian perpetrators from deploying attacks. Eye-catching social media posts and multimedia tools can extend reach to nontraditional communities to help dispel Russian claims. As one participant noted, winning the information war must be combined with the requisite military power and civilian capability to deter Russia.

Be cautious of setting red lines

While US and European officials must be clear about the consequences of escalation, interviewees resisted establishing so-called red lines that are overly specific. Many interviewees pointed to the infamous case of the Obama administration’s supposed red lines regarding Syria’s use of chemical weapons during its civil war in the 2010s. Such thresholds, which may be politically sensitive to apply, would leave the international community in a difficult position with respect to enforcement or punishment, which could undermine the credibility of deterrence.

Participants called instead for political rhetoric to be vague externally, where Russia and its allies would have difficulty determining the threshold for response, while being precise internally about the consequences of Russia’s actions. This distinction would provide space for the United States and its European allies and partners to determine the requisite response to CBRN threats stemming from Russia.

Diplomacy as a deterrent

Russia finds itself somewhat isolated in the current geopolitical environment. However, the Kremlin frequently looks to several nations—including China, Iran, and North Korea—to bolster Russia’s defense. These relationships could provide options to engage non-European nations to deter Russia from CBRN escalation. For example, China reportedly engaged Russia to discourage the use of nuclear weapons in Ukraine and the deployment of nuclear weapons in space.33 Given the degree to which Russia depends on China to prop up its wartime economy, there may be an opportunity to leverage China to dissuade Russia from turning to CBRN escalation, particularly if China upholds international regimes regarding CBRN use.34 India may also be able to influence Russia given its role in supporting Russia’s economic stability amid Western sanctions and may have sway in discouraging CBRN escalation.

A CBRN specialist trains in the Czech Republic as part of the CORONAT MASK 2024 training. More than 800 CBRN specialists from 13 NATO nations participated to exercise collective CBRN capabilities. June 24, 2024. US European Command

Part III: Response

The results of our workshops, interviews, and secondary research illuminated opportunities to enhance US and European responses to a CBRN attack should deterrence fail. Given its role in coordinating allied planning, NATO will be a critical actor in any response effort. Our discussions with NATO and European officials revealed consistent, close cooperation among military elements at NATO, while understanding that support required from civilian entities is a more nascent effort. However, the mandate for responding to a CBRN incident typically falls within the civilian sectors of many European governments, so political-military coordination is essential to ensuring all facets of government are aware of their roles in the event of a CBRN attack. Enhancing cooperation to promote coordinated responses includes the following best practices.

Ensure broad awareness of CBRN threats

Allies we interviewed broadly agreed that awareness of Russian CBRN threats cannot only reside within the specialist communities at NATO or in national militaries. At the political level, there is general agreement at NATO and within European capitals that Russia’s CBRN threats are an immediate concern. However, it is less clear how much allies are willing to invest to counter these threats, both now and in the five-to-ten-year time frame. Those geographically closest to Russia were most acutely aware of the threats and adamant about engaging with NATO allies via training, exercises, and exchanges to ensure active cooperation.

Variations in threat perception also appeared to be generational, according to our discussions. For example, officers who have served since the end of the Cold War described a lack of investment in CBRN defense in the absence of acute Soviet chemical, biological, and nuclear threats. The perception of such threats was lower in the post-Cold War era, which led the United States and Europe to deprioritize investment in preparedness. Given Russia’s continued flouting of international norms against the use of chemical weapons, and the primacy of nuclear warfare in its military doctrine, US, NATO, and European leaders need to uphold what they have recognized in recent strategic guidance as a critical threat emanating from Russia and invest in their forces accordingly.

Expand CBRN training to the total force

Training is an area that appears ripe for further investment. European military leaders we interviewed agreed that expertise cannot reside in the CBRN specialist communities alone. General purpose forces must also be trained on CBRN threats and equipped to fight through contaminated environments. To ensure broader awareness of CBRN threats, NATO and national military exercises should include elements of chemical, biological, or limited nuclear use scenarios. Military and civilian leaders we interviewed recognized the drawbacks of having personnel exercise in restrictive protective gear, given how it can slow maneuver, but it also puts troops at a disadvantage if they need to operate wearing the gear in a real-time scenario without much experience. NATO’s CBRN-focused exercises, described in the previous section, are an important step toward ensuring interoperability among NATO forces, but these lessons can be expanded beyond CBRN defense units to include NATO SOF and other elements of NATO’s deployable forces.

Better integrate military and civilian components

Apart from military preparedness, it is critical for national military and NATO elements to understand the capacity of civilian institutions, as first responders will have the authority for coordinating a response to incidents that occur outside of military operations. During the workshops and the interviews, participants expressed the need for greater integration of civilian and military personnel on topics such as decontamination and training, which necessitates the ability to share information between sectors.

Civilian institutions also play a critical role in responding to chemical and biological incidents, which could include attacks. Preparedness within national, subnational, and local institutions—including, for example, hospitals, research laboratories, public health institutions, law enforcement agencies, manufacturing facilities, and entities managing critical infrastructure—are essential to ensuring readiness for potential chemical and biological attacks. Civilian institutions could be underprepared for the crisis operations that would be required in the event of a chemical or biological attack. Better coordination with military counterparts can bridge these gaps to ensure a whole-of-society response to potential attacks, which also has an important deterrent effect when highlighted via strategic communications campaigns.

The European Union can play a role in fostering greater access to critical resources, such as PPE and laboratory equipment, particularly in times of crisis where traditional processes are too slow. The European External Action Service, which is the EU’s diplomatic service, has long partnered with NATO to ensure mutual understanding of threats and how to best prepare NATO allies and EU member states for possible CBRN attacks with information and tangible assets.35 This relationship is vital to ensure stronger political-military coordination and should be expanded to account for greater CBRN-related cooperation.

Leverage NATO for coordination and capabilities

NATO’s 2022 CBRN defense policy represented a shift from the focus on weapons of mass destruction (WMD) terrorism of the early 2000s to a state-based threat actor that more closely aligns with the modern security environment.36 NATO’s International Staff is overseeing the implementation of this policy, which is critical to ensure guidance flows to capitals so national authorities can promote a consistent approach. A response aligned with NATO demonstrates unity, which in turn demonstrates alliance cohesion in the face of continued Russian threats. Several NATO allies, including the United States, UK, and Finland, have their own national policies, but for those that do not, the NATO policy provides a roadmap for driving national prioritization of CBRN threats and response options for these threats aligned with NATO’s priorities.37

As NATO allies consider greater thresholds for defense spending, more investment is needed in CBRN defense equipment and capabilities. An essential aspect of capability development is deploying and positioning of attribution, detection, and surveillance systems. NATO is well poised to lead collaborative efforts and ensure that states without adequate CBRN defenses learn from leaders in the field. NATO’s High Visibility Projects (HVP) includes three initiatives to improve cooperation around facilities, equipment, and detection.38 CBRN defense projects have also been part of NATO’s Smart Defence Initiative since 2014.39

Consider the information domain

As noted in the deterrence section, proactive communication about military and civilian activities to safeguard the entire population from a CBRN attack serves an important deterrent function while bolstering societal resilience. Effective use of the information domain is equally critical to reassuring the public regarding CBRN responses.

States can disseminate proactive messages to get ahead of any false or misleading information that Russia may seek to inject within open societies. This includes emphasis on strategic communications, fact-checking initiatives, media literacy, and education campaigns for adults and children alike.

The health sector can offer lessons in disseminating information about emotionally sensitive topics in a way that recognizes the severity of a threat without stoking fear. For example, the UK Health Service launched a public health campaign in 2025 to counter fears of taking antibiotics, which has become a top issue among UK residents.40 Similar approaches can be taken to inform the public about chloropicrin or other agents Russia has used. Such communications should focus on facts, and in the realm of CBRN weapons, be clear about the rare and limited nature of exposure to such threats so as not to provoke undue stress or fear.

Integrating deterrence and response

Through the course of our research, we identified two activities that served both deterrent and response functions. First, being clear and unafraid of imposing massive costs to Russia (including economic, geopolitical, or military actions) for its use of chemical weapons could deter it from continuing to deploy chemical weapons or prevent escalation. Accountability is also an important part of response. Since 2014, Russia has acted with impunity in the absence of credible deterrent threats to its use of chemical weapons. Although many countries and international organizations have condemned Russia’s use of chemical weapons and imposed sanctions on Moscow, these actions have not stopped Russia from using chemical agents to achieve geopolitical goals. The consensus during our workshops and interviews is that Russia has a long history of incorporating CBRN weapons into its strategy and planning, which makes them both a near-term threat and a long-term strategic threat. Bringing treaty violations forward has had limited impact on Russia’s behavior, but increasing economic sanctions could reduce Russian access to funding, equipment, facilities, and technologies that could advance their chemical and biological weapons ambitions.

Second, the United States and its European allies and partners should clearly communicate potential consequences to deter future actions and inflict damage on the sectors on which Russia relies on for the development of its chemical and biological capabilities. The apparent threat of what a potential CBRN escalation would entail, including the diplomatic, informational, military, and economic implications, is essential for deterring Russia from turning to these threats, but following through on these actions also serves to punish Russia in response to its illicit activities.

Participants engage in a counter-CBRN defense training as part of a NATO-led exercise. 2025. NATO

Recommendations and key findings

Finding: Russia will likely continue using chemical weapons in Europe in a range of scenarios over the next five to ten years, particularly if doing so undermines Alliance unity and disrupts Ukraine’s integration into the West. Based on its recent behavior, however, Russia appears less likely to use biological weapons. Furthermore, while Russia has threatened nuclear use, a large-scale nuclear attack appears unlikely.

Recommendation: Allies should continuously assess and evaluate Russia’s strategic objectives. To better coordinate threat perceptions across the Alliance, the United States and its European allies and partners should consider opportunities to expand collaboration on joint threat assessments related to Russia’s CBRN capabilities. As the Office of the Director of National Intelligence crafts the annual joint threat assessment report, insights from European allies and partners will be critical to assemble the most comprehensive picture of Russian CBRN threats; integrating perspectives from the Office of the NATO Assistant Secretary General for Intelligence and Security will be paramount in this effort.

Finding: To credibly deter Russia from nuclear escalation, the United States and its European allies and partners must ensure that Russia understands that using—or threatening to use—chemical and biological weapons would both fail to achieve its intended outcome and incur intolerable costs.

Recommendation: Instead of publicizing red lines, the United States should champion the achievement of internal consensus regarding acceptable thresholds of Russian activity based on treaty obligations, while externally preserving ambiguity as a component of deterrence. NATO, the Organisation for the Prohibition of Chemical Weapons (OPCW), and the United Nations are valuable forums for such deliberations and can play roles in imposing costs on Russia for CBRN use. However, internal debates within national governments are required to achieve consensus, which can take time. International investigations, such as those previously led in Syria by the OPCW (an intergovernmental body), are also time-consuming, and Russia politicizes the results to undermine effectiveness. Therefore, this recommendation could take years of sustained effort to carry out.

Recommendation: Within the United States, the Department of Defense (DoD) should work with the relevant authorities within the Treasury and Commerce departments to inflict the requisite economic pain on Russia through, for example, sanctions and export controls, to undermine its ability to sustain its biological and chemical weapons programs. Unified public messaging campaigns from the United States and Europe that condemn Russian CBRN weapons deployment would reinforce activities conducted behind the scenes.

Recommendation: The United States and its European allies and partners should identify methods for cooperation with nontraditional partners to dissuade Russia from leveraging CBRN threats as part of their military doctrine. Through NATO or the UN, the United States should explore opportunities to engage China and India to dissuade Moscow from pursuing further CBRN weapons development and use.

Finding: Since the end of the Cold War, CBRN defense has been deprioritized among NATO allies, including the United States. Amid calls for increased defense spending, CBRN defense capability development is an area primed for greater investment.

Recommendation: As concerns about potential deployment of Russian CBRN weapons grow, the US DoD should emphasize and prioritize efforts to expand counter-CBRN capabilities. Specific needs include sufficient systems to detect, surveil, and attribute CBRN threats. The United States could leverage the OPCW (and vice versa) for its experience in investigations. As the United States and its European allies and partners update guidelines for defense spending, CBRN defense warrants renewed attention and investment. The Office of the Secretary of Defense (OSD) should advocate for European counterparts to place greater emphasis on CBRN defense. The DoD and the relevant subagencies should emphasize these systems when outlining US defense policy and national security strategies as they pertain to CBRN threats. Such systems will aid in deterring Russian CBRN threats while expanding readiness, preparedness, and resilience within the United States and across the transatlantic community. Ministries of defense and crisis response agencies should set baselines for CBRN defense capabilities and stockpile accordingly, including PPE, gas masks, antibiotics, and laboratory equipment.

Recommendation: DTRA and the broader US defense community should expand training on CBRN threats by incorporating elements of chemical, biological, and nuclear warfare scenarios in tabletop exercises and war-games. Inclusion of these scenarios can complement crisis situations posited in Europe to identify deterrence strategies and response options. CBRN considerations are often perceived to be too niche and left to specialist communities to design strategy and crisis responses. However, it is critical for decision-makers within the entire chain of command to possess a broad awareness of CBRN threats and simulate planning. The Joint Staff should ensure that service-level training incorporates these considerations into doctrine and training. Then, DTRA’s liaison officers could support training at US military commands and within multilateral institutions, such as NATO.

Recommendation: The United States and its NATO allies should incorporate the NATO SOF Command more directly into operational planning, particularly when thinking through the requisite deterrence and response implications of Russia deploying a CBRN weapon. NATO’s Supreme Headquarters Allied Powers Europe (SHAPE) could help drive this coordination with support from the United States. Given the hybrid nature of many CBRN threats from Russia, within SHAPE and NATO Allied Command Operations (ACO), the United States and its NATO allies could consider a greater role for responding to hybrid threats alongside preexisting military structures. The US should expand CBRN defense cooperation, particularly on training, exercising, and information sharing. Elsewhere in Europe, allies recognized the leading role the United States plays (as well as the UK) in sharing intelligence with NATO; for allies with limited intelligence capabilities of their own, US information might be the only source of CBRN-related intelligence. Some allies expressed uncertainty over the prioritization of CBRN-related cooperation as a new administration begins its work in Washington, but at the individual level, cooperation remains close. NATO leaders should leverage productive working relationships to ensure sustained, coordinated prioritization for CBRN defense across all echelons of NATO planning.

Recommendation: As the need for additional CBRN defense capabilities and equipment grows, so too does the need to strengthen the private-sector capacity to supply the requisite functionalities. The US government should expand relationships with the defense industry and bolster production capacity to sustain supply chains and replenish depleted stockpiles of PPE. The DoD can also leverage lessons learned for production capacity and procurement protocols from the COVID-19 pandemic, when the Pentagon supported the production of PPE through the Defense Production Act to increase production of critical supplies and equipment. The DoD’s Office of the Under Secretary of Defense for Acquisition and Sustainment and the Defense Logistics Agency can both play an important role in facilitating these relationships while removing unnecessary barriers to procurement processes within the DoD. Similar efforts should be undertaken with European counterparts of these agencies and at NATO, though the implementation of this recommendation could require years of investment.

Finding: The United States should leverage NATO to facilitate greater coordination between civilian and military entities to enhance whole-of-society resilience to CBRN threats.

Recommendation: Demonstrating close cooperation between civilian and military entities can have a deterrent effect if communicated properly, while also ensuring military entities are aware of the resources that reside in civilian institutions. Key areas for investment include interoperability of CBRN defense equipment; standards and procedures for treating exposure to chemical or biological agents; availability of civilian infrastructure for military use; and protocols for military members seeking care in civilian hospitals. NATO is well poised to encourage cooperation between military forces and critical civilian institutions that are often on the front lines of such responses, including public health agencies, local hospitals, and law enforcement. European nations can leverage the examples of their peers to their advantage. In the United States, the DoD is well positioned to support interagency coordination among European allies and partners with respect to emergency preparedness mechanisms, capability development, and training. OSD should consider embedding highly skilled personnel within US military commands, diplomatic missions, and other frameworks to facilitate the exchange of information and expertise.

Recommendation: A whole-of-society approach to resilience—to include health institutions, law enforcement, critical infrastructure, business community, and other sectors—can help strengthen attribution systems for identifying and attributing chemical and biological attacks. The United States should coordinate with its European allies and partners to encourage greater resilience and preparedness within civilian institutions and foster information sharing across national borders.

Finding: Information and intelligence sharing is critical to achieving a common threat perception among NATO allies and partners. Expanded information sharing and effective strategic communications can deter Russian use of chemical or biological weapons and ensure a coordinated response if deterrence fails.

Recommendation: Preemptive and frequent intelligence sharing, in classified and open-source settings, is critical to deterring Russia from using CBRN weapons; this practice presents a unified approach among the United States and its European allies and partners. All allies should aim to more regularly share relevant information. The US national security apparatus should conduct a complete review of potential barriers to information and intelligence sharing to identify areas for streamlined sharing with NATO allies. The Defense Intelligence Agency could lead such an initiative on behalf of the DoD, with a focus on greater use of open-source intelligence to draw further public attention to Russia’s CBRN capabilities, facilities, and development. The United States should encourage similar reviews across NATO member states to improve Alliance-wide access to intelligence and information and ensure that this subject is a standing agenda item for the relevant NATO committees, including the Defense Policy and Planning Committee and the Civilian Intelligence Committee.

Recommendation: To support NATO’s 2022 CBRN Defense Strategy’s effort to improve shared understanding across the Alliance, more consistent and comprehensive messaging is needed within the capitals of NATO allies, particularly around the policy planning process and the integration of civilian entities within a coordinated military response in the event of a CBRN-related contingency. The US Mission to NATO can champion efforts to expand knowledge and understanding of Russian CBRN threats within NATO while sharing lessons learned from European allies and partners throughout the US government.

Finding: The United States and its European allies and partners should take steps to raise the public IQ related to CBRN threats, particularly as it pertains to chemical and biological threats.

Recommendation: The US Defense, State, and Homeland Security departments have produced public messaging campaigns related to Russian CBRN threats and methods to improve media literacy. These efforts should expand to include greater emphasis on debunking false and misleading claims related to CBRN threats. Additionally, the US government should incorporate European allies and partners in messaging efforts to counter Russian malign influence operations around CBRN threats.

Recommendation: The United States should work with European allies to identify best practices in crafting public awareness-raising campaigns for how to respond to suspected CBRN attacks. Public messaging should focus on practical steps individuals can take in an emergency, without prompting undue alarm among the wider population.

Recommendation: US and European governments should explore opportunities to partner with civil society organizations to craft prebunking, media literacy, and fact-checking initiatives that can successfully communicate proactive messaging to broader publics in the Euro-Atlantic area, particularly given the scientific and technical nature of CBRN threats. Proactive messages about resistance to Russian narratives should be disseminated through a combination of means, including traditional media, official government communications, and social media. The United States could also explore joint research initiatives with European institutions. EU member states can leverage the European Defense Fund, which provides research into common defense and security priorities, including in CBRN-related issues. Partnerships between universities, scientific foundations, and think tanks can facilitate greater knowledge and information sharing related to CBRN threats.

Finding: The governance of emerging and applied technologies is difficult within the bounds of existing treaty regimes. Sanctions and export controls can complement treaty organizations to monitor and contain potential CBRN threats from such technologies, including dual-use systems and components.

Recommendation: Technologies such as synthetic biology and additive manufacturing continue to evolve, and their applications will remain difficult to foresee. The international community must remain vigilant to how technologies can be exploited. To that end, the United States must continue and expand its restrictions for known suppliers of potential dual-use technologies to Russia. The DoD should coordinate with the Department of Commerce to expand the use of export controls to address instances where Russia is able to obtain capabilities and equipment, such as pharmaceutical components, biotechnologies, and chemical precursors. Critical to the success of these controls, however, is including like-minded European allies and partners into conversations about technologies of concern. The Department of Defense should work with the Department of Treasury’s Office of Foreign Assets Control to strengthen and expand the list of sanctioned entities that aid and abet Russia’s biological and chemical weapons development programs.

Conclusion

This project demonstrates that Russian chemical and biological threats are a concern now and will continue to pose challenges to European security in the next five to ten years. To enable European allies and partners to counter these threats, the United States can leverage its strong security and defense relationships with European allies and partners to improve capabilities and raise the profile of chemical and biological weapons issues within governments and among populations. The existing chemical and biological defense infrastructure in the United States, NATO, and in some European countries provides lessons for the broader Euro-Atlantic community. With greater investment comes greater confidence that deterring Russia is feasible, but if deterrence fails, attention now can ensure that the United States and Europe are prepared to effectively respond.

Please note that the appendixes are not included in the online version of this publication, but they can be accessed in the attached PDF file. The appendixes contain the following information: Appendix A – Acronym List; Appendix B – Workshop Participants; Appendix C – Exercise Methodology; Appendix D – Interview Participants; Appendix E – Biographies. These appendixes provide additional details and insights on the research methods and findings.


The research team thanks the US Department of Defense for sponsoring this work and for the guidance and support provided throughout the course of the project. Special thanks go to the wide range of experts and stakeholders, inside and outside of the US and European governments, who took part in the scenario-building exercises, contributed their perspectives during the interview process, spoke during roundtable discussions, and participated in other contexts to enrich the analysis.

We would also like to acknowledge Hans Binnendijk and John Watts for their support in conceptualizing the methodology and structure of the scenario workshop exercises. Hans and Katarzyna Zysk provided useful peer reviews to improve the quality of the report. In addition, we would like to thank Torrey Taussig and Matthew Kroenig, who offered strategic direction, peer review, and key perspectives throughout the project. Within the Atlantic Council’s Transatlantic Security Initiative team, we recognize our current and recent colleagues Inga Samoškaitė, Zak Schneider, Kristen Taylor, Kimberly Talley, and Luka Ignac for their project management and research support. We would also like to thank the Atlantic Council’s Gretchen Ehle, Nicholas O’Connell, and Caroline Simpson, whose support for this project was invaluable.

This report is intended to live up to General Brent Scowcroft’s standard for rigorous, relevant, and nonpartisan analysis on national security issues. The Atlantic Council’s Scowcroft Center for Strategy and Security works to continue his nonpartisan commitment to the cause of security, support for US leadership in cooperation with allies and partners, and dedication to the mentorship of the next generation of leaders.

The views expressed herein are those of the authors and do not necessarily reflect the official policy or position of the US Department of Defense or the United States Government.

About the authors

Related content

Explore the program

The Transatlantic Security Initiative aims to reinforce the strong and resilient transatlantic relationship that is prepared to deter and defend, succeed in strategic competition, and harness emerging capabilities to address future threats and opportunities.

1    Eugene Rumer and Richard Sokolsky, “Etched in Stone: Russian Strategic Culture and the Future of Transatlantic Security,” Carnegie Endowment for International Peace, September 2020, https://carnegieendowment.org/research/2020/09/etched-in-stone-russian-strategic-culture-and-the-future-of-transatlantic-security?lang=en
2    Robert Person and Michael McFaul, “What Putin Fears Most,” Journal of Democracy 33, no. 2 (2022): 18–27, https://www.journalofdemocracy.org/articles/what-putinfears-most/
3    Russia conceptualizes hybrid warfare—particularly in how it is deployed to subvert and undermine politics and security—much differently than the United States and Europe. See Seth G. Jones, “Russia’s Shadow War with the West,” Center for Strategic and International Studies, March 18, 2025, https://www.csis.org/analysis/russiasshadow-war-against-west
4    Russia has carried out attacks in London (2006), Sofia (2015), and Salisbury, United Kingdom (2018). See Mina Rozei, “US Accuses Russia of Chemical Weapons Use in Ukraine,” Arms Control Association, June 2024, https://www.armscontrol.org/act/2024-06/news/us-accuses-russia-chemical-weapons-use-ukraine; and “Novichok Nerve Agent Use in Salisbury: UK Government Response, March to April 2018,” UK Foreign & Commonwealth Office, Prime Minister’s Office, 10 Downing Street, Home Office, and Ministry of Defence, March 14, 2018, https://www.gov.uk/government/news/novichok-nerve-agent-use-in-salisbury-uk-government-response
5    “2023 Strategy for Countering Weapons of Mass Destruction,” US Department of Defense, Press Release, September 2023, https://www.defense.gov/News/Releases/Release/Article/3541619/dod-announces-release-of-2023-strategy-for-countering-weapons-of-mass-destructi/
6    See 2022 National Defense Strategy of the United States of America, US Department of Defense, 2022, https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.pdf; and US National Security Strategy, White House, October 2022, https://bidenwhitehouse.archives.gov/wpcontent/uploads/2022/10/Biden-Harris-Administrations-National-Security-Strategy-10.2022.pdf
7    Andrew Osborn and Andrey Ostroukh, “Putin Rues Soviet Collapse as Demise of Humanity,” Reuters, December 12, 2021, https://www.reuters.com/world/europe/putin-rues-soviet-collapse-demise-historical-russia-2021-12-12/
8    NATO’s 2022 Strategic Concept specifically mentions Russia will seek to exert power and control “through coercion, subversion, aggression and annexation” via conventional, cyber, and hybrid means. See “NATO 2022 Strategic Concept,” NATO, June 2022, https://www.nato.int/strategic-concept/
9    “NATO 2022 Strategic Concept,” NATO, June 2022, https://www.nato.int/strategic-concept/
10    Thom Shanker and Mark Landler, “Putin Says US Is Undermining Global Stability,” New York Times, February 11, 2007, https://www.nytimes.com/2007/02/11/world/europe/11munich.html
11    Ketevan Chincharadze and Larry P. Goodson, “The Enduring Impact of the 2008 Russia-Georgian War,” War Room, US Army War College, December 19, 2024, https://warroom.armywarcollege.edu/articles/enduring-impact/
12    “Hearing–Russia’s Shadow War on NATO,” US Commission on Security and Cooperation in Europe, September 24, 2024, https://www.csce.gov/press-releases/hearing-russias-shadow-war-on-nato/
13    For more, see “Spotlight on the Shadow War: Inside Russia’s Attacks on NATO Territory,” Commission on Security and Cooperation in Europe, US Helsinki Commission, December 12, 2024, https://www.csce.gov/publications/spotlight-on-the-shadow-war-inside-russias-attacks-on-nato-territory/; and Seth G. Jones, “Russia’s Shadow War with the West,” Center for Strategic and International Studies, March 18, 2025, https://www.csis.org/analysis/russias-shadow-war-against-west
14    For more information, see “Treaty on the Non-Proliferation of Nuclear Weapons (NPT),” United Nations, https://disarmament.unoda.org/wmd/nuclear/npt/; “Convention on the Prohibition of the Development, Production, and Stockpiling of Bacteriological (Biological) and Toxin Weapons and Their Destruction,” United Nations, https://treaties.unoda.org/t/bwc; “Chemical Weapons Convention,” Organization for the Prohibition of Chemical Weapons, https://www.opcw.org/chemical-weapons-convention; and Mathias Hammer, “The Collapse of Global Arms Control,” Time, November 13, 2023, https://time.com/6334258/putin-nuclear-arms-control/
15    Russia carried out CBRN-based attempted assassinations in the UK in 2006 and 2018 and is suspected of the 2015 assassination attempt against a Bulgarian arms dealer, Emilian Gebrev. See “Russia Behind Litvinenko Murder, Rules European Rights Court,” BBC, September 21, 2021, https://www.bbc.com/news/world-58637572; “Statement by the North Atlantic Council on the Use of a Nerve Agent in Salisbury,” NATO, March 14, 2018, https://www.nato.int/cps/en/natohq/news_152787.htm; and Krassen Nikolov, “Bulgaria Seeks Extradition of Three Spies from Russia in Novichok Case,” Euractiv, November 21, 2023, https://www.euractiv.com/section/politics/news/bulgaria-seeks-extradition-of-three-spies-from-russia-in-novichok-case/
16    See “OPCW Finds Toxic Chemical Use in Ukraine,” Arms Control Association, December 2024, https://www.armscontrol.org/act/2024-12/news-briefs/opcw-findstoxic-chemical-use-ukraine; and Kenneth D. Ward, “Syria, Russia, and the Global Chemical Weapons Crisis,” Arms Control Association, September 2021, https://www.armscontrol.org/act/2021-09/features/syria-russia-and-global-chemical-weapons-crisis
17    One subject matter expert interviewed for the project noted that “some of [Russia’s strategic motivation] is about showing reach into Western Europe and that they can get to us. Some of it is a fear element for dissident populations, and to show that we have a range of stuff that you might not know about and we’re not afraid to use it.”
18    “Putin’s Poisons: 2020 Attack on Aleksey Navalny,” US Embassy in Georgia, April 18, 2022, https://ge.usembassy.gov/putins-poisons-2020-attack-on-aleksey-navalny/
19    Michael J. Kelley, “Understanding Russian Disinformation and How the Joint Force Can Address It,” US Army War College, May 29, 2024, https://publications.armywarcollege.edu/News/Display/Article/3789933/understanding-russian-disinformation-and-how-the-joint-force-can-address-it/
20    For more, see Olha Polishchuk and Nichita Gurcov, “Bombing into Submission: Russian Targeting of Civilians and Infrastructure in Ukraine,” Armed Conflict Location and Event Data, February 21, 2025, https://acleddata.com/2025/02/21/bombing-into-submission-russian-targeting-of-civilians-and-infrastructure-in-ukraine/; “Litvinenko: Images of Radiation Trail Revealed,” SkyNews, January 27, 2015, https://news.sky.com/story/litvinenko-images-of-radiation-trail-revealed-10373703; and Alexey Kovalev, “Putin Is Throwing Human Waves at Ukraine but Can’t Do It Forever,” Foreign Policy, November 25, 2024, https://foreignpolicy.com/2024/11/25/russia-ukrainewar-casualties-deaths-losses-soldiers-killed-meatgrinder-attacks/
21    Gert G. Harigel, “Chemical and Biological Weapons: Use in Warfare, Impact on Society and Environment,” Carnegie Endowment for International Peace, January 18, 2001, https://carnegieendowment.org/research/2001/01/introduction-to-chemical-and-biological-weapons
22    Major General Robert D. Orton and Major Robert C. Neumann, “The Impact of Weapons of Mass Destruction on Battlefield Operations,” Army University Press: Military Review, December 1993, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/January-February-2022/Orton-Impact-WMD-1993/
23    From the Russian doctrine: “The Russian Federation reserves the right to use nuclear weapons in response to the use of nuclear and other types of weapons of mass destruction against it and (or) its allies, as well as in response to large-scale aggression utilizing conventional weapons in situations critical to the national security of the Russian Federation.” (italics added for emphasis). See George Allison, “NATO Outmatches Russia in ‘Every Domain Except Nuclear,’” UK Defense Journal, December 6, 2024, https://ukdefencejournal.org.uk/nato-outmatches-russia-in-every-domain-except-nuclear/
24    Escalation can be defined as “an increase in the intensity or scope of conflict that crosses threshold(s) considered significant by one or more of the participants. For more, see “Russia’s Military Doctrine,” Arms Control Association, May 2005, https://www.armscontrol.org/act/2000-05/russias-military-doctrine
25    Forrest E. Morgan et al., “The Nature of Escalation,” in Dangerous Thresholds: Managing Escalation in the 21st Century (Santa Monica, CA: RAND Corporation, 2008), 7–46, https://www.jstor.org/stable/10.7249/mg614af.9
26    Jim Sciutto, “Exclusive: US Prepared ‘Rigorously’ for Potential Russian Nuclear Strike in Ukraine in Late 2022, Officials Say,” CNN, March 9, 2024, https://www.cnn.com/2024/03/09/politics/us-prepared-rigorously-potential-russian-nuclear-strike-ukraine/index.html
27    Natasha Hall and Doreen Horschig, “Reviving Chemical Weapons Accountability in a Multipolar World,” Center for Strategic and International Studies, November 21, 2024, https://www.csis.org/analysis/reviving-chemical-weapons-accountability-multipolar-world
28    There is wide body of literature on deterrence, including varying definitions of types of deterrence. We use Michael J. Mazarr’s definitions of deterrence by punishment. Deterrence by punishment involves the threat of “severe penalties, such as nuclear escalation or severe economic sanctions if an attack occurs.” For more, see Michael J. Mazarr, “Understanding Deterrence,” RAND Corporation, 2018, https://www.rand.org/pubs/perspectives/PE295.html
29    Similarly, the concept of extended deterrence includes the discouragement of the use of nuclear weapons against an ally or partner nation of the United States from an adversary in which the threat of retaliation from the United States extends protection. The United States and the United Kingdom provide extended deterrence for NATO allies. It is important to note that France, another NATO ally and nuclear-capable state, does not contribute to NATO’s nuclear defense. See Mazarr, “Understanding Deterrence.”
30    Such exercises include the 2022 Toxic Valley training led by Slovakia and the 2024 Coronat Mask training led by the Czech Republic. See “International Exercise of Chemical Units CORONAT MASK 2024 Will Take Place Again After Years,” CZ Defence, May 18, 2024, https://www.czdefence.com/article/international-exercise-of-chemical-units-coronat-mask-2024-will-take-place-again-after-years
31    A whole-of-society approach includes integrating the “full range of military and civilian capabilities” with cooperation from government, civil society, and private sector stakeholders. For more, see “Resilience, Civil Preparedness, and Article 3,” NATO, November 13, 2024, https://www.nato.int/cps/en/natohq/topics_132722.htm
32    The Kremlin has a long history of accusing the United States and European nations of biological weapons development and nuclear expansion as cover for its own activities. See Sarah Jacobs Gamberini and Justin Anderson, “Russian and Other (Dis)Information Undermining WMD Arms Control: Considerations for NATO,” NATO Committee on Proliferation, Speech presented to the NATO Committee on Proliferation, July 12, 2022, https://wmdcenter.ndu.edu/Publications/Article/3768119/presentation-russian-and-other-disinformation-undermining-wmd-arms-control-cons/
33    Demetri Sevastopulo, “Antony Blinken: ‘China has Been Trying to Have It Both Ways,’” Financial Times, January 3, 2025, https://www.ft.com/content/25798b9f-1ad9-4f7f-ab9e-d6f36bbe3edf
34    Patricia M. Kim et al., “China and Russia’s Strategic Relationship amid a Shifting Geopolitical Landscape,” Brookings Institution, March 6, 2025, https://www.brookings.edu/articles/china-and-russias-strategic-relationship-amid-a-shifting-geopolitical-landscape/
35    “EU-NATO Cooperation,” European External Action Service, March 26, 2022, https://www.eeas.europa.eu/eeas/eu-nato-cooperation-0_en
36    For more, see NATO’s CBRN defense policy: “NATO’s Chemical, Biological, Radiological and Nuclear (CBRN) Defence Policy,” NATO, last updated July 5, 2022, https://www.nato.int/cps/en/natohq/official_texts_197768.htm
37    For more, see “CBRNE Strategy 2024,” Ministry of Defense of the Republic of Finland, December 11, 2024, https://julkaisut.valtioneuvosto.fi/handle/10024/165973; “2023 Strategy for Countering Weapons of Mass Destruction,” US Department of Defense, September 2023, https://www.defense.gov/News/Releases/Release/Article/3541619/dod-announces-release-of-2023-strategy-for-countering-weapons-of-mass-destructi/; “Allied Joint Doctrine for Countering Weapons of Mass Destruction in Military Operations (AJP-3.23),” Ministry of Defense of the United Kingdom, September 28, 2023, https://www.gov.uk/government/publications/allied-joint-doctrine-for-countering-weapons-of-mass-destruction-in-military-operations-ajp-323; and “NATO’s Chemical, Biological, Radiological and Nuclear (CBRN) Defence Policy,” NATO.
38    “Multinational Capability Cooperation,” NATO, March 3, 2025, https://www.nato.int/cps/en/natohq/topics_163289.htm
40    “UKHSA Launches Campaign to Tackle Misconceptions on Antibiotics,” UK Health Security Agency, April 7, 2025, https://www.gov.uk/government/news/ukhsa-launches-campaign-to-tackle-misconceptions-on-antibiotics

The post How the US and Europe can deter and respond to Russia’s chemical, biological, and nuclear threats appeared first on Atlantic Council.

]]>
Ackerman discusses service member culture in The Free Press https://www.atlanticcouncil.org/insight-impact/in-the-news/ackerman-discusses-service-member-culture-in-the-free-press/ Thu, 02 Oct 2025 13:57:24 +0000 https://www.atlanticcouncil.org/?p=878767 On September 30, Forward Defense non-resident senior fellow Elliot Ackerman authored an article in The Free Press entitled "Pete Hegseth Wants a ‘Warrior Culture.’ Does He Know What That Means?," in which he discusses Secretary Hegseth's changes to service member culture.

The post Ackerman discusses service member culture in The Free Press appeared first on Atlantic Council.

]]>

On September 30,  Forward Defense nonresident senior fellow Elliot Ackerman authored an article in The Free Press entitled “Pete Hegseth Wants a ‘Warrior Culture.’ Does He Know What That Means?,” in which he discusses Secretary Hegseth’s changes to service member culture.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Ackerman discusses service member culture in The Free Press appeared first on Atlantic Council.

]]>
Rich Outzen joins TRT to discuss Trump Administration foreign and national security policies https://www.atlanticcouncil.org/insight-impact/in-the-news/rich-outzen-joins-trt-to-discuss-trump-administration-foreign-and-national-security-policies/ Sat, 27 Sep 2025 12:52:17 +0000 https://www.atlanticcouncil.org/?p=881520 The post Rich Outzen joins TRT to discuss Trump Administration foreign and national security policies appeared first on Atlantic Council.

]]>

The post Rich Outzen joins TRT to discuss Trump Administration foreign and national security policies appeared first on Atlantic Council.

]]>
Daniels weighs the consequences of the US-China AI Race on Network 20/20 https://www.atlanticcouncil.org/insight-impact/in-the-news/daniels-weighs-the-consequences-of-the-us-china-ai-race-on-network-20-20/ Thu, 25 Sep 2025 14:57:20 +0000 https://www.atlanticcouncil.org/?p=877151 On September 17, Forward Defense nonresident senior fellow Owen Daniels was featured on the Network 20/20 Virtual Briefing Series alongside Janet Egan and Sam Winter-Levy.

The post Daniels weighs the consequences of the US-China AI Race on Network 20/20 appeared first on Atlantic Council.

]]>

On September 17, Forward Defense nonresident senior fellow Owen Daniels was featured on the Network 20/20 Virtual Briefing Series alongside Janet Egan and Sam Winter-Levy. The panelists discussed the ramifications and strategic implications of the US-China AI race and China’s rapid progress in AI development.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Daniels weighs the consequences of the US-China AI Race on Network 20/20 appeared first on Atlantic Council.

]]>
What we can learn from Tibetan and Ukrainian freedom fighters https://www.atlanticcouncil.org/blogs/ukrainealert/what-we-can-learn-from-tibetan-and-ukrainian-freedom-fighters/ Wed, 24 Sep 2025 14:33:34 +0000 https://www.atlanticcouncil.org/?p=876812 Nolan Peterson reflects on his experience embedded in the Tibetan and Ukrainian freedom struggles as he has sought to understand how these two nations summoned the will to defy the empires that meant to destroy them.

The post What we can learn from Tibetan and Ukrainian freedom fighters appeared first on Atlantic Council.

]]>
About two months before a mortar killed him, 19-year-old Ukrainian soldier Daniel shared a cigarette with me in a trench in eastern Ukraine. On that hot June afternoon, with small arms fire rattling in the background, he told me why he’d volunteered to go to war. “We are fighting for our homes and for our land,” he said. “Ukraine is a free country, and when Russia invaded I had no other choice. I had to fight.”

Four months later, 77-year-old Jampa Choejor offered me a cup of masala chai at his home in the Jampaling Tibetan refugee settlement outside of Pokhara, Nepal. I was still slightly amped from the motorcycle ride it took to get there, an hour-long slalom course dodging cows and overloaded buses amid the free-for-all chaos of Nepal’s rural roads. As we sat with legs folded on yak skin blankets and sipped our tea, Choejor, a former Buddhist monk, explained his decision decades earlier to join Tibet’s guerrilla war against the Chinese invaders.

“When the Chinese came, they bullied, they killed,” Choejor said of China’s invasion of Tibet in the 1950s. “There was no freedom, no religion. After so many brutal acts, there was no way to stay silent. We couldn’t stay living like that. We suffered. But there was no other choice. We had to fight back.”

When it comes to their culture, history, and geography, Tibet and Ukraine appear to have few things in common. But scratch beneath the surface and you’ll find many surprising similarities, including the fact that when neighboring empires invaded their homelands, the Tibetan and Ukrainian nations summoned a devotion to their freedom and an unbreakable will to fight for it.

Beginning in the mid-1950s, Tibetan irregulars fought a decades-long insurgency against China’s occupation. It wasn’t until 1974, and at the Dalai Lama’s request, that they finally laid down their arms. The legacy of this armed resistance continues to inspire generations of Tibetans, both inside Tibet and in exile, to resist Chinese oppression in other, non-violent ways.

Likewise, Russia’s invasion of eastern Ukraine in 2014 spurred a nationwide resistance movement to take root, paving the way for Ukraine’s remarkable stand in February 2022. After more than three and a half years of full-scale war, Ukraine’s will to resist remains unbroken.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.


I’ve spent the past thirteen years embedded in the Tibetan and Ukrainian freedom struggles, wanting to understand how these two nations summoned the will to defy the empires that meant to destroy them. This quest has taken me to the ends of the earth and to the extremes of the human experience. I dodged Russian snipers on Ukraine’s battlefields and crossed remote Himalayan passes that soar as high as jetliners fly.

Along the way, I met Ukrainian university students who adapted small commercial drones to kill their Russian enemies, and shared tea with Tibetan monks and nomads who had fought on horseback, armed with swords and World War I-era rifles, against China’s mechanized invasion. Throughout it all, I’ve been consistently surprised by all the similarities these two stories share.

Whether I was talking to a 20-year-old Ukrainian soldier or an 80-year-old Tibetan veteran, I kept hearing the same humble explanations for their actions, such as the shared sentiment that they had “no other choice.” For many of those I have met, going to war for their homeland’s freedom wasn’t really a decision at all. It was automatic and instinctual, like an immune system response. Their country was invaded and innocent people were dying, so they had to fight. Simple as that.

Ukrainian soldier Denys put it to me like this: “Wars aren’t won by surrendering. You have to fight. If you don’t fight, you won’t be supported by anyone. Because it’s your own freedom and you have to fight for it.”

Kelsang Tsering, a former Buddhist monk who served in the Tibetan resistance from 1955 to 1974, had a similarly matter-of-fact explanation for his decision to resist China’s occupation. “I saw what China was doing in Tibet and it made me so angry, I had to fight,” he said.

Tsering and I spoke over tea one evening at his home in a Nepalese refugee settlement. A flickering fluorescent lamp lit the room. A picture of the Dalai Lama hung on the wall. Tsering’s wife sat on the floor, legs folded, spinning a prayer wheel while she chanted a Buddhist mantra. I asked Tsering if it was difficult for him to take a life in combat, given that he was once a Buddhist monk who eschewed all violence, even the killing of an insect.

“In the beginning, I was thinking we were monks, and so we shouldn’t kill,” he answered. “But when I recalled all the abuses, all the terrible things the Chinese did, I forgot my hesitation. After seeing so many bad things, I forgot that killing was a sin.”

Such moral certitude echoes what I’ve heard from many Ukrainians. “The Russians came to our country and killed our people. It’s our country, our land, our families. For us, it’s very clear. We kill them, or they kill us,” a Ukrainian special operations soldier named Serhii told me.

China and Russia are on the march against the US-led world order. Yet, the way I see it, America’s military might isn’t the only obstacle holding these aggressive, wannabe empires at bay.

By refusing to surrender their identities and submit to imperial rule, the Tibetan and Ukrainian nations defy the fantasies of civilizational greatness, detached from historical reality, that the Chinese and Russian regimes depend on for their domestic legitimacy. The authoritarians in Beijing and Moscow see such expressions of independence and self-determination as existential threats to their grip on power. Their retaliation has been brutal.

Russia launched its disastrous full-scale invasion in 2022 to destroy the Ukrainian state and extinguish Ukraine’s national identity entirely. China, for its part, has spent decades trying to erase Tibet’s culture and ethnicity. Today, after seventy-five years of occupation, Tibet is a nightmarish Gestapo state for the Tibetans living there, a chilling portent of what Ukrainians are fighting to prevent from happening in their homeland.

The irony, of course, is that the Ukrainian and Tibetan nations are more unified today than they ever were prior to being invaded. Rather than break Ukraine’s spirit, each new Russian atrocity reinforces the resolve of the Ukrainian population to resist. As for Tibetans, a people once divided by regional dialects and cultures, they’ve now coalesced around a single version of their language and national identity, at the heart of which is their universal devotion to the Dalai Lama.

The price of freedom is set by those who wish to destroy it. And yet, as the Dalai Lama said in a speech not long after the Soviet Union collapsed, “brute force, no matter how strongly applied, can never subdue the basic human desire for freedom.” In today’s troubled world, that’s a message worth remembering.

Nolan Peterson is a nonresident senior fellow at the Atlantic Council’s Eurasia Center and a former US Air Force Special Operations pilot.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values, and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia, and Central Asia in the East.

Follow us on social media
and support our work

The post What we can learn from Tibetan and Ukrainian freedom fighters appeared first on Atlantic Council.

]]>
Michta published in RealClearDefense on the next U.S. National Security Strategy https://www.atlanticcouncil.org/insight-impact/in-the-news/michta-published-in-realcleardefense-on-the-next-u-s-national-security-strategy/ Mon, 22 Sep 2025 12:00:00 +0000 https://www.atlanticcouncil.org/?p=878217 On September 22, 2025, Andrew Michta, nonresident senior fellow in the GeoStrategy Initiative, was published in RealClearDefense. He argues that the next U.S. National Security Strategy risks misreading history again.

The post Michta published in RealClearDefense on the next U.S. National Security Strategy appeared first on Atlantic Council.

]]>

On September 22, 2025, Andrew Michta, nonresident senior fellow in the GeoStrategy Initiative, was published in RealClearDefense. He argues that the next U.S. National Security Strategy risks misreading history again.

America’s current and future strategic choices are being impacted by a misreading of the drivers of state behavior, as well as the degree to which Washington can shape the global systemic transformation lurking over the horizon.

Andrew Michta

The post Michta published in RealClearDefense on the next U.S. National Security Strategy appeared first on Atlantic Council.

]]>
How Israel’s strike on Doha is forcing a Gulf security reckoning https://www.atlanticcouncil.org/blogs/menasource/how-israels-strike-on-doha-is-forcing-a-gulf-security-reckoning/ Fri, 19 Sep 2025 18:12:19 +0000 https://www.atlanticcouncil.org/?p=875956 The Gulf monarchies have displayed strong unity at a time when rethinking twenty-first-century Gulf security is no longer optional.

The post How Israel’s strike on Doha is forcing a Gulf security reckoning appeared first on Atlantic Council.

]]>
Israel’s September 9 military strike on Qatar marks a major escalation in regional tensions and presents Doha with an urgent new security dilemma. For Qatar, the attack raises fears of joining a growing list of Arab states that have been subjected to Israeli military aggression. Although the strike targeted Qatar specifically, the other Gulf Cooperation Council (GCC) members have interpreted it as a broader threat to all of them. In response, the incident is catalyzing greater unity and coordination among the six Gulf monarchies, whose threat perceptions of Israel have reached new heights this month.

This unity was on display when the President of the United Arab Emirates (UAE), Mohammed bin Zayed, arrived in Doha one day after the attack, and Saudi Crown Prince and Prime Minister Mohammed bin Salman condemned Israel’s “brutal aggression” against Qatar and vowed that Riyadh would stand with Doha “without limit.” Such solidarity speaks volumes about how much intra-GCC dynamics have changed since the Emirati and Saudi-led blockade of Qatar, which ended less than five years ago.

Beyond the GCC, leaders and representatives from across the Arab-Islamic world convened in Doha on September 15 for an emergency summit organized by the Arab League and the Organization of Islamic Cooperation. Together, they issued a unified condemnation of Israel’s strike on Qatar. In his address, Emir Sheikh Tamim bin Hamad Al Thani warned of Prime Minister Benjamin Netanyahu’s expansionist ambitions, calling the notion of turning the Arab world into “an Israeli sphere of influence” a “dangerous illusion.”

US security guarantees under scrutiny

U.S. President Donald Trump and Crown Prince of Abu Dhabi Sheikh Khaled bin Mohamed bin Zayed Al Nahyan attend a business forum at Qasr Al Watan during the final stop of his Gulf visit, in Abu Dhabi, United Arab Emirates, May 16, 2025. REUTERS/Amr Alfiky

For decades, Gulf governments have depended on the United States as their primary security guarantor, particularly against Iran and Ba’athist Iraq. However, a series of US foreign policy decisions in the twenty-first century—including Washington’s response to the 2010–11 Arab Spring, the 2015 Iran nuclear deal, and its limited reaction to the 2019 attacks on Saudi Aramco and the 2022 Houthi strikes on Abu Dhabi—have, to varying degrees, gradually eroded Gulf states’ confidence in America’s commitment to their security. Israel’s recent military strike on Qatar, however, brought those concerns to the forefront, sharply intensifying doubts among Gulf monarchies about the reliability of the US security umbrella.

As CNN and Axios have reported, US and Israeli officials claim that Netanyahu notified the Trump administration prior to the launch of this operation. If true, this contradicts the White House’s claims that the notification only came after Israel’s military launched the missiles at Doha. Nonetheless, Trump responded to Israel’s bombing of Qatar by referring to the Gulf country as a “great ally” and warned Netanyahu’s government to be “very careful.”

Regardless of the timing and which version of events is accurate, Doha’s key lesson is that the American security umbrella failed to prevent this unprecedented attack from occurring. Given that Qatar has hosted the US Central Command’s forward headquarters at al-Udeid Air Base for over two decades and was designated a Major Non-NATO Ally in 2022, Doha is now questioning what these aspects of its defense partnership with Washington truly mean in practice if Washington permits (or at least fails to prevent) an Israeli strike on Qatari territory.

Smoke rises after several blasts were heard in Doha, Qatar, September 9, 2025. REUTERS/Ibraheem Abu Mustafa

This incident has also prompted similar concerns among other GCC members, who are now asking what protections, if any, they have that Qatar did not. If Israel is willing to carry out such an operation with apparent impunity, what would stop it from targeting individuals deemed “terrorists” by its government elsewhere in the Gulf—such as a Houthi representative based in Muscat?

SIGN UP FOR THIS WEEK IN THE MIDEAST NEWSLETTER

Against the backdrop of Israel’s increasingly assertive regional posture—including its strike on Doha, the June attack on Iran that launched the Twelve Day War, ongoing military operations against the Houthis in Yemen, and frequent airstrikes across Syria since last year’s fall of Bashar al-Assad’s regime—the GCC states are finding themselves more closely aligned in their threat perceptions. As each of the six monarchies pursues ambitious economic development and diversification agendas, regional stability has become a shared strategic imperative. Attracting investors, business leaders, and tourists depends on maintaining a secure environment—not just within their own borders, but across the broader region. From the Gulf’s perspective, Israel’s actions are casting a long shadow over the viability of these visions for economic transformation.

In this context, it was unsurprising that Gulf leaders swiftly condemned Israel’s strike on Qatar and expressed unequivocal solidarity with Doha. For all six monarchies, the imperative is clear: to signal that such acts of aggression must not be normalized or allowed to become a precedent. While Israeli airstrikes in Lebanon, Syria, the Palestinian territories, and Yemen have become routine, Gulf states are united in their determination to prevent any GCC member from being added to that list. There is a growing consensus across the Gulf that Israel must face consequences for its actions to deter any future attacks on Gulf monarchies.

Gulf options

Lacking the military capacity to respond directly to Israel, GCC states are compelled to explore alternative, non-military options. Chief among these is the strategic use of their close relationship with US President Donald Trump and key figures within his administration. Gulf leaders are likely to press Washington to exert its considerable leverage over Israel to prevent any future attacks on a GCC member. Aware of the Trump administration’s reliance on the Gulf monarchies for advancing US economic, geopolitical, and security objectives, these states possess diplomatic and economic levers that could be employed skillfully.

Given the UAE’s status as the Gulf state with the closest ties to Israel, Doha and possibly other GCC capitals are quietly encouraging Abu Dhabi to reassess its relations with Tel Aviv. Although a full abrogation of the Abraham Accords in response to the September 9 Israeli strike on Qatar remains unlikely at this point, Emirati officials may consider recalibrating bilateral ties to convey that aggression against any GCC member carries consequences. Even if short of abrogating the Abraham Accords, Abu Dhabi and Manama could expel ambassadors, downgrade diplomatic relations (as the UAE did with Iran in January 2016), or decrease their public engagement with Israel. Looking ahead, should Israel continue to act with impunity and Washington fail to restrain its behavior, Abu Dhabi could retain its option to withdraw from the Abraham Accords altogether as a form of leverage. Nonetheless, aside from strong rhetoric condemning the attack on Doha, so far the UAE’s only diplomatic action in response to Israel’s bombing of its fellow GCC state has been to summon the deputy Israeli ambassador to Abu Dhabi.

Ultimately, GCC members face an inflection point as they grapple with new regional realities. Israel’s willingness to strike a Gulf state and Washington’s tacit acquiescence have exposed a critical vulnerability in the Gulf’s longstanding reliance on the United States as its principal security guarantor. Should further Israeli attacks occur, Gulf leaders will be confronted with the challenge of managing a growing security threat absent the protective umbrella they have long depended on. With no alternative global or regional power both capable and willing to replace Washington in this role, the Gulf monarchies may be increasingly driven to deepen intra-GCC defense coordination and revive aspirations for a more autonomous, NATO-style security framework. Developing robust missile defense systems and credible deterrent capabilities will require time and sustained investment. Yet, this trajectory appears increasingly necessary.

In parallel, Gulf states are likely to expand strategic partnerships with Pakistan and Turkey. Both of these countries have their own vested interests in preserving Gulf security and sovereignty amid an increasingly assertive Israeli posture and perceived US disengagement. Just eight days after the Israeli attack on Doha, Saudi Arabia and Pakistan signed a defense treaty, which puts the Kingdom under Islamabad’s security umbrella. This is particularly relevant given Pakistan’s increasingly grave concerns about an Israeli-Indian nexus within the context of the armed conflict between Islamabad and New Delhi earlier this year, as well as Turkey’s perception of a growing Israeli threat in Syria.

Iran can be counted on to opportunistically seize this moment to capitalize on its Arab neighbors’ growing distrust of Washington and try to bring Tehran closer to Doha and other GCC capitals. Although it is extremely doubtful that the fallout from this Israeli strike on Qatar will lead to any major GCC-wide pivot toward Iran as a security partner, Tehran will be positioned to gain in mostly symbolic ways while advancing its anti-Israeli rhetoric and narrative of standing with other Muslim-majority nations in opposing Israel.

In sum, while the precise trajectory of GCC responses remains uncertain, Israel’s strike has served as a shock, compelling all six members to re-examine long-standing assumptions about the reliability of their US security guarantor. In its wake, the Gulf monarchies have displayed strong unity at a time when rethinking twenty-first-century Gulf security is no longer optional. Whether through greater intra-GCC coordination, diversification of external partnerships, or renewed efforts toward strategic autonomy, the region now stands at a critical juncture—one that will shape the contours of Gulf security for years to come.

Giorgio Cafiero is the CEO of Gulf State Analytics, a Washington, DC-based geopolitical risk consultancy. He is also an Adjunct Assistant Professor at Georgetown University.

The post How Israel’s strike on Doha is forcing a Gulf security reckoning appeared first on Atlantic Council.

]]>
Wieslander on Swedish radio https://www.atlanticcouncil.org/insight-impact/in-the-news/wieslander-on-swedish-radio-3/ Thu, 11 Sep 2025 07:43:19 +0000 https://www.atlanticcouncil.org/?p=873929 Director for Northern Europe Anna Wieslander has featured on Swedish radio September 10 & 11 following the news of NATO forces shooting down Russian drones over Poland and commented on the NATO response and reactions from world leaders. September 10, Wieslander says that “it was about time NATO reacted in such a way” and continues […]

The post Wieslander on Swedish radio appeared first on Atlantic Council.

]]>

Director for Northern Europe Anna Wieslander has featured on Swedish radio September 10 & 11 following the news of NATO forces shooting down Russian drones over Poland and commented on the NATO response and reactions from world leaders.

September 10, Wieslander says that “it was about time NATO reacted in such a way” and continues to say that Russia is testing the responses and resolve of the alliance. The NATO response was “absolutely necessary” deems Wieslander.

September 11, Wieslander also comments on the absent US response to the incident, saying that it is “curious” that neither the President nor any secretary in the administration has condemned Russia’s actions.

Listen to the features here:

The post Wieslander on Swedish radio appeared first on Atlantic Council.

]]>
Rubio’s visit to Mexico and Ecuador shows the need for US security cooperation runs deeper than warships in the Caribbean https://www.atlanticcouncil.org/blogs/new-atlanticist/rubios-visit-to-mexico-and-ecuador-shows-the-need-for-us-security-cooperation-runs-deeper-than-warships-in-the-caribbean/ Fri, 05 Sep 2025 19:31:14 +0000 https://www.atlanticcouncil.org/?p=872464 US counternarcotics operations in the Caribbean are only one aspect of how Washington can build security ties with Latin American partners.

The post Rubio’s visit to Mexico and Ecuador shows the need for US security cooperation runs deeper than warships in the Caribbean appeared first on Atlantic Council.

]]>
This week, US Secretary of State Marco Rubio wrapped up a much-anticipated visit to Mexico and Ecuador, where security was the centerpiece. The trip was bookended by two dramatic events not far away: It began hours after the US military blew up a vessel in international waters in the Caribbean on Tuesday, and it ended at about the same time Venezuelan jets buzzed US Navy ships on Thursday night.

As the drama swirled, Rubio’s visit was an opportunity to consolidate long-term trust, cooperation, and collaboration with the United States’ partners in Mexico City and Quito. This and earlier trips to the region by the US secretary of state are part of a larger effort by Trump administration, which seeks to tie shared security together with enhanced prosperity for the Western Hemisphere. While progress is being made, the months and years to come will reveal whether this approach can overcome the region’s entrenched challenges.

A new implementation group in Mexico

In Mexico, President Claudia Sheinbaum and her cabinet welcomed deeper security cooperation with the United States while her secretary for foreign affairs, Juan Ramón de la Fuente, emphasized Mexican sovereignty and respect for territorial integrity during the joint press conference. Mexican officials stated clearly that each country must act against targets within their own borders. This emphasis on sovereignty should be seen in part as an attempt to shut down speculation by some that the United States might take unilateral action, including strikes against US-listed foreign terrorist organizations or other groups in Mexico.

Perhaps the biggest, most tangible announcement that came out of Palacio Nacional was the creation of a high-level implementation group to follow up on security commitments between the United States and Mexico. These commitments include coordinating joint operations against drug, arms, and human trafficking; overseeing efforts to dismantle cross-border tunnels and illicit financial networks; and designing rapid-response protocols for emerging threats. The new group is designed to give structure and permanence to bilateral security cooperation, and it will bring together senior US and Mexican officials from security, foreign affairs, and intelligence agencies. With the ability to spin off specialized subcommittees on issues such as fentanyl, firearms, and border infrastructure, the group will in effect act as a secretariat for security cooperation, with clear accountability built in through periodic progress reports to both governments. This marks an important step forward for cooperation between the United States and Mexico.

New security funding for Ecuador

Ecuador was once touted as one of the safest countries the region, but violence has increased in recent years. With five thousand murders this year as of July, the country’s homicide rate has increased by 40 percent in 2025 compared to the previous year. Much of this violence stems from criminal organizations and cartels. Reflecting this, the United States on Thursday designated Los Choneros and Los Lobos as foreign terrorist organizations and specially designated global terrorists.

While US-Ecuador cooperation is not new, the rise in violence, despite President Daniel Noboa’s efforts to tackle crime, underscores the urgency of providing increased US muscle to back his administration’s mano dura, or firm hand, policies. During his visit, Rubio announced nearly twenty million dollars in support for Ecuador, including six million dollars for naval drones. Rubio also mentioned the possibility of US troops on Ecuadorian soil, and, with an invitation from the Ecuadorians, potentially reopening a US base that was closed in 2009 under former President Rafael Correa.

The geopolitical significance of these announcements should not go unnoticed. These positive developments represent a major shift for US relations with Ecuador, a strategic ally that was once estranged and now in many ways sees eye-to-eye with the Trump administration, despite how heavily indebted it is to China. This stands in sharp contrast to US relations with long-time allies in the region, such as Colombia, whose ties with Washington have recently become more strained.

Also during the visit, US and Ecuadorian officials sketched the outlines of a potential migrant deportation agreement, though the details are pending. Last but not least, Rubio mentioned progress toward a bilateral trade deal.

From security cooperation to economic prosperity

Rubio’s focus both on enhancing security cooperation and on deepening economic ties is important, and his trip points the way toward a broader strategic vision for the region.

The Atlantic Council’s February 2024 Redefining US Strategy with Latin America and the Caribbean for a New Era report argues that the future of US engagement with the region must center on mutual, inclusive growth rooted in secure ties rather than transactional outreach. Specifically, the report envisions a revamped partnership built on shared values and country-specific strategies.

In effect, Rubio’s trip is a step toward turning that blueprint into a reality. The US secretary of state’s visit presented security cooperation as the entry point, but prosperity as the true test of success. Security cooperation should be conceived as a means to an end—in Latin America, that end should be economic security.

As Rubio said in Ecuador: “You cannot have economic prosperity without stability, and you cannot have stability without security. For example, it’s nearly impossible to attract foreign investment into a country unless you have security.”

With so much discussion surrounding the US counternarcotics operations in the Caribbean, it’s worth remembering that those shows of force are only one piece of the puzzle, and they should not distract from broader US efforts to build trust and enhance security cooperation in the region.


María Fernanda Bozmoski is director, impact and operations, and lead for Central America at the Atlantic Council’s Adrienne Arsht Latin America Center.

The post Rubio’s visit to Mexico and Ecuador shows the need for US security cooperation runs deeper than warships in the Caribbean appeared first on Atlantic Council.

]]>
Putin wants to capture Ukraine’s crucial fortress belt without a fight https://www.atlanticcouncil.org/blogs/ukrainealert/putin-wants-to-capture-ukraines-crucial-fortress-belt-without-a-fight/ Thu, 28 Aug 2025 21:16:11 +0000 https://www.atlanticcouncil.org/?p=870825 As US-led efforts to end the Russian invasion of Ukraine struggle to gain momentum, Vladimir Putin’s latest territorial demands include the surrender of strategically vital and heavily fortified Ukrainian land in the east of the country, writes Mykola Bielieskov.

The post Putin wants to capture Ukraine’s crucial fortress belt without a fight appeared first on Atlantic Council.

]]>
As US-led efforts to end the Russian invasion of Ukraine struggle to gain momentum, Vladimir Putin’s latest territorial demands include the surrender of strategically vital and heavily fortified Ukrainian land in the east of the country. Moscow is calling on Kyiv to unilaterally withdraw from the approximately one-third of Donetsk province that remains in Ukrainian hands as part of any peace deal. In other words, Putin aims to secure territory at the negotiating table that his army has been unable to conquer in more that three and a half years of full-scale war.

The northern third of the Donetsk province is the last remaining part of eastern Ukraine’s industrial Donbas region that is still under Kyiv control. It has been at the epicenter of Putin’s invasion ever since the onset of Russian aggression more than a decade ago in 2014, and is home to Ukraine’s most extensive network of fortifications. Putin’s proposed peace terms pose a series of grave political and military threats for the Ukrainian authorities.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

Gifting Russia large swathes of unconquered territory that thousands of Ukrainians have died defending would be an extremely bitter pill for the Ukrainian population to swallow, to put it mildly. It would also be widely seen as rewarding Russia for launching the largest European war since World War II. This would legitimize Putin’s decision to invade Ukraine and set the stage for further Russian aggression.

Even if Ukrainian President Volodymyr Zelenskyy was personally inclined to appease Putin, he does not constitutionally have the authority to cede land. Instead, changes to Ukraine’s borders must be agreed via a national referendum. Any indication that Zelenskyy favored accepting Putin’s territorial demands would likely provoke strong domestic opposition. This would potentially destabilize Ukraine, creating a range of opportunities for Russia to exploit. A weakened and divided Ukraine would be far more vulnerable on the battlefield and in the diplomatic arena.

Alternatively, if Zelenskyy maintains his current position and continues to rule out Putin’s Donbas land grab, the Kremlin will likely use this rejection to poison the Ukrainian leader’s relations with US President Donald Trump by portraying Ukraine as the main obstacle to peace. Putin would no doubt welcome the opportunity to drive a wedge between Kyiv and Washington as Moscow seeks to isolate Ukraine and reduce international support for the Ukrainian war effort.

Militarily, the surrender of the northern Donetsk region would place large parts of eastern Ukraine at risk of being overrun by the advancing Russians. The region currently serves as a bastion against Russia’s invasion. While there is no guarantee that fortified areas will be able to hold out indefinitely against Russian attacks, Putin would almost certainly be forced to sacrifice huge numbers of troops before achieving his goal. In this sense, the Donbas fortress belt is one of Ukraine’s trump cards in its war of attrition against Russia.

Over the past eleven years, Ukraine has constructed a range of defensive fortifications in the northern Donetsk region centered around the cities of Sloviansk and Kramatorsk. The area has served as a logistical hub for the Ukrainian war effort and has been a focus of efforts to develop defense in depth. If Ukraine retreats from this stronghold, Russia would be able to secure a vital staging post for further advances while avoiding hundreds of thousands of casualties. The Ukrainian military would then be forced to hastily construct new fortifications in significantly less favorable terrain.

With current military technologies favoring defensive operations, Ukraine’s fortress belt in the northern Donetsk region represents a formidable obstacle for Putin’s invading army. The ubiquity of drones above the battlefield makes large-scale mechanized breakthroughs extremely challenging to accomplish, leaving Russia to rely on small groups of infantry to infiltrate Ukrainian forward positions. This approach can be successful against thinly defended and hastily constructed defensive positions, but is unlikely to prove effective against the most heavily fortified sector of the Ukrainian front lines.

Ukrainians recognize the need for concessions, with a majority acknowledging that areas of the country currently occupied by Russia will likely remain under Kremlin control as part of any peace settlement. Crucially, however, almost nobody in Ukraine believes that handing over additional unconquered territory in the Donbas would satisfy Putin’s imperial ambitions or remove the threat of future Russian invasions. On the contrary, most Ukrainians agree that this would only encourage the Kremlin and embolden Putin to go further. He would be able to do so from a position of strength, having secured Ukraine’s fortress belt without the prolonged fighting that has proved necessary in order to secure far smaller territorial gains elsewhere in eastern Ukraine.

From both a military and political perspective, it would make little sense for Ukraine to accept Russia’s territorial demands and voluntarily surrender the northern Donetsk region as part of a peace deal. As long as Kyiv continues to control the Donbas fortress belt, there is a good chance that the Ukrainian military can turn the entire region into a graveyard for Putin’s invading army. Meanwhile, a withdrawal would leave large parts of Ukraine dangerously undefended and dramatically undermine faith in the country’s leadership.

Even if Putin concentrates his best military units in a bid to complete the conquest of the Donbas region, he would almost certainly be forced to pay a very high price for any significant advances. Indeed, the Russian army may become bogged down for years in bitter fighting that would dwarf earlier battles of attrition and could conceivably change the entire course of the war. This is exactly why Putin is pushing for Ukraine to surrender the region without a fight, and helps explain why Ukraine is reluctant to do so.

Mykola Bielieskov is a research fellow at the National Institute for Strategic Studies and a senior analyst at Ukrainian NGO “Come Back Alive.” The views expressed in this article are the author’s personal position and do not reflect the opinions or views of NISS or Come Back Alive.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values, and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia, and Central Asia in the East.

Follow us on social media
and support our work

The post Putin wants to capture Ukraine’s crucial fortress belt without a fight appeared first on Atlantic Council.

]]>
Punaro discusses the Russia-Ukraine conflict on Bloomberg Radio https://www.atlanticcouncil.org/insight-impact/in-the-news/punaro-discusses-the-russia-ukraine-conflict-on-bloomberg-radio/ Wed, 27 Aug 2025 18:34:15 +0000 https://www.atlanticcouncil.org/?p=870105 On August 5, MajGen Arnold Punaro (ret.), a Forward Defense nonresident senior fellow, discussed developments in the Russia-Ukraine conflict on Bloomberg Radio.

The post Punaro discusses the Russia-Ukraine conflict on Bloomberg Radio appeared first on Atlantic Council.

]]>

On August 5, MajGen Arnold Punaro (ret.), a Forward Defense nonresident senior fellow, discussed developments in the Russia-Ukraine conflict on Bloomberg Radio. In his interview, he applauded efforts to bolster the US defense production, advocated for increased sanctions on Russia, and expressed deep distrust in President Putin. Punaro emphasized that rewarding Russian aggression would only enable malign state actors. 

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Punaro discusses the Russia-Ukraine conflict on Bloomberg Radio appeared first on Atlantic Council.

]]>
Arnold Punaro featured in RealClear Defense on restructuring the US military https://www.atlanticcouncil.org/insight-impact/in-the-news/arnold-punaro-featured-in-realclear-defense-on-restructuring-the-us-military/ Wed, 27 Aug 2025 14:48:58 +0000 https://www.atlanticcouncil.org/?p=870066 On August 26, MajGen Arnold Punaro (ret.), a Forward Defense nonresident senior fellow, published an article in RealClear Defense, titled "Restructuring Our Military for a Multi-Front War."

The post Arnold Punaro featured in RealClear Defense on restructuring the US military appeared first on Atlantic Council.

]]>

On August 26, MajGen Arnold Punaro (ret.), a Forward Defense nonresident senior fellow, published an article in RealClear Defense, titled “Restructuring Our Military for a Multi-Front War.” In the article, Punaro argues that existing US military posture, designed to confront a single major adversary, is inadequate for emerging strategic reality. He emphasizes that the evolving global environment requires a military force able to deter and prevail across multiple theaters. 

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Arnold Punaro featured in RealClear Defense on restructuring the US military appeared first on Atlantic Council.

]]>
Wieslander interviewed on Times Radio https://www.atlanticcouncil.org/insight-impact/in-the-news/wieslander-interviewed-on-times-radio/ Sat, 23 Aug 2025 21:17:00 +0000 https://www.atlanticcouncil.org/?p=870013 Director for Northern Europe, Anna Wieslander gave her assessment of the Russia-Ukraine negotiations after the Alaska and White House-summit in a longer interview in “Superpowers” by Times Radio, August 22. Wieslander comments on the three main dimensions of the peace talks, how the Europeans leaders succeeded in increasing leverage for Ukraine at the White House […]

The post Wieslander interviewed on Times Radio appeared first on Atlantic Council.

]]>

Director for Northern Europe, Anna Wieslander gave her assessment of the Russia-Ukraine negotiations after the Alaska and White House-summit in a longer interview in “Superpowers” by Times Radio, August 22.

Wieslander comments on the three main dimensions of the peace talks, how the Europeans leaders succeeded in increasing leverage for Ukraine at the White House meeting and the potential composition of security guarantees.

Wieslander also calls for more pressure on Russia from both the “superpower” US and Europe, stating that neither is using all its instruments at the moment. “Europe must step up and take a bit more risk towards Russia”, says Wieslander proposing the creation of a reconstruction fund for Ukraine based on frozen Russian state assets as one possible action.

“This is the moment, this is where Europe has to change and increase its support to Ukraine”, says Wieslander.

The post Wieslander interviewed on Times Radio appeared first on Atlantic Council.

]]>
Daniels discusses China’s AI strategy on the China Power Podcast https://www.atlanticcouncil.org/insight-impact/in-the-news/daniels-discusses-chinas-ai-strategy-on-the-china-power-podcast/ Fri, 22 Aug 2025 16:15:23 +0000 https://www.atlanticcouncil.org/?p=869268 On August 19, Forward Defense nonresident senior fellow Owen Daniels was featured on Episode 108 of the German Marshal Fund's China Power Podcast.

The post Daniels discusses China’s AI strategy on the China Power Podcast appeared first on Atlantic Council.

]]>

On August 19, Forward Defense nonresident senior fellow Owen Daniels was featured on Episode 108 of the German Marshal Fund’s China Power Podcast. In the episode, Owens discusses US-China competition in artificial intelligence, China’s AI strategy and ambitions, and how Beijing is leveraging AI to expand its global influence. Daniels also explores what the United States can do to maintain and bolster its technological leadership.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Daniels discusses China’s AI strategy on the China Power Podcast appeared first on Atlantic Council.

]]>
Daniels examines China’s AI soft power strategy in War on the Rocks https://www.atlanticcouncil.org/insight-impact/in-the-news/daniels-examines-chinas-ai-strategy-in-war-on-the-rocks/ Fri, 22 Aug 2025 16:09:33 +0000 https://www.atlanticcouncil.org/?p=868944 On August 14, Forward Defense nonresident senior fellow Owen Daniels published an article, "China’s Soft Power Tools and Whether They Work," in War on the Rocks.

The post Daniels examines China’s AI soft power strategy in War on the Rocks appeared first on Atlantic Council.

]]>

On August 14, Forward Defense nonresident senior fellow Owen Daniels published an article, “China’s Soft Power Tools and Whether They Work,” in War on the Rocks. In the article, Daniels examines China’s strategic use of open AI platforms as a tool of soft power, highlighting how models like DeepSeek’s R1 and Moonshot AI’s Kimi K2 pose both technological and diplomatic challenges for the United States.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Daniels examines China’s AI soft power strategy in War on the Rocks appeared first on Atlantic Council.

]]>
Winning through people: The human capital advantage in great-power competition https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/winning-through-people-the-human-capital-advantage-in-great-power-competition/ Thu, 21 Aug 2025 18:00:00 +0000 https://www.atlanticcouncil.org/?p=868962 To maintain military readiness, deter conflict, and preserve its technological edge, the United States must prioritize human capital by investing in resilient service members and a skilled civilian workforce.

The post Winning through people: The human capital advantage in great-power competition appeared first on Atlantic Council.

]]>

This issue brief is part of the Scowcroft Center for Strategy and Security’s National Defense Strategy Project, outlining the priorities the Department of Defense should address in its next NDS.

Executive summary

The next National Defense Strategy (NDS) will likely continue to emphasize deterring great-power competition from escalating into conflict; accelerating the development and deployment of new technologies and capabilities; shifting resources from the United States’ military presence in Europe and the Middle East toward the Indo-Pacific; and strengthening the defense industrial base. However, the time has come for the NDS to give greater attention to another essential component of US military power: its human capital.

While effective diplomacy, exquisite sensor platforms, and advanced weapon systems are essential to deterrence, the men and women in uniform—and the Department of Defense (DoD) civilians who support them—remain the United States’ most enduring strategic advantage. They are highly capable and resilient, rigorously trained and well-educated, and operate within a decision-making structure where plans serve as starting points and a commander’s intent guides action.

The upcoming NDS must therefore elevate the “people” component of the US national security enterprise—integrating personnel challenges and opportunities more directly into the strategy and recognizing the robust capabilities of the people behind the platforms. Three specific priorities stand out in this regard: recruiting, service member resilience, and quality of life. While this list is by no means exhaustive, these issues demand urgent attention and investment if the current administration hopes to fulfill its promise of “peace through strength.”

View the full issue brief

About the authors

Beth Foster is the former executive director of the Office of Force Resiliency at the US Department of Defense.

Alex Wagner is a nonresident senior fellow with the Atlantic Council’s GeoStrategy Initiative and former assistant secretary of the Air Force for Manpower and Reserve Affairs.

Related content

Explore the program

The Adrienne Arsht National Security Resilience Initiative, in the Scowcroft Center for Strategy and Security, works to advance resilience as a core tenet of US and allied national security policy and practice.

The post Winning through people: The human capital advantage in great-power competition appeared first on Atlantic Council.

]]>
Wieslander interviewed on Swedish TV https://www.atlanticcouncil.org/insight-impact/in-the-news/wieslander-interviewed-by-swedish-svt-news/ Tue, 19 Aug 2025 01:34:00 +0000 https://www.atlanticcouncil.org/?p=869728 On Monday August 18th, Anna Wieslander, Director for Northern Europe, appeared on Swedish news program Aktuellt to comment on the Washington-summit between President Trump, President Zelenskyy and European leaders. European leaders tried to bring greater clarity to the issue of American security guarantees to Ukraine, but question marks remain comments Wieslander. Wieslander goes on to […]

The post Wieslander interviewed on Swedish TV appeared first on Atlantic Council.

]]>

On Monday August 18th, Anna Wieslander, Director for Northern Europe, appeared on Swedish news program Aktuellt to comment on the Washington-summit between President Trump, President Zelenskyy and European leaders.

European leaders tried to bring greater clarity to the issue of American security guarantees to Ukraine, but question marks remain comments Wieslander. Wieslander goes on to say that the meeting became “an opportunity for Europe to demonstrate that Ukraine’s fate is crucial to the security of all of Europe”.

Watch the interview starting 16 minutes into the program.

The post Wieslander interviewed on Swedish TV appeared first on Atlantic Council.

]]>
Wieslander interviewed by Swedish SVT News https://www.atlanticcouncil.org/insight-impact/in-the-news/wieslander-interviewed-by-swedish-svt-news-2/ Mon, 18 Aug 2025 21:51:00 +0000 https://www.atlanticcouncil.org/?p=869731 Monday August 18, Anna Wieslander, director for Northern Europe, gave an interview with Swedish news SVT commenting on the role of the personal relationship between Finland’s President Stubb and President Putin in the important talks about Ukraine. Wieslander says that it is vital that President Stubb cooperates with the rest of the Nordic Countries to […]

The post Wieslander interviewed by Swedish SVT News appeared first on Atlantic Council.

]]>
Monday August 18, Anna Wieslander, director for Northern Europe, gave an interview with Swedish news SVT commenting on the role of the personal relationship between Finland’s President Stubb and President Putin in the important talks about Ukraine.


Wieslander says that it is vital that President Stubb cooperates with the rest of the Nordic Countries to bring forth a joint message of the Nordic perspective on Russia.

The post Wieslander interviewed by Swedish SVT News appeared first on Atlantic Council.

]]>
Wieslander on Swedish TV, Aktuellt https://www.atlanticcouncil.org/insight-impact/in-the-news/wieslander-on-swedish-tv-aktuellt-2/ Sun, 17 Aug 2025 00:04:00 +0000 https://www.atlanticcouncil.org/?p=869726 On Saturday August 16th, Anna Wieslander, Director for Northern Europe, appeared on Swedish news program Aktuellt to comment on the Alaska-summit between President Trump and President Putin. “The messages after the Alaska meeting do not indicate a step closer to peace,” says Wieslander who warns that we are not headed in a direction of peace […]

The post Wieslander on Swedish TV, Aktuellt appeared first on Atlantic Council.

]]>

On Saturday August 16th, Anna Wieslander, Director for Northern Europe, appeared on Swedish news program Aktuellt to comment on the Alaska-summit between President Trump and President Putin.

“The messages after the Alaska meeting do not indicate a step closer to peace,” says Wieslander who warns that we are not headed in a direction of peace but in a more dangerous direction. “Someone has to put pressure on Russia, I think this is Europe’s role. If we don’t do it, we will be the ones who suffer the most, along with Ukraine”, Wieslander says.

The post Wieslander on Swedish TV, Aktuellt appeared first on Atlantic Council.

]]>
Alaska Summit: Trump must press Putin over future Ukrainian security https://www.atlanticcouncil.org/blogs/ukrainealert/alaska-summit-trump-must-press-putin-over-future-ukrainian-security/ Mon, 11 Aug 2025 12:56:30 +0000 https://www.atlanticcouncil.org/?p=866564 Trump-Putin Alaska Summit: If Moscow insists on the acceptance of Russian control over Ukrainian land for a ceasefire, it must accept strong measures to bolster Ukrainian security as well, writes John E. Herbst.

The post Alaska Summit: Trump must press Putin over future Ukrainian security appeared first on Atlantic Council.

]]>
The biggest news on the international scene is that US President Donald Trump and his Russian counterpart Vladimir Putin have agreed to meet on August 15 in Alaska to discuss peace in Ukraine, and that Russia has in fact described its conditions for ending military operations. 

According to a Bloomberg report, the terms proposed by the Kremlin “would lock in Russia’s occupation of territory seized during its military invasion” in exchange for an end to the fighting. This would also require Ukraine to withdraw its troops from areas in the Luhansk and Donetsk provinces that it currently controls, ceding them to Russia.  

The exact nature of the territorial settlement being discussed by Russia and the United States is still in question. “We’re going to get some back, and we’re going to get some switched,” Trump commented August 8. “There’ll be some swapping of territories to the betterment of both.”  

The Trump Administration has also been in touch with Ukrainian and other European leaders to review what Russia is offering. Of course, Ukraine must agree to any deal. There is some concern in Kyiv that Trump might try to compel Ukraine to accept conditions he settles on with Putin. Ukrainian President Volodymyr Zelenskyy has pushed back indirectly by noting that the Ukrainian Constitution requires that any territorial changes must be approved by a plebiscite authorized by the country’s parliament.

How did Trump reach this point? Over the past two months, the US president set the stage by steadily increasing pressure on the Kremlin. He achieved this by persuading NATO members to increase defense and defense-related expenditures to 5 percent of gross domestic product over the next decade and, crucially, by confirming that military aid to Ukraine would be part of this.

Additionally, Trump agreed to sell US weapons, including advanced arms, to NATO members for transfer to Ukraine. He also set a deadline for Russia to back a ceasefire, first giving Putin fifty days to comply, and then reducing it to ten days ending August 8.

Following US Special Envoy Steve Witkoff’s August 6 meeting with Putin, where the Russian leader handed over terms for a ceasefire, Trump imposed tariffs on India for purchasing Russian oil, further increasing the pressure on Moscow. But given the ongoing talks with the Kremlin, Trump chose not to introduce more sanctions when the August 8 deadline passed without a ceasefire.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

The Trump Administration is understandably pleased that the Kremlin now seems to be negotiating seriously. The leverage Trump assembled since June has certainly created the conditions for this. At the same time, it is also true that in reaching this moment, the US appears to have given up a great deal without achieving any concessions from Moscow beyond a willingness to stop hostilities as part of a ceasefire, not a peace settlement. 

Put another way, territorial concessions to Russia are front-loaded, but critical issues that Moscow must accept will only be handled in subsequent peace negotiations. These issues are related to legitimate Ukrainian security concerns. They are presumably very important to the White House because Trump’s objective is to achieve a durable peace that ensures a stable, secure Ukraine. This includes Russian acceptance of the ongoing arming of Ukraine by the United States and other NATO nations, and the stationing of European peacekeepers in Ukraine.

There are also important tactical considerations. In the discussions with Russia about a ceasefire, the Administration made two critical concessions. They allowed the Kremlin, after the August 7 sanctions on India, to escape the August 8 deadline; and they accommodated Putin’s insistence that Zelenskyy not participate in this week’s Putin-Trump talks about the future of Ukraine. That has the smell of the 1945 Yalta Summit, where the United States, the Soviet Union, and Britain decided the fate of half of Europe over the heads of those nations.

These US concessions only encourage Putin to demand more and give less. His goal remains to achieve effective political control of Ukraine. The terms he is currently discussing with Trump reflect what Putin is willing to accept and do now. It says nothing about what he will do in the future.

The Trump team seems to have recognized that it may have gotten ahead of itself and responded too enthusiastically to Special Envoy Witkoff’s initial report on his meeting in Moscow. This has been underscored by the revelation that Witkoff misinterpreted what Putin said, thinking that the Russian dictator was prepared to withdraw Russian forces from Ukraine’s Kherson and Zaporizhzhia provinces. 

In any case, US Vice President JD Vance spent the past weekend in the UK consulting with the Brits, the Ukrainians, and other Europeans, who have called for a full ceasefire, no territorial concessions before a ceasefire, and strong security support for Ukraine. 

It is notable that the White House is now once again talking about potentially inviting Zelenskyy to Alaska, but only in soft way, saying that it is “open” to the idea. They are likely trying to persuade the Kremlin to accept this. The question is if they will insist. The answer to that question will be an indicator of whether Trump is ready to do what is necessary to make the upcoming summit a step toward a stable peace.

It is understandable why Putin does not want either Europe or Ukraine represented in the exchange. He wants a deal with Trump that will be presented to Kyiv and other European capitals as a fait accompli. But since Trump wants a durable peace, adding Ukraine and Europe to the talks makes it easier to achieve that objective.

At a minimum, the White House should demand strict reciprocity in the negotiations. If Moscow insists on the acceptance of Russian control over Ukrainian land for a ceasefire, it must accept strong measures to bolster Ukrainian security as well. 

Trump can underscore this by using the negotiating period to announce another large weapons sale to NATO countries for transfer to Ukraine, and by letting Putin know that if the bombing of Ukrainian civilians and cities continues beyond the Alaskan meeting, more secondary sanctions will be enacted. This is the path to a stable peace.  

John E. Herbst is the senior director of the Atlantic Council’s Eurasia Center and a former US ambassador to Ukraine.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values, and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia, and Central Asia in the East.

Follow us on social media
and support our work

The post Alaska Summit: Trump must press Putin over future Ukrainian security appeared first on Atlantic Council.

]]>
Israel’s gamble in Gaza City signals a push toward negotiation—but risks a long insurgency https://www.atlanticcouncil.org/blogs/new-atlanticist/israels-gamble-in-gaza-city-signals-a-push-toward-negotiation-but-risks-a-long-insurgency/ Fri, 08 Aug 2025 21:36:06 +0000 https://www.atlanticcouncil.org/?p=866454 Israel’s decision to occupy Gaza City is aimed at ending its war with Hamas. But without careful planning, it risks starting a new conflict against a brewing insurgency.

The post Israel’s gamble in Gaza City signals a push toward negotiation—but risks a long insurgency appeared first on Atlantic Council.

]]>
By approving a decision to clear and take control of Gaza City later this year, Israel appears to be making a high-stakes bet—militarily, diplomatically, and politically. After nearly two years of brutal conflict following the Hamas-led October 7 attacks, Israel is preparing for a deeper push into the heart of Gaza’s largest population center.

But this isn’t simply about eliminating Hamas strongholds or reasserting deterrence. The decision to delay the occupation, or the holding of territory, until the war’s two-year mark suggests a broader strategy: to change the strategic calculus of Hamas and force serious negotiations. Yet the risks are immense, and the aftermath could lead to an entrenched insurgency if mismanaged.

Hamas has refused to release all remaining hostages unless Israel ends the war entirely, leaving Hamas with a postwar role in Gaza. This is a nonstarter for Israel, which now appears to be trying a new approach.

Israeli leaders say it is not a long-term play. “We don’t want to keep it,” Prime Minister Benjamin Netanyahu said Thursday. But if the war ends and no credible alternative is ready, then the burden to run Gaza may fall—by design or default—on Israel itself.

A tactical move with strategic intent

The Israel Defense Forces (IDF) have already carried out intense operations throughout Gaza, including targeted incursions into Gaza City, Khan Younis, and Rafah. However, none of those operations constituted a long-term reoccupation of major urban centers. The Israeli security cabinet’s decision to formally occupy Gaza City in the coming weeks marks a turning point.

This decision is not about taking territory for the sake of holding it; it’s about political leverage. By occupying the symbolic and administrative heart of the Gaza Strip, Israel sends a clear message: Time is not on Hamas’s side, and continued resistance only invites deeper Israeli entrenchment. If Hamas is banking on international pressure or war fatigue to compel an Israeli withdrawal, this move upends that assumption.

The timeline is telling. Less than two months from now will mark two years since the deadliest single-day attack on Israelis in the country’s history. For Netanyahu and the Israeli security establishment, occupying Gaza City near this anniversary serves two purposes: It underscores Israel’s resolve, and it creates a pressure point for negotiations. Israel can signal to its international partners that it has been patient and methodical, and it is now escalating in response to Hamas’s intransigence, not out of retribution but strategic necessity.

Occupation requires manpower and will be costly

But this is not a low-cost move. Occupying Gaza City will require thousands—possibly tens of thousands—of troops to secure neighborhoods, defend against improvised explosive devises and ambushes, maintain logistical supply chains, and conduct ongoing counterterrorism operations. Urban occupation is one of the most manpower-intensive military tasks. Every street corner and apartment building becomes a potential battlefield.

While the IDF has shown proficiency in high-intensity urban combat, occupation is a different proposition. It requires not just soldiers with rifles, but an infrastructure of civil-military coordination, intelligence, and stability operations. It also puts Israeli soldiers in prolonged close contact with a hostile or traumatized population—an environment ripe for insurgent recruitment and propaganda wins.

The Israeli public, which has largely supported the war effort to date, may not be prepared for the long-term toll this could take—not just in soldiers’ lives, but in national morale, budgetary strains, and international backlash. Gaza is already one of the most densely populated and devastated regions in the world. Prolonged occupation risks entangling Israel in day-to-day governance challenges it is neither equipped for nor politically eager to assume.

Forcing a shift in Hamas’s calculus

Nonetheless, the strategic rationale remains: By raising the cost of Hamas’s continued resistance, Israel hopes to change the group’s internal decision-making. So far, Hamas has shown little appetite for a deal that includes surrendering power in Gaza or releasing hostages without major concessions. A permanent Israeli presence in Gaza City could threaten Hamas’s core identity as the ruling authority in the strip.

In other words, Israel may not need to “win” Gaza City militarily; it needs to make its occupation untenable for Hamas politically. This is coercive diplomacy through military means—reframing the war not just as a battle for survival, but as a pressure campaign to extract terms Hamas has so far refused to accept.

However, coercion cuts both ways. The more pressure Israel applies, the more Hamas may double down on its resistance narrative, appealing to regional and international sympathizers. The conflict could escalate into a broader regional confrontation or draw greater intervention from Iran-backed proxies. And the longer Israel occupies urban areas, the more international legitimacy it may lose.

The post-Hamas problem: Who governs, and at what cost?

An even bigger question looms: What comes after Hamas? If Israeli forces do occupy Gaza City and succeed in removing Hamas from power, who fills the vacuum? Some proposals have floated an international Arab security force, possibly backed by the Palestinian Authority (PA), but these plans are speculative at best and politically fraught. The PA is viewed with suspicion in Gaza, and Arab states are reluctant to assume control over a war-torn territory under Israeli military watch.

If the ultimate burden falls to Israel, that would place the IDF in the role of both security guarantor and de facto governing authority. History shows how quickly such roles can devolve into quagmires. The US experience in Iraq is a stark reminder: Removing a hostile regime is relatively fast; securing the peace is the long, grinding challenge.

Should the local population view the IDF as occupiers rather than liberators, a protracted insurgency is not just possible—it’s likely. Gaza’s dense urban environment, deep social trauma, and history of resistance create ideal conditions for asymmetric warfare. Even if Hamas is deposed, remnants or new factions could emerge, prolonging instability for years.

Leverage with a long tail

Israel’s decision to occupy Gaza City is an ambitious move aimed at accelerating the endgame in a war with no easy exits. It is an attempt to force Hamas to the table and reassert strategic dominance. But it is also a gamble—one that requires overwhelming force, careful planning, and a credible plan for what comes next. Without those, Israel risks trading one form of conflict for another: from a war against Hamas to a war against a brewing insurgency.


Alex Plitsas is a nonresident senior fellow with the Middle East Programs’ Scowcroft Middle East Security Initiative and leads the Initiative’s Counterterrorism Project. He previously served as the chief of sensitive activities for special operations and combating terrorism in the Office of the US Secretary of Defense.

The post Israel’s gamble in Gaza City signals a push toward negotiation—but risks a long insurgency appeared first on Atlantic Council.

]]>
Auerswald in Stanford University Press on legislators, armed forces, and democratic accountability https://www.atlanticcouncil.org/insight-impact/in-the-news/auerswald-in-stanford-university-press-on-legislators-armed-forces-and-democratic-accountability/ Fri, 08 Aug 2025 13:33:35 +0000 https://www.atlanticcouncil.org/?p=866337 In September, Transatlantic Security Initiative nonresident senior fellow Dr. David Auerswald’s co-authored book, Overseen or Overlooked? Legislators, Armed Forces, and Democratic Accountability was published by Stanford University Press. This book aims to understand the similarities and differences among the world’s democracies regarding the role of legislatures in democratic civil-military relations.

The post Auerswald in Stanford University Press on legislators, armed forces, and democratic accountability appeared first on Atlantic Council.

]]>

In September, Transatlantic Security Initiative nonresident senior fellow Dr. David Auerswald’s co-authored book, Overseen or Overlooked? Legislators, Armed Forces, and Democratic Accountability was published by Stanford University Press. This book aims to understand the similarities and differences among the world’s democracies regarding the role of legislatures in democratic civil-military relations.

The Transatlantic Security Initiative, in the Scowcroft Center for Strategy and Security, shapes and influences the debate on the greatest security challenges facing the North Atlantic Alliance and its key partners.

The post Auerswald in Stanford University Press on legislators, armed forces, and democratic accountability appeared first on Atlantic Council.

]]>
Ukraine’s expanding robot army can help address manpower shortages https://www.atlanticcouncil.org/blogs/ukrainealert/ukraines-expanding-robot-army-can-help-address-manpower-shortages/ Thu, 07 Aug 2025 20:55:04 +0000 https://www.atlanticcouncil.org/?p=866285 Robotic systems are in many ways an ideal battlefield solution for Ukraine as the country seeks ways to leverage its proven tech prowess in order to defend itself in a grueling war of attrition against a far larger enemy, writes David Kirichenko.

The post Ukraine’s expanding robot army can help address manpower shortages appeared first on Atlantic Council.

]]>
The Ukrainian military claims to have conducted a groundbreaking local offensive in early July 2025, using exclusively robotic systems to seize a front line position in the Kharkiv region and capture a number of surrendering Russian soldiers. Officials from the Ukrainian army’s Third Assault Brigade stressed that the operation was unprecedented in modern warfare and emphasized that Ukraine had suffered no casualties.

Meanwhile, another Ukrainian front line unit has recently showcased a new robotic platform that is reportedly capable of shooting down Russian warplanes and helicopters. The system features a Soviet-era anti-aircraft missile launcher mounted on a remote-controlled robot, providing Ukrainian troops with enhanced defense against aerial attack while reducing their exposure to Russian drones.

These two developments underline the growing importance of robotic systems for the Ukrainian war effort. The Commander of Ukraine’s Unmanned Systems Forces, Major Robert Brovdi, has identified the deployment of robots as a top priority for the embattled nation. “Drones are currently creating a kill zone extending 20 kilometers from the front lines,” he stated in July. “The next challenge is to replace Ukrainian infantry with ground-based robotic systems that can take over all the logistical tasks in the front line area.”

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

The increased use of ground robots by the Ukrainian military reflects an emphasis on innovation that has enabled Ukraine to counter Russia’s often overwhelming advantages in terms of conventional firepower and manpower. For example, since the onset of Russia’s full-scale invasion more than three years ago, Ukraine has dramatically increased domestic drone production and earned a reputation as a global leader in drone warfare.

Similar trends are now evident in the development and deployment of Ukrainian robotic systems on the modern battlefield. Earlier this year, Ukrainian Ministry of Defense officials said the country intends to produce up to 15,000 ground robots by the end of 2025. If this target is reached, it would represent a massive expansion in the use of Unmanned Ground Vehicles or UGVs.

Robotic systems are in many ways an ideal solution for Ukraine as the country seeks ways to leverage its proven tech prowess in order to defend itself in a grueling war of attrition against a far larger enemy. With the Russian invasion now in its fourth year, mobilizing sufficient troops to maintain the war effort is becoming an increasingly acute problem for the Ukrainian authorities amid high casualty rates and an alarming rise in the number of desertions. This has led to questions over how much longer the Ukrainian military can hold the current front lines, and is believed to be fueling optimism in Moscow that a decisive breakthrough may soon be possible.

While robots can never completely replace humans on the battlefield, there are a range of front line functions that robotic systems are suitable for. At present, Ukraine’s growing robot army is most commonly used in a logistical role to deliver supplies to troops in the trenches. With drones now a ubiquitous feature above the battlefield, any soldiers or vehicles moving around close to the front lines immediately become targets. Tracked or wheel-mounted robotic systems make it possible to resupply forces without risking casualties.

Crucially, robotic systems can be used to evacuate soldiers. Since 2022, the dominance of drones has made it more difficult to withdraw the wounded from the battlefield. This has led to increased Ukrainian losses, with injured troops often unable to receive medical attention in a timely fashion. While robotic transports are also vulnerable to drone attack and can face a range of other technical obstacles, the use of such platforms for emergency evacuations does increase the chances of survival.

Ukraine is also developing robotic systems capable of playing more direct defensive and offensive roles in the combat zone. While soldiers are still needed to guard trenches and consolidate any territorial gains, armed robots can potentially help maintain defensive positions and prevent Russian advances. This could reduce Ukraine’s reliance on dwindling manpower reserves and limit casualties.

Volunteers and private companies are playing an important part in efforts to develop new robotic models and integrate them into the Ukrainian military. They are faced with an array of practical challenges. In addition to securing the necessary funding and resources, it can also be difficult to provide training for military personnel who are desperately needed for combat duty.

While Ukraine’s senior military and political leadership are believed to appreciate the potential benefits of robotic systems, some field commanders reportedly remain reluctant to embrace new technologies. This legacy of the Soviet past has led to an uneven picture at different points along the line of contact, with many Ukrainian brigades able to invest time and money into developing and deploying robotic systems while others receive only limited access.

In order to fully capitalize on the promise of Ukraine’s robotic ground systems, more support must come from the Ukrainian government and the country’s international partners. Foreign investment is also needed to help Ukrainian developers boost output. Meanwhile, front line units must be given the resources and flexibility to train soldiers in the use of new unmanned systems, with commanders empowered to identify and prioritize the most effective robotic solutions.

Ukraine’s rapid wartime defense tech progress is driving the expansion of the country’s robot army. This is helping to address manpower shortages across the front and allowing the Ukrainian military to at least partially compensate for Russia’s greater resources and far larger population.

With the right investment and technical support, robotic systems could become a key element guaranteeing Ukraine’s national security and protecting the country against further Russian aggression. In order to reach that point, Kyiv and its partners must act quickly to scale up production and integrate new robotic technologies along the front lines of the war.

David Kirichenko is an associate research fellow at the Henry Jackson Society.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values, and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia, and Central Asia in the East.

Follow us on social media
and support our work

The post Ukraine’s expanding robot army can help address manpower shortages appeared first on Atlantic Council.

]]>
Ackerman publishes article, “How Being an Intelligence Officer Made Me a Better Writer” on The Free Press https://www.atlanticcouncil.org/insight-impact/in-the-news/ackerman-publishes-article-how-being-an-intelligence-officer-made-me-a-better-writer-on-the-free-press/ Thu, 07 Aug 2025 15:28:52 +0000 https://www.atlanticcouncil.org/?p=866056 On August 4, Forward Defense nonresident senior fellow Elliot Ackerman published an article entitled, "How Being an Intelligence Officer Made Me a Better Writer," with The Free Press.

The post Ackerman publishes article, “How Being an Intelligence Officer Made Me a Better Writer” on The Free Press appeared first on Atlantic Council.

]]>

On August 4, Forward Defense nonresident senior fellow Elliot Ackerman published an article entitled, “How Being an Intelligence Officer Made Me a Better Writer,” with The Free Press. In the piece, Ackerman details how his career as a veteran of the Marine Corps and CIA special operations has informed his fiction writing.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Ackerman publishes article, “How Being an Intelligence Officer Made Me a Better Writer” on The Free Press appeared first on Atlantic Council.

]]>
Rumbaugh featured on “All Things Financial Management” podcast https://www.atlanticcouncil.org/insight-impact/in-the-news/rumbaugh-featured-on-all-things-financial-management-podcast/ Tue, 05 Aug 2025 13:26:34 +0000 https://www.atlanticcouncil.org/?p=865338 On July 30, Forward Defense nonresident senior fellow Russ Rumbaugh joined host Tom Rhoads on the All Things Financial Management podcast, produced by the Society of Defense Financial Management and Guidehouse.

The post Rumbaugh featured on “All Things Financial Management” podcast appeared first on Atlantic Council.

]]>

On July 30, Forward Defense nonresident senior fellow Russ Rumbaugh joined host Tom Rhoads on the All Things Financial Management podcast, produced by the Society of Defense Financial Management and Guidehouse. In the episode, Rumbaugh shared insights on current developments and challenges shaping the defense financial management landscape.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Rumbaugh featured on “All Things Financial Management” podcast appeared first on Atlantic Council.

]]>
Daniels interviewed by BBC on AI Action Plan https://www.atlanticcouncil.org/insight-impact/in-the-news/daniels-interviewed-by-bbc-on-ai-action-plan/ Mon, 04 Aug 2025 20:50:15 +0000 https://www.atlanticcouncil.org/?p=865297 On July 23, Forward Defense nonresident senior fellow Owen Daniels was interviewed by Sumi Somaskanda on BBC News regarding the administration's latest AI Action Plan.

The post Daniels interviewed by BBC on AI Action Plan appeared first on Atlantic Council.

]]>

On July 23, Forward Defense nonresident senior fellow Owen Daniels was interviewed by Sumi Somaskanda on BBC News regarding the administration’s latest AI Action Plan. In the segment, Daniels explains that while the strategy includes familiar elements for researchers, it also introduces promising initiatives such as strengthening the US open model ecosystem, enhancing evaluation and security, and expanding workforce training. He notes that questions remain about how the plan will be implemented and whether it will be adequately resourced.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Daniels interviewed by BBC on AI Action Plan appeared first on Atlantic Council.

]]>
Daniels publishes article on China’s soft power strategy in AI in Foreign Affairs https://www.atlanticcouncil.org/insight-impact/in-the-news/daniels-publishes-article-on-chinas-soft-power-strategy-in-ai-in-foreign-affairs/ Mon, 04 Aug 2025 20:40:53 +0000 https://www.atlanticcouncil.org/?p=865279 On July 25, Forward Defense nonresident senior fellow Owen Daniels published an article, “China’s Overlooked AI Strategy: Beijing Is Using Soft Power to Gain Global Dominance,” in Foreign Affairs.

The post Daniels publishes article on China’s soft power strategy in AI in Foreign Affairs appeared first on Atlantic Council.

]]>

On July 25, Forward Defense nonresident senior fellow Owen Daniels published an article, “China’s Overlooked AI Strategy: Beijing Is Using Soft Power to Gain Global Dominance,” in Foreign Affairs. In the article, Daniels discusses how China is leveraging low-cost, open-source AI models as a soft power tool to expand its global influence, particularly in the developing world, posing a growing challenge to US technological leadership and strategic diplomacy.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Daniels publishes article on China’s soft power strategy in AI in Foreign Affairs appeared first on Atlantic Council.

]]>
Defining Canada’s threat landscape: Resetting for a new reality https://www.atlanticcouncil.org/in-depth-research-reports/report/defining-canadas-threat-landscape-resetting-for-a-new-reality/ Fri, 01 Aug 2025 13:00:00 +0000 https://www.atlanticcouncil.org/?p=864141 In a changing strategic landscape, Canada must reinforce its national security and confront the threats of geopolitics, climate change, and emerging technology.

The post Defining Canada’s threat landscape: Resetting for a new reality appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Canada’s defense industry, allies, and analysts agree: Canada needs an annual whole-of-government national security strategy.
  • The growing number of disruptions and emergencies related to climate change call for a Canadian disaster-response agency, to prevent the Canadian military from being spread too thin.
  • The Arctic should be the priority for Canadian defense, with efforts in other regions supporting this overarching focus.

Table of contents

Introduction

Canada’s threat landscape is rapidly evolving. To address this new reality, Canada is reframing its strategies and shifting its defense policy priorities and security footing to be nimble and adept within these regional and global contexts. As a reflection of this reality, in April 2024, Canada’s Department of National Defense (DND) and Canadian Armed Forces (CAF) released Our North, Strong and Free: A Renewed Vision for Canada’s Defence, emphasizing three main global trends of significance for Canada: geopolitics, climate change, and emerging technology. Though Canada faces challenges beyond the scale of its geographic size, population, economy, and military footprint, it must maximize its opportunities to assert its comparative advantage in an increasingly competitive world.

Over 2024 and 2025, the Atlantic Council’s Scowcroft Center for Strategy and Security, in partnership with the DND Mobilizing Insights in Defence and Security (MINDS) program, hosted three virtual workshops with government officials, academic experts, and participants from the public and private sectors of Canada, the United States, and Europe. The insights gathered from these conversations helped inform this report, which assesses how these three critical arenas—geopolitics, climate change, and technological development—create challenges and opportunities for Canada’s national security.

A Canadian Navy CH-124 Sea King helicopter sits on the flight deck of the frigate HMCS Toronto after landing while patrolling over Frobisher Bay in the Canadian Arctic August 19, 2009. The Toronto is a multi-role patrol frigate. REUTERS/Andy Clark.

Geopolitics

Geopolitics is a significant driver of change in Canada’s threat landscape, especially for the DND and CAF. Geopolitics is a central element across the varied challenges facing Canada, whether those posed by authoritarian regimes, through increased tensions in the Arctic, and within Canada’s evolving role in the transatlantic and Indo-Pacific regions. Authoritarian powers such as Russia and China promote values that directly undermine Canada’s commitment to upholding a stable and peaceful international order, the rule of law, and democracy worldwide, making it critical for the DND and CAF to be equipped to address these emerging geopolitical threats.

One of Canada’s biggest geopolitical challenges arises from strategic vulnerabilities in the Arctic, given that 40 percent of Canada’s territory and more than 70 percent of its coastline is in that region. The Arctic also holds significant strategic value due to its vast reserves of critical minerals and resources, including “13 percent of the world’s undiscovered oil and 30 percent of the world’s untapped natural gas.” As climate change accelerates ice-cap melting, Arctic shipping routes are becoming increasingly accessible and navigable, particularly the Northwest Passage that hugs the North American Arctic coastline.

A changing Arctic creates new pathways for geopolitical competition, as authoritarian adversaries such as Russia and China have demonstrated an increased interest in extending their presence and influence in the region. Russia, the world’s largest Arctic state with key strategic military capabilities located in the Kola Peninsula, is threatened by the NATO accession of Finland and Sweden—two countries that historically maintained strategic nonalignment with military alliances during the Cold War. In turn, Russia has sought to strengthen its Arctic presence by allying with other “potential Arctic stakeholders” including other BRICS countries. Critically, Russia has deepened its collaboration with China on a series of joint projects in the region. This collaboration includes a joint military exercise in the fall of 2024, during which Russian and Chinese forces carried out coordinated patrols in the Arctic region, as well as joint coast guard patrols extending into the Bering Sea. Additionally, military aircraft from both countries were detected by the North American Aerospace Defense Command (NORAD) after entering Alaska’s Air Defense Identification Zone.

Although China is not an Arctic state, its 2018 Arctic white paper identifies China as a “near-Arctic state,” clarifying its long-term ambition to become a polar great power by 2030. China is developing a “Polar Silk Road” that enables it to both access Arctic resources, including critical minerals, oil, and gas, and support dual-use research conducted in its two permanent research stations and elsewhere in the Arctic region. In December 2024, China introduced a “polar-ready” cargo ship that is “capable of transporting a wide range of cargo, including offshore oil shield, wind and nuclear power equipment, as well as large vessel steel structures of sections.” Weighing 58,000 tons, the ship has been likened by Chinese bloggers to the size of an aircraft carrier.

Russia’s and China’s growing ambitions in the Arctic present escalating challenges to Canada’s interests in the region, including the possibility of eventual territorial disputes that could threaten Canadian sovereignty and national security. Though DND/CAF have indicated that there are no “immediate threats to the Arctic,” it nonetheless is crucial for them to allocate adequate resources to ensure the sustainability of their defense operations while enhancing Arctic domain awareness in response to emerging challenges in the region.

In addition to the Arctic, Russia and China also pose significant threats to Canada’s interests in the transatlantic and Indo-Pacific regions. As a founding member of NATO that has long benefited from the alliance’s security guarantees, Canada’s defense priorities have historically been closely aligned with those of the Alliance. While Canada continues to uphold its NATO commitments—including through military, humanitarian, and financial support to Ukraine—workshop participants emphasized the need for the CAF to adjust resources from the transatlantic to the Indo-Pacific theater (in addition to the aforementioned Arctic region), where China’s growing influence poses an increasing geopolitical threat. Canada considers itself a “Pacific nation,” with the Indo-Pacific region representing its second-largest export market and encompassing six of its thirteen top trading partners. China’s emergence as a strategic threat is further strengthened by its increased collaboration with Russia. Just prior to Russia’s full-scale invasion of Ukraine, Moscow committed to extensive cooperation with Beijing in the form of a “no limits” partnership consisting of advanced military technology transfer and substantial economic support.

This evolving geostrategic situation requires the DND/CAF to carefully balance its resources across the transatlantic and Indo-Pacific theaters, given the growing collaboration between Russia and China, in targeting Canada’s defense priorities. The CAF has committed additional resources to the region, including maintaining a continuous submarine presence. Currently, HMCS Ville de Québec is set to join the United Kingdom’s Carrier Strike Group deployment in the Indo-Pacific, and the Royal Canadian Navy has been participating in freedom of navigation movements alongside allied countries in the Taiwan Strait. Moreover, Indo-Pacific nations have expressed increased interest in developing defense partnerships with Canada, agreements that have the potential to boost the DND and CAF’s regional presence. In May 2025, South Korea’s Hanwha Ocean and Hyundai Heavy Industries visited Ottawa and pitched a plan valued at C$20 billion (US$14.57 billion) for submarines and armored vehicles. In the same visit, Hanwha Aerospace proposed a C$1 billion deal to supply DND/CAF with mobile howitzers and rocket-propelled artilleries. This highlights significant opportunities for the DND/CAF to collaborate with like-minded Indo-Pacific partners to enhance Canada’s posture and capacity to deter security threats in the region. Workshop participants specifically identified joining the AUKUS partnership as a significant security benefit to Canada by enhancing the DND/CAF’s Indo-Pacific posture.

In the Atlantic Council workshop focused on geopolitics, experts emphasized how China presents a complex and multifaceted challenge that extends beyond traditional defense concerns. China’s economic and trade power, its technological capabilities, and the large Chinese diaspora in Canada all contribute to China’s multifaceted presence. Given this issue, a major challenge for Canada that stood out among workshop participants is the shortage of China experts within the DND and CAF. Although fostering the next generation of China experts requires significant time and investment, doing so is essential to ensure that world-class China assessments are included in broader strategic considerations that include alignment of domestic and foreign policy approaches toward China. While much of the current focus on China surrounds trending topics such as artificial intelligence and critical minerals, it is crucial for the DND/CAF to also deepen its understanding of China’s internal politics and how these dynamics shape its defense posture. These insights could inform DND/CAF’s strategic response to security threats.

In addition to the DND/CAF’s engagements in other regions, it is important to consider the US position in Canada’s security context. The United States and Canada have numerous shared strategic interests, including in addressing authoritarian adversaries, and have collaborated across many bilateral defense initiatives such as NORAD, which plays a critical role in protecting the countries’ respective airspaces. Canada has played an important role in modernizing outdated NORAD tracking systems and there is talk amongst experts on potentially increasing Canada’s contributions to North America’s missile-interceptor defense capabilities. Workshop participants emphasized the need to reaffirm Canada’s commitments to NORAD by investing more money in upgrading NORAD equipment.

However, the bilateral relationship has been tested by recent disagreements centered on tariffs and trade, given the importance of the trading relationship between the two countries (totaling around $1 trillion annually). During a March 2025 trip to Washington, Canadian Prime Minister Mark Carney announced his intention to reduce Canada’s reliance on US military equipment, including a reconsideration of a previous commitment to purchase F-35 fighter jets. A Canadian exit from the F-35 agreement would signify considerable change in the current US-Canadian defense procurement process, which is established by the Defense Production Sharing Agreement—a unique and long-standing bilateral agreement that seeks to integrate US and Canadian military collaboration to align both countries’ defense industrial bases for shared defense needs.

An ongoing concern regarding Canada’s relationship with the United States and other transatlantic NATO partners is its continued shortfall in meeting NATO’s 2 percent spending guideline (i.e., the expectation for each NATO member state to allocate at least 2 percent of gross domestic product to defense spending). Currently, Canada allocates approximately 1.4 percent of its GDP on defense. Initially, Carney pledged that Ottawa would reach the 2 percent threshold by 2030 through increased investments in rearmament, Arctic infrastructure resilience, submarine procurement for enhanced underwater capabilities, and increased shipbuilding initiatives. Most recently, NATO member states agreed to increase their defense spending to 5 percent of GDP. Canada also signed a deal with the European Union for Canadian companies to participate in ReArm Europe.

However, workshop participants underscored the importance of establishing a more credible and consistent defense-spending track record to demonstrate Canada’s renewed strategic commitment to its transatlantic allies. While Carney’s new pledge to reach the 2 percent defense-spending target within the year is an improvement, it is not sufficient in today’s threat environment—particularly as other NATO allies like Belgium and Denmark have already met the 2 percent GDP benchmark more quickly1 and Canada has previously shown a lack of commitment to reaching the target. Canada must promptly meet this 2 percent target (and ultimately the new 5 percent pledge) to dispel previous assumptions about Canada’s commitment to the Alliance. If Canada fails to meet the target numbers quickly and robustly, this will undermine the CAF’s capacity to effectively collaborate with Canada’s traditional allies on critical security issues including the war in Ukraine.

Firefighters tackle a wildfire near the town of La Ronge, Saskatchewan July 5, 2015 REUTERS/Saskatchewan Ministry of Government Relations/Handout via Reuters.

Climate change

Canada is the world’s second-largest country by land mass, with a coastline of 151,019 miles and nearly 40 percent of its geography considered Arctic. Climate change is increasingly impacting Canadian national security, with melting ice and rising sea levels, as well as extreme climate disruptions threatening the country’s population, infrastructure, and natural resources. Canada’s defense, economic, and technology ecosystems face vulnerabilities from climatic disruptions that the DND and CAF must address for the changing security landscape of the future.

The Arctic is experiencing a major transformation, becoming one of Canada’s most strategically challenging threats to manage. To surveil and exercise the defense and security of the Arctic region, CAF stations around 500 full-time military personnel alongside 1,800 Canadian Rangers year-round through operations like NANOOK. Their presence is tasked not only for military safety and security threats, like understanding operational challenges of the environment, developing unique skill sets, and evaluating equipment for extreme weather conditions, but to respond effectively to climate emergencies through Operation LENTUS. With no national emergency or disaster management authority in Canada, the CAF is frequently deployed for relief missions to protect populations around the country alongside local, provincial emergency-management responders. With climate change worsening, the frequency, duration, and intensity of CAF deployments throughout the region are increasing.

The Arctic’s higher than average global temperatures are melting ice and raising sea levels faster than in other regions around the world. This difference, known as Arctic amplification, is creating glacier retreat, ice thinning, coastal erosion, and permafrost thawing, which damage the Indigenous communities, roads, houses, water supplies, industry pipelines, and waste disposal structures in northern Canada. These effects have serious implications for the CAF, placing competing demands and priorities on its resources and training. The CAF’s bandwidth is limited and requires decisions about which capabilities it will use for various missions. Waterways that flood local communities pose regional disruption, and the increasing Russian and Chinese maritime and aerial presence threatens how the CAF operates in the Arctic. With forces dividing their time and equipment between disaster response and critical defense training to defend Canada of threats in the deteriorating global security environment, CAF readiness is at risk of being overburdened and underfunded. Deploying CAF is expensive, and these funds are decreasing the amount available in the operational DND budget, creating concerns over maintenance and readiness. Additionally, the CAF equipment utilized for national disaster response is not what is appropriate for helicopter evacuation operations, for example, because it is designed for warfighting.

The effects of climate change and demand for CAF assistance are not limited to the Arctic and melting ice. Extreme climate disruptions including drought and heat have severely affected provinces across the country, as a surge in wildfires affects Saskatchewan, Manitoba, British Columbia, Alberta, and Ontario. Rising fire risk has demanded that CAF provide evacuation support across the provinces, particularly in sparsely populated rural regions home to Indigenous communities. Rising frequency and expanding areas of impact have strained CAF’s ability to provide timely emergency response.

Lead satellite controller Michael Arsenault works at the offices of Telesat, a Canadian satellite communications company, in Ottawa, Ontario, Canada March 24, 2021. Picture taken March 24, 2021. REUTERS/Blair Gable.

Emerging technology

Emerging technologies are important pieces within Canada’s national security landscape. Canada possesses operational niche strengths across several key technological areas, including nuclear energy, space, and artificial intelligence. Although Russia and China currently dominate the global uranium supply chain, Canada possesses the world’s largest high-grade uranium supply deposits and has significant potential to leverage its uranium production to advance its civilian nuclear industry in emerging innovations. This potential is reinforced by current innovative initiatives, such as the construction of small modular reactors in Ontario. In the space sector, Canadian companies like Telesat have developed satellite constellations that rival major players such as SpaceX’s Starlink and Amazon’s Kuiper, offering competitive services with a smaller environmental impact. Furthermore, with 3 percent of the world’s top-tier AI researchers and the G7 leader in AI-related scholarly outputs per capita, Canada is well-positioned to emerge as a global leader in AI. Ultimately, investment and procurement in these and other emerging technologies are crucial to Canadian national security.

However, Canada faces numerous challenges in this space, particularly within the defense procurement system, that hinder the DND and CAF abilities to effectively develop, acquire, and use advanced technologies. Workshop participants highlighted the fragmented aspects of Canada’s defense procurement process, which has no centralized authority to coordinate efforts and lacks transparency. Participants also highlighted the scale issue within the defense procurement process. While Defense Research and Development Canada and other departments are investing in Canadian start-ups to boost the country’s defense industrial base, these efforts are insufficient to sustain the companies’ operational costs throughout long procurement processes. As there is also limited domestic investment from the civilian sector, many tech start-ups simply do not have enough capital to remain operational. Instead, they prioritize commercial ventures, which are typically more profitable and accessible, over the highly competitive defense industry.

Alternatively, Canadian defense start-ups often pursue opportunities in foreign defense markets, which are often more lucrative and viable for sustaining operations. Some emerging technology companies initially founded to advance Canadian defense priorities had to shift toward commercialization and secured contracts in other regions, such as the Nordic region, for an extended period before having an opportunity for domestic Canadian defense contracts. This reflects a common trend among Canadian tech start-ups, where they are forced to procure investment abroad to remain operational, despite their potential value to national defense. Experts in the workshop emphasized the need for the DND and CAF to support investment in these domestic defense start-ups and prioritize dual-use companies, which can develop critical defense operational capabilities, while also generating commercial returns that can support the company’s long-term viability.

Technology start-ups also can be supported through shortening defense procurement cycles and reducing the burden on companies to fully develop their technology before seeking investment. In the workshop, US defense experts noted the success of the US Department of Defense’s program providing grants to start-ups in the ideation phrase, allowing these companies to test their technologies and foster innovation without the immediate pressure of securing capital. This model is particularly relevant for Canadian start-ups that often face funding constraints and thus are discouraged from pursuing defense innovation in an uncertain domestic market where capital is not guaranteed. Moreover, by providing early-stage grants, start-ups are more likely to agree to licensing their technology exclusively for the DND and CAF, bolstering Canada’s defense capabilities. Current programs such as NATO’s Defence Innovation Accelerator for the North Atlantic (DIANA) help accelerate the defense procurement process. However, workshop participants believe that these programs do not have enough investment capital to fully service Canada’s vast technological talent and, moreover, are not adequately advertised to start-ups.

The Canadian government has begun to address reforms needed to bridge the well documented “valley of death” for defense procurement. Representatives in the workshop noted the whole-of-government effort outlined in the Defence Procurement Reform of 2025 as progress toward addressing these issues, but other experts argued that there needs to be further collaboration among government agencies, the defense industry, and civilian companies. Strengthening these relationships could involve the DND and CAF partnering with civilian firms and academia to provide a secure environment for testing experimental technologies using real data and providing shared secure facilities for civilian firms. Within the defense industry, the Canadian government can encourage bigger defense contractors to engage and work with innovative Canadian start-ups, elevating smaller emerging technological firms. Enhancing collaboration across all sectors of Canada’s defense apparatus would allow the DND and CAF to more effectively identify up-and-coming technologies that best suit Canada’s defense needs and ensure they fully capitalize on the most advanced innovations available.

Workshop participants also highlighted the importance of personnel and talent. While Canada has skilled tech experts, it experiences a brain drain as many are drawn to higher paying commercial opportunities in the United States or elsewhere. The DND and CAF could capitalize on dual-hatted uniformed members who work in commercial industries, provided there is no conflict of interest, to drive defense technological innovations, as they are well suited to understanding commercial and defense needs. Furthermore, the DND and CAF could recruit and retrain veterans who can also provide the operational expertise and specialized technological knowledge needed to innovate emerging defense technologies. Ultimately, a culture shift is needed to rekindle innovation in the Canadian talent pool to include a stronger commitment to advancing domestic defense capabilities. Encouraging Canadian technological experts to apply their expertise toward national defense and motivating domestic investors to support domestic defense companies would better enable the DND and CAF to attract, develop, and retain Canada’s skilled workforce.

In addition to looking inward to strengthen Canada’s emerging defense ecosystem, Canada should also work closely with its allies to mutually reinforce each other’s operational strengths. Workshop participants stressed that Canada has a small population and GDP in proportion to its large landmass, making it difficult to fully capitalize on its defense potential. The recent agreement at the Canada-EU summit, allowing Canadian companies to take part in the EU’s $1.25 trillion ReArm Europe program, highlights the strong interest from foreign governments in partnering with Canada’s defense sector. Canada should build on this momentum by pursuing similar partnerships with like-minded allies and encouraging investment in domestic defense companies to boost homegrown innovation and continue to build up the domestic emerging dual-use technology ecosystem.

Conclusion

Canada’s role as a middle power is actively evolving due to geopolitical and climate changes. The DND and CAF need to adopt new strategies to address the changing threat landscape to better achieve their respective missions. There is a clear strategic need to leverage and invest in Canada’s comparative advantage in emerging technologies and deepen partnerships with allies to address these issues and further its defense leadership in important regions such as the Arctic, which is pivotal to Canada’s security. Here are some recommendations drawn from the three workshops and desk research to support the DND and CAF’s mission.

Canada’s Prime Minister Stephen Harper stands on the front deck of the HMCS Kingston as a Coast Guard helicopter passes by on Eclipse Sound near the Arctic community of Pond Inlet, Nunavut August 24, 2014. REUTERS/Chris Wattie.

Recommendations for the DND/CAF

1. Canada should develop an annual whole-of-government national security strategy to clearly communicate its security priorities to allies and the international community, and to provide a unified framework for governmental departments and private industries to align their efforts.

The Canadian administration’s grand strategy is currently driven by fragmented reports and mission statements that, together, inform its broader defense posture. The Department of National Defence is primarily guided by its latest strategy, Our North, Strong, and Free, but Canada currently lacks a unified, whole-of-government strategy which communicates national defense priorities to both allies and adversaries. While the DND acknowledges the importance of maintaining a regular strategy, the latest Canadian strategy provides for an update every four years—which is inadequate given how much can shift in the geopolitical, environmental, and technological landscapes within a single year. By publicly articulating a yearly coherent national security strategy, the Canadian government can transparently signal its defense intentions to the international community and be more responsive to the ever-evolving threat landscape. This step would enable allies and partners to align more effectively with Canada on shared objectives and deter adversaries by clearly defining boundaries Canada is committed to upholding.

2. Due to the High North’s vital role in defending Canadian national security, the Arctic should be the priority for both the DND and the CAF, with defense efforts in other regions supporting this overarching focus.

Given the growing geopolitical and climate considerations of the region, a Canadian national security strategy should clearly articulate the Arctic region as Canada’s top defense priority, particularly since securing the High North has become essential to Canadian domestic security. A cohesive, whole-of-government national security strategy centered on the Arctic would not only safeguard Canada’s High North interests but also bolster its position in other key regions, particularly the transatlantic and Indo-Pacific theatres. As both Russia and China have shown strategic interest in the Arctic that poses challenges to Canadian security, prioritizing this region and formulating a strong defense strategy would enable Canada to enhance its independent influence and engagement globally.

3. The Canadian military establishment must maintain its relationship with the Pentagon while also working to diversify its partnerships for defense needs such as military-equipment procurement.

The United States will always be Canada’s closest ally due to its shared border, common values, mutual threats, and long-standing defense cooperation. This close working relationship must be maintained. Canada can achieve this by prioritizing NORAD modernization and enhancing its defense capabilities, including the development of interceptors to support US efforts in safeguarding the North American continent and the shared border. However, the DND and CAF should also actively support Canada’s efforts to diversify its defense partnerships by engaging with like-minded allies, particularly those with comparable defense and industrial capabilities, such as Japan, South Korea, and Sweden. These countries align well with Canada’s role as a middle power focused on strategic stability. Strengthening ties with Nordic and Arctic NATO members is essential, as they share similar Arctic interests and are likely to pursue comparable defense technologies tailored to the High North. Canada can advance this goal by investing in initiatives like NATO’s DIANA in collaboration with other like-minded partners, such as AUKUS, to more effectively promote joint defense innovation and interoperability. Moreover, Canada can draw valuable lessons from the experiences of smaller states in rapidly and efficiently increasing their defense spending, particularly from how Denmark and Belgium were able to meet NATO’s defense budget targets within a short time frame. Likewise, Canada can emulate Finland’s experience in expanding naval and shipbuilding capacity in a cost-effective manner.

4. The Canadian government should create a national disaster management and response body similar to the original purpose and structure of the US Federal Emergency Management Agency (FEMA) to limit the extent to which CAF forces are deployed to manage Canada’s increasing climate disruptions.

Damaging effects of climate change will only increase in the future. The Canadian government must recognize the country’s increasing vulnerability to climate change and its fragmented system of disaster response that relies on provincial leadership. The government needs to proactively build a national force with adequate equipment designed for disaster response and resilience dedicated to managing climate emergencies without relying on CAF personnel and resources. This FEMA-like force should be managed by Public Safety Canada—and reinforced with coordination efforts for information sharing and joint training exercises with the DND and CAF.

5. The DND and CAF should prioritize investment in scalable, climate-resilient infrastructure in the Arctic and North, ensuring that funds associated with Our North, Strong and Free are directed to designing airstrips, logistics facilities, and equipment prepared for flooding and increased adversary activity.

Climate change is the most pressing and proximate threat both to Canadian security in the Arctic and to the communities there. Expanding the amount of CAF architecture/presence requires consideration of the region’s evolving threats of higher sea levels and new opportunities for foreign adversaries to covertly or overtly operate in the Canadian Arctic.

6. The DND and CAF must continue to maintain their partnerships with Indigenous communities to improve Arctic navigation and operational skills in line with the Arctic and Northern Policy Framework.

Cooperation with Indigenous groups supports understanding of the evolving northern environment and infrastructure affected by climate change. The CAF should establish new operations (like NANOOK) focused not only on defense to assert its presence and sovereignty in the North, but strategizing for increasing climate disruption. The CAF should also integrate Indigenous expertise into the new Northern Operational Support Hub locations to improve surveillance, resilience, and responsiveness across the Arctic.

7. The DND and CAF should work with the Defence Research and Development Canada (DRDC) to prioritize domestic investment and commit to reaching the 5 percent defense spending goal by collaborating closely with Canadian industry and academia. This approach would strengthen Canada’s defense capabilities and contribute more meaningfully to Canada’s alliances by offering capabilities that are valuable to its partners.

The DND and CAF should accelerate progress toward meeting the new NATO defense spending target of 5 percent. A key part of this effort involves strengthening collaboration with Canadian industry and academia to drive innovation in emerging technologies critical to national defense. To that end, the DND and CAF should work closely with DRDC to further invest in initiatives, such as NATO’s DIANA, which help to accelerate the development of emerging dual-use technologies and develop secure dual-use shared facilities to foster innovation in high-level, dual-use applications. Such efforts can help shorten procurement cycles, reduce reliance on foreign funding for companies to remain operational, and stimulate dual-use innovation. Leveraging and recruiting the right talent is also essential for the DND and CAF, such as engaging military reservists with commercial-sector experience, recruiting veterans with operational expertise into transitioning back into defense-related industries, and working closely with Indigenous rightsholders on climate and environmental technologies. By prioritizing domestic innovation and talent recruitment in emerging defense technology, Canada can move more quickly toward the original 2 percent NATO defense spending target and the new 5 percent target while also sending a credible signal to allies of its commitment to shared defense goals.

8. The DND and CAF need to work with other government agencies to target investments in niche operational capabilities that play to Canada’s advantage.

The DND and CAF also should collaborate with other government agencies to strategically direct investments toward operational capabilities that align with Canada’s unique strengths. Given Canada’s small population and dispersed infrastructure in comparison with its vast geography (unlike larger nations such as the United States or China), it cannot pursue defense capacity building across all areas equally. Instead, Canada should focus on its existing operational advantages in specialized sectors such as space, nuclear technology, and artificial intelligence. By prioritizing and enhancing these niche strategic defense capabilities, the DND and CAF can position Canada as a global leader in these fields. This approach would allow Canada to contribute high-value capabilities to allied partnerships, such as AUKUS, and encourage deeper collaboration by offering Canada’s specialized logistical assets and comparative advantages.

About the authors

Peter Engelke is a senior fellow with the Atlantic Council’s Scowcroft Center for Strategy and Security as well as a nonresident senior fellow with its Global Energy Center.

Ginger Matchett is a program assistant with the GeoStrategy Initiative in the Atlantic Council’s Scowcroft Center for Strategy and Security.

Samantha Wong is an assistant director with the Atlantic Council’s Global China Hub.

Learn More

Acknowledgements

The Atlantic Council would like to thank its partner, The Department of National Defence’s Mobilizing Insights in Defence and Security (MINDS) program, for supporting the Council’s work on this publication.

Explore the program

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

1    In April 2025, Belgium announced it will increase defense investment to reach NATO’s 2 percent GDP target by the end of the year, and not by 2029 or 2035 as previously pledged. Likewise, the Danish government has established an Acceleration Fund to build up the Danish Armed Forces, increasing defense spending to 3 percent of GDP, surpassing the 2 percent benchmark, and a notable increase from just 1.65 percent in 2023.

The post Defining Canada’s threat landscape: Resetting for a new reality appeared first on Atlantic Council.

]]>
Torres publishes on China’s economic statecraft in Latin America https://www.atlanticcouncil.org/insight-impact/in-the-news/torres-publishes-on-chinas-economic-statecraft-in-latin-america/ Tue, 29 Jul 2025 18:40:34 +0000 https://www.atlanticcouncil.org/?p=862637 On July 16, Forward Defense nonresident senior fellow Guido Torres published an article, "Development or Dependence? Rethinking China’s Economic Playbook in the Americas," on the Irregular Warfare Initiative's website.

The post Torres publishes on China’s economic statecraft in Latin America appeared first on Atlantic Council.

]]>

On July 16, Forward Defense nonresident senior fellow Guido Torres published an article, “Development or Dependence? Rethinking China’s Economic Playbook in the Americas,” on the Irregular Warfare Initiative’s website. In the article, Torres discusses how China is using economic statecraft across Latin America and the Caribbean as a form of irregular warfare, leveraging infrastructure, trade, finance, and diplomacy to build strategic influence and dependency, while urging LAC nations and their partners to recognize and counter this coercion to protect their sovereignty.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Torres publishes on China’s economic statecraft in Latin America appeared first on Atlantic Council.

]]>
Torres interviewed by Expediente Público on China’s access to South American aerospace https://www.atlanticcouncil.org/insight-impact/in-the-news/torres-interviewed-by-expediente-publico-on-chinas-access-to-south-american-aerospace/ Tue, 29 Jul 2025 18:26:19 +0000 https://www.atlanticcouncil.org/?p=859881 On June 11, Forward Defense nonresident senior fellow Guido Torres was interviewed by Expediente Público on the topic of China’s growing aerospace presence in South America and its implications for transparency, sovereignty, and regional security.

The post Torres interviewed by Expediente Público on China’s access to South American aerospace appeared first on Atlantic Council.

]]>

On June 11, Forward Defense nonresident senior fellow Guido Torres was interviewed by Expediente Público on the topic of China’s growing aerospace presence in South America and its implications for transparency, sovereignty, and regional security. Torres warned that China is leveraging space cooperation agreements in South America, particularly in Argentina and Chile, to establish facilities that may serve dual-use (civilian and military) purposes, raising concerns about transparency and sovereignty.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Torres interviewed by Expediente Público on China’s access to South American aerospace appeared first on Atlantic Council.

]]>
Daniel B. Shapiro testifies before the Senate Subcommittee on Near East, South Asia, Central Asia, and Counterterrorism https://www.atlanticcouncil.org/commentary/testimony/daniel-b-shapiro-testifies-before-the-senate-subcommittee-on-near-east-south-asia-central-asia-and-counterterrorism/ Thu, 24 Jul 2025 16:47:55 +0000 https://www.atlanticcouncil.org/?p=863169 Daniel B. Shapiro testifies before the US Senate Subcommittee on Near East, South Asia, Central Asia, and Counterterrorism on US diplomatic strategies for a dynamic Middle East.

The post Daniel B. Shapiro testifies before the Senate Subcommittee on Near East, South Asia, Central Asia, and Counterterrorism appeared first on Atlantic Council.

]]>

On July 23, 2025, Daniel B. Shapiro, distinguished fellow at the Scowcroft Middle East Security Initiative in the Atlantic Council’s Middle East Programs, testifies before the US Senate Subcommittee on Near East, South Asia, Central Asia, and Counterterrorism on US diplomatic strategies for a dynamic Middle East. Below are his prepared remarks.

Mr. Chairman, Ranking Member Rosen, distinguished Members of the Subcommittee, thank you for the opportunity to testify today at this critical moment for U.S. policy in the Middle East.

It is a critical moment because it presents a once-in-a-generation opportunity to help reshape the Middle East in ways that will bring more peace and prosperity, and less conflict and violence to those who live in the region, and will bring significant benefit to the interests of the United States. In every moment of opportunity, there is also risk, including the risk of missing the mark and losing the window to achieve the greatest possible gains. So I thank you for this timely hearing that I hope can shed some light on the best path forward.

The huge opportunity flows from the steady progress in the region toward greater integration from 2020 to 2023, then the tragedy of Hamas’ vicious terrorist attacks against Israel on October 7, 2023, and then the response of various actors in the war that followed.

In the nearly 21 months since the attacks, a combination of Israeli and U.S. military power has dealt blow after to blow to the Iranian-aligned Axis of Resistance: Hamas, which began the war; Hezbollah, which entered the war on October 8; the Houthis in Yemen; Shia militia groups in Iraq and Syria; and, ultimately Iran itself. Along the way, Iran’s key regional partner, the Assad regime in Syria, crumbled when neither its Iranian, Russian, nor Hezbollah allies were able to rescue it. All told, Iran is at its weakest point in decades.

The scale of the Iranian miscalculation is immense. First, Iran encouraged their chief proxy, Hezbollah, to engage in a war of attrition with Israel. At a moment of Israel’s choosing, in a series of dramatic attacks, Israel decimated Hezbollah’s strategic weapons, leadership, and fighters, which left the organization unable to carry out the mission for which it was built — to serve as a deterrent or second strike capability to protect Iran from Israeli or American attack. Hezbollah’s collapse also produced a dramatic change in the policy of the Lebanese government, which may result in the terror group’s disarmament and marginalization.

Second, Iran twice abandoned its longstanding caution, wherein it sought to avoid direct confrontation with Israel or the United States and to fight asymetrically and via proxies. On April 13 and October 1 of last year, Iran launched two massive, overt, state-on-state acts of war against Israel — hundreds of ballistic missiles, cruse missiles, and drones. Israel’s air and missile defense, buttressed by U.S. support, and in April, by an international coalition, largely defeated these attacks. But these events are critical context to the events last month when Israel and the United States conducted strikes against Iran’s nuclear facilities. That war did not begin on June 13, 2025. It began 14 months earlier.

I believe the military confrontation with Iran that unfolded over 12 days in June was necessary and inevitable. President Trump was right to seek a diplomatic deal with Iran, and right to demand that Iran give up its uranium enrichment capability — which enables them to produce the material needed to produce nuclear weapons. It was never likely that Iran would agree to those terms, and certainly not without a credible military threat. 

I supported the Joint Comprehensive Plan of Action when it was signed in 2015 as the best available way to buy the most time on the Iranian nuclear program. I opposed the United States’ withdrawal from the JCPOA without a better plan in 2018, which cost us some of that time. But those positions ten and seven years ago were not relevant to the situation we faced in 2025. The fact is that Iran was far too close for comfort to producing a nuclear weapon, and it had to be stopped.  

Three things had changed. First, the IAEA documented that Iran possessed over 400 kg of 60 percent enriched uranium, enough for 10 bombs, with the ability to enrich it to 90 percent (weapons grade) within days. Second, Iranian nuclear scientists over the previous year had engaged in various activities and research that would significantly shorten the time for them to build a weapon — a separate process from enrichment — if and when they got the order from their leadership to do so. And third, Iran’s decision to attack Israel directly twice last year fundamentally changed the calculus of what they were willing to do and what they could do. If any one of the ballistic missiles that reached Israel were tipped with a nuclear warhead, we would be in a different world. The Supreme Leader of Iran, Ayatollah Ali Khamenei, who has long called for Israel’s destruction, was dangerously close to having the ability to carry it out.

The Israeli campaign, fueled by deep intelligence penetration of the Iranian system, did significant damage to Iranian nuclear facilities, air defenses, its ballistic missile production and launching capabilities, and high value targets in the Iranian military, IRGC, and nuclear program. Operation Midnight Hammer ordered by President Trump against Fordow, Natanz, and Isfahan, using unique U.S. capabilities, caused additional grave damage to those sites. President Trump’s initial comment that their nuclear sites were “totally obliterated” preceded the technical collection of a battle damage assessment, which takes weeks, and implied, probably inaccurately, that their nuclear program is completely out of business. But based on my understanding of the munitions used and the success of their deployment, those sites will not be usable for enrichment or uranium conversion for a significant period of time — time we can perhaps extend through a range of means.

None of this means the threats posed by Iran and its proxies are eliminated. They may be down but not out. Iran likely retains its highly enriched uranium stockpile, although it may or may not have current access to it, and it could have the ability and motivation to try to sprint to enrich it to weapons grade and build a crude nuclear device. A much-degraded Hamas continues to fight Israel in Gaza, and Hezbollah has not given up hopes of rearming. The Houthis — which the Biden Administration struck in a series of deliberate and self-defense engagements over months, and the Trump Administration struck in an intense campaign over weeks — retain capability to attack Israel and to disrupt shipping in the Red Sea, which they have recently resumed doing with deadly results.

But the gains produced by military power over the last 21 months are significant. Now we need to use all the tools at our disposal, not just military tools, to consolidate those gains.

In a moment, I will pivot to the main focus of this hearing, which is the diplomatic path forward. But, following my service at the Department of Defense in the last year of the Biden Administration, I would be remiss if I did not emphasize that there will remain a critical need to maintain a robust U.S. military capability in the region in the period ahead, and that doing so enhances our ability to seize diplomatic opportunities.

Briefly, Israel’s military dominance in the region is undisputed, with air superiority from the Mediterranean to Tehran. Not every problem in the region is a nail that should be addressed with a military hammer. But that capability can work in tandem with a steady U.S. posture to deter our adversaries, who, as mentioned, continue to pose threats — whether Iran’s reconstitution of its nuclear program, its threat to shut down shipping in the Strait of Hormuz, or Houthi aggression. A sustained U.S. presence also provides reassurance to our friends that we will not abandon the field. These friends include Egypt and Jordan, in whom we invest with military assistance, and Gulf states, which host many of our forces and which President Trump visited and secured further investments in our military partnerships. Our partnerships also help ensure these countries will not turn to Russia or China as security partners.

Perhaps most important is the role of U.S. Central Command (CENTCOM). With Israel’s integration into CENTCOM in 2021, and the deep trust and interoperability built up by CENTCOM and the Israel Defense Forces over these past 21 months, we have an extraordinary combined ability to deter and respond to threats. Beyond cooperation with Israel, CENTCOM serves as the convener and integrator of U.S. military partners across the region. Thanks to our unique capabilities, enduring presence, and CENTCOM’s exceptional leadership, U.S. partners in the Middle East look to us to shape the security environment and coordinate responses to key threats, strengthen their capabilities, conduct bilateral and multilateral exercises, convene high-level strategic exchanges, improve interoperability, and continue to build out an Integrated Air and Missile Defense architecture.

Turning to the diplomatic opportunities, we should keep our eyes on these mutually reinforcing strategic objectives of: 1) bringing this period of regional conflict to a close and transitioning to a period of sustained stability; 2) expanding the circle of regional integration that was broadened by the Abraham Accords; 3) deterring and defanging the threats to the United States and our allies and partners posed by Iran, and preventing a resurgence of Iran’s regional influence through its terrorist proxies; and, 4) building a more sustainable regional order led by a network of U.S. partners including Israel and Arab states, with the United States as an active participant but at a scale that also enables adequate attention to critical interests in other regions.

With the remainder of my time, I would like to propose a number of key initiatives in support of these objectives.

First, help achieve a permanent end to the war in Gaza, with a fully developed day-after plan that releases all hostages, protects Israel’s security, removes Hamas from power, provides relief for Palestinian civilians, and enables regionally-supported reconstruction for Palestinians who want to live in peace with Israel.

Our other goals of expanding regional integration cannot get off the ground until the Gaza war ends. A 60-day ceasefire would bring much-needed relief, but it must transition into the end of the war without a return to fighting. That will require Israel agreeing to certain terms, but also intense pressure on Hamas brought by Qatar and other international actors. That is the first key to getting Arab states involved with the next phase of reconstruction. 

At the moment, the risk is that we will a slide into the only alternative: a full-scale Israeli occupation of Gaza, with more dead hostages, more dead Palestinian civilians, more dead Israeli soldiers, no positive involvement by Arab states, and deepening isolation of Israel. In the immediate period, which we all hope will soon see a ceasefire, the United States should:

  • Withdraw President Trump’s misguided Gaza Riviera proposal, which has emboldened the most extreme members of the Israeli cabinet to press for full occupation, the massing of Palestinian civilians in a camp along the Egyptian border, and the removal of much of the Palestinian population from Gaza. Those Gazans who wish to leave should, of course, have the freedom to do so, and many countries should be encouraged to receive them. But the mass evacuation of hundreds of thousands or more to a handful of receiving states is not going to happen. If it were done involuntarily, it would be a violation of international humanitarian law and constitute ethnic cleansing. These ideas are widely rejected across the region, will discourage Arab states from helping stabilize Gaza, and even delegitimize more reasonable efforts to help individual Palestinians who wish to relocate to do so.
  • Enable a vastly improved mechanism to provide humanitarian aid to Palestinian civilians in Gaza. There is a legitimate problem of Hamas hijacking aid provided through international organizations and using it for themselves and for political power. Hamas bears much responsibility for the hunger crisis in Gaza. But the Gaza Humanitarian Foundation (GHF) alternative is vastly insufficient, and has been deeply flawed and dangerous in its design, leading to far too many deaths of civilians attempting to access it, many caused by IDF fire. Getting aid directly into the hands of Palestinian civilians and prevent its hijacking to Hamas’s benefit is a worthy goal, and the only solution is to flood the zone with so much aid that it is easy to access and loses its market value. With hunger becoming more widespread across Gaza, Israel should be enabling international organizations and GHF to distribute aid across the entirety of Gaza, not limited to a handful of distribution points.
  • Press Israel to revise their targeting protocols to minimize civilian casualties. Hamas leaders and fighters remain legitimate targets, and the challenge of their using civilians as human shields remains. But the civilian toll of many recent strikes has been too high, and Israel has admitted to numerous recent mistakes.

Regarding day-after planning, the United States should:

  • Make clear that the terms for the permanent end of the war require the release of all Israeli hostages and the departure from Gaza of a critical mass of Hamas leaders and fighters, with the support of Arab states, for exile in distant locations, sufficient to ensure Hamas is completely removed from power. Arab states should be encouraged to speak in unison and join Palestinian Authority President Mahmoud Abbas’ call for Hamas to leave Gaza. A U.N. Security Council resolution could follow. The United States should organize plans for this departure, drawing on the 1982 evacuation of the PLO from Beirut.
  • Organize an Interim Security Mission for Gaza (ISMG), with U.S. leadership based outside Gaza, enabling troops from Arab states such as Egypt, the UAE, and Morocco, and possibly non-Arab states such as Indonesia, to secure humanitarian aid delivery, border crossings, and basic law and order. The ISMG would enable the gradual introduction of Palestinian Authority Security Forces, which should be trained for this mission under the supervision of the Office of the Security Coordinator in Jerusalem under the continued leadership of a U.S. 3-star general or flag officer.
  • Work with Arab states on the installation of improved leadership of the Palestinian Authority and the establishment of Gaza leadership linked to the PA and supported by Arab states such as the UAE and Saudi Arabia, with help in governance, training, and education, and reconstruction funded by a range of Arab and international states. Arab states will only play this role, however, if they see it linked to the establishment of a future Palestinian state. So it will be necessary to find the proper expression of this vision, even if the timelines will be longer and the dimensions different than those envisioned in previous peace efforts. 
  • Articulate strong opposition to any Israeli moves toward annexation in the West Bank, and urge Israeli and Palestinian security forces to act to prevent violence by their own sides, as instability in the West Bank could damage prospects for stability in Gaza and harm prospects for regional integration. I commend U.S. Ambassador to Israel Mike Huckabee for his recent highlighting of the importance of Israel holding extremist Israelis who commit violent acts to account.

Second, work toward the continuation and expansion of the normalization and integration process marked by the Abraham Accords, which has stalled but not receded during the war. Specifically, the United States should:

  • Prioritize discussions with Saudi Arabia on the timing, conditions, and mechanism of normalization with Israel. Nothing would do more to reshape the politics of the region that normalized relations between the most influential Arab and Muslim state and Israel. The Saudis seek expanded security cooperation with the United States, which we should be prepared to grant, provided the Kingdom meets U.S. needs that protect our interests in the region and regarding competition with China, including strict limits on Saudi-Chinese military cooperation. We should be mindful that Saudi officials have consistently made clear that a requirement for them to normalize relations with Israel is the establishment of a pathway to a Palestinian state — a bar that may be impossible for the current Israeli government to clear — and they are sensitive to extensive Israeli operations and holding of territory in Syria and Lebanon. Continued work on the framework of this triangular deal can take place even if its ultimate fulfillment may be more likely in 2027 than this year.
  • Prepare to resume the work of the Negev Forum as soon as possible after the war ends. This standing group of Israel, the United States, and four Arab states (UAE, Bahrain, Egypt, and Morocco) includes six working groups and a structure for multilateral projects aimed at bringing the benefits of regional integration to their citizens. As early as possible, a Negev Forum ministerial should be held, with additional invitees such as Jordan, Mauritania, and Indonesia, and activity should resume in the working groups. The Atlantic Council’s N7 Initiative, which I led in 2022-2023, is poised to support the Negev Forum as it has in the past.
  • Appoint and confirm the Special Envoy for the Abraham Accords that Congress created in the NDAA for FY2024. The appointment of a high-profile envoy in this role will communicate the United States’ seriousness about expanding these agreements, and provide important buttressing to the work of Special Envoy for the Middle East Steve Witkoff.
  • Elevate the work of the House and Senate Abraham Accords Caucuses, which is essential to add the expertise and jurisdictional focus of their diverse members and to convey the bipartisan commitment to expanding regional integration.
  • Continue work toward a non-belligerency agreement between Israel and Syria that reaffirms the 1974 Disengagement Agreement, supports connections between Israeli and Syrian Druze communities, and allows for limited economic, environmental, water, and health cooperation, without the need to address the final status of the Golan Heights. A return of the UN Disengagement Observer Force (UNDOF), enhanced by visits and supervision from CENTCOM representatives, can help stabilize the border region. President Trump’s decision to lift sanctions on Syria is a gamble, but the right gamble, to give the greatest possibility for stabilization of Syria after years of brutal rule and civil war and preventing Iran from exploiting chaos to reestablish a foothold. But the government in Damascus must be held accountable, including for its treatment of minorities and establishment of inclusive governance. Israeli strikes on central government facilities in Damascus are destabilizing and have already become a dangerous factor in Syrian domestic politics; they must be avoided. Finally, it is critical that the United States not withdraw all its forces from Northeast Syria until adequate preparations are in place for proper sustainment of counter-ISIS operations, supervision of ISIS detention centers, and peaceful integration of Syrian Kurdish factions into national institutions.

Third, capitalize on the severe damage to the Iranian nuclear program and the weakening of the Iranian-led axis to secure a long-term improvement in the regional security environment. The United States should:

  • Seek renewed negotiations with Iran to sustain the gains of the military strikes on its nuclear program and prevent the program’s reconstitution. 
  • Insist on full access for IAEA inspectors, the location and removal of Iran’s HEU stockpile, and an assurance of zero enrichment going forward. Separate negotiations will also need to commence on meaningful limits on Iran’s ballistic missile inventory
  • Maintain pressure on Iran toward those ends, by coordinating with UK, French, German, and EU officials on the leverage of, and if necessary the implementation of, JCPOA snapback sanctions, and by devoting additional attention and resources to scaling back Iranian oil exports to China.
  • Make clear that additional military strikes by Israel or the United States are possible if Iran seeks to move, hide, or reconstitute elements of its nuclear program, or if it refuses to give access to IAEA inspectors or exits the Nuclear Non-Proliferation Treaty. Congress should be properly consulted before any such strikes. While the United States maintains escalation dominance, we must nevertheless remain vigilant to deter and defend against potential Iranian or Iranian-sponsored attacks on U.S. bases and personnel or asymmetric attacks on American, Israeli, or Jewish targets anywhere. Iran should be on notice that any attempt to harm current or former U.S. officials will bring an automatic kinetic response, and the United States should coordinate with allies on a common set of diplomatic and economic penalties that would be triggered by hostage taking.
  • Prepare for the possibility of internally-driven regime change. It should not be a policy goal of the United States, nor a project to be achieved by military means. But we must recognize that the regime and its ideology remain the main fuel of destabilization across the region, and are deeply unpopular among the Iranian people due to the regime’s brutality and corruption. We should provide appropriate support to the Iranian people, much as we did for anti-Communist movements in countries under Soviet domination during the Cold War. Our efforts should include enhancing Iranian citizens’ ability to communicate via internet access and to receive accurate information, publicly condemning repression by the regime, sanctioning regime officials responsible for abuses, and highlighting regime corruption that harms the Iranian people. We should develop now a plan to support a transition so we are not caught flat-footed if the Iranian people take matters into their hands, including organizing reconstruction funding from international donors, preparing to unwind U.S. and international sanctions with targets and incentives for the new authorities, planning to provide support for post-conflict transition and institution-building, and coordination with responsible elements of the Iranian diaspora.
  • Continue to support and pressure the Lebanese government and Lebanese Armed Forces in the disarmament of Hezbollah and establishing state institutions as the sole legitimate possessors of the means of force.
  • Develop a whole-of-government approach to combatting and weakening the Houthis, drawing on diplomatic, political, economic, public messaging, intelligence, and military tools, in coordination with Israel, Saudi Arabia, the UAE, and others. 
  • Negotiate with Iraqi authorities to secure a sustained, limited U.S. military posture to support counter-ISIS missions, with full self-defense authorities and capabilities. Our presence in Iraq helps the Iraqi Security Forces succeed in this ongoing effort, provides reassurance to our Kurdish partners, and enables us to balance Iranian influence in Iraq.

Finally, as the war winds down, work should begin now on negotiating the next U.S.-Israel military assistance MOU. 

The current MOU expires in 2028, which means it would be best to have a new MOU in place within a year or so, to ensure no delay in necessary acquisitions. A new MOU should ensure that the United States upholds its legal obligation and national interest to ensure Israel’s qualitative military edge, be grounded in planning for the threats of the next two decades, and provide sufficient funds to rebuild, sustain, and upgrade Israel’s air defense inventory, which has been stretched in multiple defensive engagements. I should note that it is entirely legitimate and appropriate in the context of MOU negotiations and our enduring close security partnership with Israel for the United States to raise questions and concerns about the need for Israel to minimize civilian casualties in its operations and the obligation to ensure the provision of humanitarian assistance to civilians in need. 

This is a hefty list of objectives and priorities to pursue to advance U.S. interests in the Middle East. It takes significant resources to carry out foreign policy initiatives at this scale: personnel with a range of diplomatic experience and expertise; functional and adequately resourced foreign assistance programs in key countries; international broadcasting; and more. If it is left to just a few high-level officials with access to the president, much of the implementation work will not get done. Meanwhile, China is deepening its activity and influence in all these areas everywhere the United States pulls back. 

I am deeply concerned that the Trump Administration’s drastic cuts to personnel at the Department of State, including experts in nuclear diplomacy, sanctions enforcement, and counterterrorism, the elimination of the U.S. Agency for International Development, and the decimation of our international broadcasting capabilities, are leaving us ill-prepared and under-resourced to properly seize the opportunities before us. It will be a terrible own-goal if our own lack of preparation and denial of tools in our own toolkit prevent us from being effective in executing on the long list of priorities we must pursue, thereby providing an advantage to our competitors.

Thank you for the opportunity to testify today. I look forward to answering your questions.


Through our Rafik Hariri Center for the Middle East and Scowcroft Middle East Security Initiative, the Atlantic Council works with allies and partners in Europe and the wider Middle East to protect US interests, build peace and security, and unlock the human potential of the region.

The post Daniel B. Shapiro testifies before the Senate Subcommittee on Near East, South Asia, Central Asia, and Counterterrorism appeared first on Atlantic Council.

]]>
Stephen Rodriguez in War on the Rocks on the defense industrial paradigm https://www.atlanticcouncil.org/insight-impact/in-the-news/stephen-rodriguez-in-war-on-the-rocks-on-the-defense-industrial-paradigm/ Tue, 22 Jul 2025 19:53:20 +0000 https://www.atlanticcouncil.org/?p=862487 On July 22, Stephen Rodriguez, senior advisor at Forward Defense, published a piece in War on the Rocks entitled “Titans, Trailblazers, and Translators: Forging a Unified Defense Industrial Paradigm”. Rodriguez, working at the intersection of the defense industrial base and technologies, identifies a growing tension between the two. To address this challenge to enduring national […]

The post Stephen Rodriguez in War on the Rocks on the defense industrial paradigm appeared first on Atlantic Council.

]]>

On July 22, Stephen Rodriguez, senior advisor at Forward Defense, published a piece in War on the Rocks entitled “Titans, Trailblazers, and Translators: Forging a Unified Defense Industrial Paradigm”. Rodriguez, working at the intersection of the defense industrial base and technologies, identifies a growing tension between the two. To address this challenge to enduring national security, he says, the strategic imperative is to “harness the industrial might of the titans, fuse it with the digital velocity of the trailblazers, and leverage the deep integration expertise of the translators.”

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Stephen Rodriguez in War on the Rocks on the defense industrial paradigm appeared first on Atlantic Council.

]]>
Ullman in the Hill on Trump’s National Security Council https://www.atlanticcouncil.org/insight-impact/in-the-news/ullman-in-the-hill-on-trumps-national-security-council/ Tue, 15 Jul 2025 12:51:25 +0000 https://www.atlanticcouncil.org/?p=860213 On July 14, Atlantic Council Senior Advisor Harlan Ullman published an op-ed in the Hill on US President Trump’s “restructuring” of the National Security Council (NSC). He argues that clearly defined and streamlined decision-making processes are essential to improving the NSC’s effectiveness and ensuring coordinated national security policy.

The post Ullman in the Hill on Trump’s National Security Council appeared first on Atlantic Council.

]]>

On July 14, Atlantic Council Senior Advisor Harlan Ullman published an op-ed in the Hill on US President Trump’s “restructuring” of the National Security Council (NSC). He argues that clearly defined and streamlined decision-making processes are essential to improving the NSC’s effectiveness and ensuring coordinated national security policy.

International Advisory Board member

Harlan Ullman

Senior Advisor

The post Ullman in the Hill on Trump’s National Security Council appeared first on Atlantic Council.

]]>
How the war in Gaza diminished dreams of political reform in Egypt https://www.atlanticcouncil.org/blogs/menasource/war-in-gaza-political-reform-in-egypt/ Thu, 03 Jul 2025 19:41:16 +0000 https://www.atlanticcouncil.org/?p=857751 Egypt's national debate has shifted from reform to national security with just weeks ahead of parliamentary elections.

The post How the war in Gaza diminished dreams of political reform in Egypt appeared first on Atlantic Council.

]]>
In early 2023, Egypt’s deeply constrained public sphere showed tentative signs of political opening. Confronted with an economic crisis, President Abdel Fattah al-Sisi, who has maintained tight control over the country since 2014, initiated a package of economic and political reforms. Pushed to the margins for years, opposition voices cautiously hoped that the 2023 presidential and August 2025 parliamentary elections might open limited new space of political participation for secular groups after years of political constraints. Then came the October 7, 2023 Hamas attack inside Israel.

With the launch of Israel’s ongoing war in Gaza, followed by escalation with Hezbollah and Iran, harrowing images from the strip, and fears of Palestinian displacement to Egypt—Egyptian anxiety is elevated, and the national debate has shifted from reform to national security. By the end of 2023, al-Sisi had secured a third term without a meaningful electoral contestation amid calls for national unity.

It’s clear that the post-October 7 era has not only devastated the Gaza strip, it has also influenced Egypt’s economy and domestic political dynamics—and the impacts extend beyond the ballot box. This includes deepening ideological fractures among Egypt’s intellectuals and secular opposition, further discrediting their democratic narrative while lending credibility to conspiracy theories, and restoring the battered image of Egypt’s military as the nation’s ultimate protector.

Displacement overshadows political reform

After years of mismanagement, Egypt faced an economic crisis between 2022 and early 2023. Inflation climbed to over 32 percent by March 2023, and foreign debt exceeded $160 billion. These pressures created a narrow opening for discussions about political and economic reform and the military’s expanding role in the Egyptian economy.

To mitigate domestic discontent and reassure international donors, al-Sisi announced a “National Dialogue,” launched in May 2023. The dialogue was officially framed as a platform to promote political reform and to gather input from the full political spectrum, except the banned Muslim Brotherhood, on the country’s economic and governance challenges. Moreover, the government released several secular political prisoners, allowed the return of some exiled dissidents, permitted media space for opposition, and lifted the asset freeze and travel ban imposed on many human rights defenders. The “State Ownership Policy Document,” issued and approved in December 2022, pledged a timeline to reduce the state’s dominance over key economic sectors.

These steps raised some hopes that the 2023 presidential and 2025 parliamentary elections would differ from previous ones, where al-Sisi won 97 percent of the vote and state allies dominated parliament. They also raised the expectation that the state would allow greater participation for secular opposition, tolerate more serious candidates to compete with al-Sisi, allow for the opposition to form independent electoral lists, or at least guarantee broader inclusion within state-approved electoral lists in the coming parliamentary election. Egypt’s drained intellectuals and opposition groups, still recovering from the failures of the post-2011 uprising hoped for a modest revival of political dynamism after years of exclusion under al-Sisi.

Yet, the outbreak of the Gaza war abruptly shifted the national discourse, and the debate of political reform quickly faded behind the war’s horrific scenes, along with debates over plans to displace Palestinians to Egypt and Jordan. Amid public anxiety, Egypt’s December 2023 presidential election passed largely unnoticed and without serious competition. Al-Sisi secured a third term with an overwhelming majority, with 89.6 percent this time, facing only nominal opposition, calling his victory a “rejection of the inhumane war in Gaza.”

Even the conviction and imprisonment of former Member of Parliament Ahmed Tantawi—who had sought to run for president—for possessing and distributing unauthorized election documents sparked far less public debate than expected. With parliamentary elections expected by within weeks, there is little meaningful discussion of electoral reform or the measures that guarantee free elections, especially after a new amendment to the election law was hastily passed in parliament. and approved by the president without serious public debate or political consensus with opposition. Many fear the parliamentary election will merely echo the presidential election’s non-competitive and tightly controlled nature.

Polarizing the polarized intellectuals

Since 2011, Egypt’s intellectuals have been divided along multiple fault lines—first between reformists and revolutionaries, then between Islamists and secularists. These divisions sharpened during the brief presidency of Mohamed Morsi, a senior Muslim Brotherhood figure, and deepened after his 2013 ouster, backed by many secular groups and the military. The ensuing economic deterioration, coupled with the shattered dream of democratization, have disillusioned most of the Egyptian intellectuals despite their differences.

More recently, however, mounting economic hardship and the failure of the post 2011-2013 political trajectories have begun to soften these ideological rifts, creating space for some intellectuals and opposition figures to reflect and publicly reassess a decade of political failures. Yet the conflict in the region has reopened old wounds, turning debates over the conflict into a new arena for polarization.

SIGN UP FOR THIS WEEK IN THE MIDEAST NEWSLETTER

Many Islamists, leftists, and Nasserist figures voiced strong support for both Hamas’s and Iran’s responses to the recent US-Israel strikes on Tehran’s nuclear facilities, framing Hamas and Iran as legitimate anti-colonial resistance forces. In contrast, many nationalists and liberal figures condemned Hamas, blaming it for derailing the Israeli peace process in the nineties and portraying the October 7 attack as reckless and damaging to the Palestinian cause. Nationalists and liberals have also accused Iran of destabilizing the region through its proxies and irresponsible actions.

Ultimately, what began as debates over Hamas’s strategy and its outcome soon escalated into media confrontations, accusations of treason, and ruptured ties within the intellectual class. In an already drained political landscape, the resurgence of these fractures deepened weakness within Egypt’s intellectuals and opposition.

Discrediting democracy and embracing  conspiracy

The Gaza war’s impact went beyond political actors and debates, shaking the cultural foundations of Egypt’s reform movement. The inability of the Western-led international community to halt the scale of suffering in Gaza served as a second major blow to the liberal democratic narratives that were embraced by many Egyptian intellectuals since the 1990s, including the framing of democracy a prelude for development, peace, and progress.

In Egypt, perceived Western double standards deepened public skepticism towards democracy, increasingly seen not as a normative framework for foreign policies but as a tool of political pressure primarily serving Western interests. Many Egyptians were reminded of the US decision to freeze military aid to Egypt in 2013 over human rights concerns—after the Egyptian Army ousted Morsi. For some Egyptians, the human rights violations committed by their governments since 2013—which once drew US sanctions—now pale in comparison to the international accusations of genocide committed by Israel in Gaza, which the West met with outright support or passive silence. That inconsistency was also apparent in Washington’s decision to launch strikes on Iranian targets linked to its nuclear program, while continuing to support Israel—a state widely believed to possess a nuclear arsenal.

The agenda of Palestinian displacement abroad—once dismissed during the 1990s and 2000s as a conspiracy theory amplifying a fringe agenda in Israel—now appears real as Israel and the United States publicly pushed proposals to export the Gaza crisis into Egypt.

This is not the first instance in Egypt’s recent political history where Egypt’s versions of a liberal peace narrative have faced a popular reckoning. The first came when the 2011 Arab uprisings devolved into civil wars rather than democracy. And now, conspiracy theories that framed those uprisings as a Western plot to divide Arab countries and ensure Israel’s regional supremacy are experiencing a revival.

Amid these dynamics, the image of Egypt’s army and president—previously tarnished by widespread socioeconomic suffering—began to recover. The military has once again emerged as the ultimate protector with current and past traumas colliding: memories of the Sinai insurgency and post-June 2013 terrorist attacks, the enduring conflicts in neighboring Sudan and Gaza, and now Israel seizing control of the Rafah crossing. The Egyptian troop presence in Sinai, al-Sisi’s public rejection of US President Donald Trump’s plan to displace Palestinians from Gaza and his refusal to meet Trump at the White House, as well as widespread media calls to rally behind the state amid a national security threat all reinforce this image.

By strengthening the image of the army and the president, while weakening Egyptian dissidents through polarization and discrediting their democratic narrative, the Gaza war further enhanced the asymmetry between a strong, entrenched authority and a weak, fragmented opposition and intellectuals. This growing imbalance continues to block any meaningful change in power dynamics.

Al-Sisi’s security concerns

Despite al-Sisi’s renewed confidence in his restored image, and state media calls for national unity, his persistent security concerns remain.

The Palestinian cause has historically been a potent mobilizing force against the Egyptian authority, frequently harnessed by political Islamist movements like the Muslim Brotherhood, whose formal political role al-Sisi dismantled in 2013. Yet while the Brotherhood’s organizational presence has been curbed, its narrative over the conflict—alongside that of the broader “resistance camp”—may  resonate with some of the Egyptian public, particularly among a younger generation that came of age during one of the most violent phases of the Arab-Israeli conflict. Many in this cohort are disillusioned with prospects for peace and increasingly receptive to boycott campaigns, championed by Muslim Brotherhood media, against Israel and the United States. They are also exposed to narratives framing the Egyptian regime as a complicit actor aligned with Western interests and Israel’s war in Gaza. The appeal of these narratives, coupled with rising sympathy for Hamas in the early months of the war and the resurgence of Islamism in neighboring Jordan—as seen in the September 2024 elections—has likely deepened al-Sisi’s anxieties. Although there is no immediate sign of large-scale pro-Palestine mobilization, due to the state’s zero-tolerance to demonstrations, these dynamics raise the risk of rekindling ideological currents viewing them as potential challenges to its stability.

Ultimately, the post-October 7 era has not only demolished Gaza. It also disrupted Egypt’s fragile political opening: deepening polarization, weakening opposition forces, and temporarily consolidating the public standing of the president and military amid heightened insecurity. The erosion of the foundations of democratic narratives, widening fractures among intellectuals, and the simmering threat of Islamist mobilization leave Egypt’s political opening increasingly elusive, with the country seemingly sliding back into political stagnation.

Whether Egypt can resist these turbulent crosscurrents—reshaped by the regional war—without sliding again into stagnation, or revive its reform ambitions, remains the defining challenge in the post-October 7 era—one that the parliamentary elections are likely to reveal.

Amr Salah Mohamed is a scholar and lecturer at the Carter School for Peace and Conflict Resolution at George Mason University, specializing in conflicts in the Middle East and Egyptian politics.

The post How the war in Gaza diminished dreams of political reform in Egypt appeared first on Atlantic Council.

]]>
Murray featured in CNBC on fundamental changes to UK and NATO defense spending. https://www.atlanticcouncil.org/uncategorized/murray-featured-in-cnbc-on-fundamental-changes-to-uk-and-nato-defense-spending/ Mon, 30 Jun 2025 20:47:38 +0000 https://www.atlanticcouncil.org/?p=856269 On June 2, Rob Murray, non-resident senior fellow at Forward Defense and the Transatlantic Security Initiative, appeared on CNBC to advise on a radical rethink of deterrence from a European perspective. Murray states that the architecture behind defense financing has been uniquely designed for peacetime, so the European financial community will have to rework their financial alliance to maximize […]

The post Murray featured in CNBC on fundamental changes to UK and NATO defense spending. appeared first on Atlantic Council.

]]>

On June 2, Rob Murray, non-resident senior fellow at Forward Defense and the Transatlantic Security Initiative, appeared on CNBC to advise on a radical rethink of deterrence from a European perspective. Murray states that the architecture behind defense financing has been uniquely designed for peacetime, so the European financial community will have to rework their financial alliance to maximize each other’s national security interests.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The Transatlantic Security Initiative aims to reinforce the strong and resilient transatlantic relationship that is prepared to deter and defend, succeed in strategic competition, and harness emerging capabilities to address future threats and opportunities.

The post Murray featured in CNBC on fundamental changes to UK and NATO defense spending. appeared first on Atlantic Council.

]]>
Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace  https://www.atlanticcouncil.org/in-depth-research-reports/report/crash-exploit-and-burn/ Wed, 25 Jun 2025 04:01:00 +0000 https://www.atlanticcouncil.org/?p=823804 If the United States wishes to compete in cyberspace, it must compete against China to secure its offensive cyber supply chain.

The post Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace  appeared first on Atlantic Council.

]]>

Table of contents

Executive summary

If the United States wants to increasingly use offensive cyber operations internationally, does it have the supply chain and acquisition capabilities to back it upespecially if its adversary is the People’s Republic of China?   

Strategic competition between the United States and China has long played out in cyberspace, where offensive cyber capabilities, like zero-day vulnerabilities, are a strategic resource. Since 2016, China has been turning the zero-day marketplace in East Asia into a funnel of offensive cyber capabilities for its military and intelligence services, both to ensure it can break into the most secure Western technologies and to deny the United States from obtaining similar capabilities from the region. If the United States wishes to compete in cyberspace, it must compete against China to secure its offensive cyber supply chain.   

This report is the first to conduct a comparative study within the international offensive cyber supply chain, comparing the United States’ fragmented, risk-averse acquisition model with China’s outsourced and funnel-like approach.   

Key findings:  

  1. Zero-day exploitation is becoming more difficult, opaque, and expensive, leading to “feast-or-famine” contract cycles.  
  1. Middlemen with prior government connections further drive up costs and create inefficiency in the US and Five Eyes (FVEYs) market, while eroding trust between buyers and sellers.   
  1. China’s domestic cyber pipeline dwarfs that of the United States. China is also increasingly moving to recruit from the Middle East and East Asia.  
  1. The United States relies on international talent for its zero-day capabilities, and its domestic talent investment is sparse – focused on defense rather than offense.   
  1. The US acquisition processes favor large prime contractors, and prioritize extremely high levels of accuracy, trust, and stealth, which can create market inefficiencies and overly index on high-cost, exquisite zero-day exploit procurements.  
  1. China’s acquisition processes use decentralized contracting methods. The Chinese Communist Party (CCP) outsources operations, shortens contract cycles, and prolongs the life of an exploit through additional resourcing and “n-day” usage.     
  1. US cybersecurity goals, coupled with “Big Tech” market dominance, are strategic counterweights to the US offensive capability program, demonstrating a strategic trade-off between economic prosperity and national security.  
  1. China’s offensive cyber industry is already heavily integrated with artificial intelligence (AI) institutions, and China’s private sector has been proactively using AI for cyber operations.  
  1. Given the opaque international market for zero-day exploits, preference among government customers for full exploit chains leveraging multiple exploit primitives, and the increase in bug collisions, governments can almost never be sure they truly have a “unique capability.”    

Recommendations:  

  1. Strengthen the supply chain by creating Department of Defense (DOD) vulnerability research accelerators, funding domestic hacking clubs and competitions, expanding the National Security Agency’s (NSA) Centers of Academic Excellence in Cyber Operations (CAE-CO) program, and providing legal protections to security researchers.  
  1. Improve acquisition processes by establishing a government-sponsored vulnerability broker in a federally funded research and development center (FFRDC) to decentralize and simplify exploit purchases while increasing cyber capability budgets and expanding research on automated exploit chain generation.  
  1. Adjust policy frameworks to consider counterintelligence strategies in the zero-day marketplace (burning capabilities of malicious actors while recruiting willing ‘responsible’ actors into a more formal pipeline), funding n-day research through US Cyber Command (USCYBERCOM) where appropriate and leveraging alliances like the Pall Mall process to counter China’s growing cyber dominance.  

Without meaningful reforms, the United States risks ceding to China whatever strategic advantage it has left in cyberspace. By fostering a more deliberate offensive cyber supply chain and adjusting acquisition strategies, the US can retain a steady supply of offensive cyber capabilities to maintain its edge in the digital battlefield. 

Background

Securing the zero-day supply chain (and its private sector market) is crucial to US-China conflict in cyberspace 


“America has incredible offensive cyber power. We need to stop being afraid to use it.” 
– Alexei Bulazel, incumbent special assistant to the president and National Security Council senior director for Cyber.1

“Geopolitical conflicts are increasingly shifting to cyberspace, including tensions between the U.S. and China. Technology is therefore no longer just an area for opportunity, but also a battleground for control, values and influence.” 
– Jeremy Fleming, former GCHQ director. 


China and the United States are engaged in strategic competition in cyberspace. While cyber operations are often an overlooked area of geopolitical power, both countries’ militaries, intelligence communities, and law enforcement agencies conduct cyber operations. They do so to obtain intelligence crucial to national security, assist conventional military operations, and even create kinetic effects to achieve strategic goals. To make a cyber operation possible, one must have the capacity to break into a particular system: offensive cyber capabilities (and particularly zero-day vulnerabilities) are the necessary strategic resources required to conduct such operations. 

The United States clearly wishes to further leverage its cyber prowess in the international arena, particularly against the People’s Republic of China (PRC).2 Doing so would help the United States protect its vital national security and economic interests, international partnerships, and norms. However, to operationalize a “cyber power” strategy, the United States must acquire enough high-end capabilities to ensure it can achieve such strategic goals. Moreover, the timeline for implementing these policies is urgent, given the increasing potential for conflict with China in the coming years. Thus, given the international privatized offensive cyber capability marketplace, how can the United States and its allies continue to ensure the availability of offensive cyber capabilities (focusing on zero-day vulnerabilities), while limiting China’s access to those same capabilities? 


“China remains the most active and persistent cyber threat to US Government, private-sector, and critical infrastructure networks.” 
– ODNI, 2024 Annual Threat Assessment. 

“The era of network security has arrived, and vulnerabilities have become a national strategic resource.” 
Qihoo360 CEO Zhou Hongyi, Remarks at the 2017 China National Cyber Security Summit.  


Cyber operations consist of a variety of offensive cyber capabilities — many of the most crucial cyber capabilities involve the exploitation of “zero-day” vulnerabilities (also known as zero-days or 0days). Zero-day vulnerabilities are issues or weaknesses (“bugs”) in software or hardware, typically unknown to the vendor and for which no fix is available— in other words, the vendor has had “zero days” to fix the issue. Some of these vulnerabilities are exploitable: an actor with knowledge of the vulnerability could write code that takes advantage of said vulnerability. This results in a “zero-day exploit”—code enabling a range of behaviors that could include establishing access into the computer system the software is installed on, escalating privileges on those systems, or remotely issuing commands. 

The work of finding vulnerabilities and writing exploits, thanks to its strategic necessity to governments worldwide, has become a billion-dollar international services industry in the last 20 years. Private firms now often create cutting-edge offensive cyber capabilities for governments. Given the sensitivity around supporting government cyber operations, many of these firms do not openly advertise their services, shrouding the industry in secrecy. Between this secrecy and the variation in products offered (i.e., governments target different technology systems, and no two zero-days are identical), the supply chain for such capabilities is not only opaque to outsiders, but also to governments and even among players in the industry. 

Within this highly fragmented and opaque market, large firms, like the United States’ L3Harris or ManTech, frequently hold multi-million dollar valuations.3 Notably, Israel’s NSO Group’s worth reached $1 billion at its peak.4 Meanwhile, individual US government agencies receive millions of dollars to procure offensive tools.5 Such companies’ tools have clearly been purchased by such government agencies and put to use in modern-day cyber operations. Notably, of all the zero-day vulnerabilities found exploited “in-the-wild” in 2023 and 2024 by Google, around 50 percent of them were attributed to commercial vendors that sell capabilities to government customers.6 While this statistic only encompasses detected zero-day exploits, this is still a significant set of capabilities being provided by private sector actors. 

The offensive cyber capability industry itself is international and ranges in professionalization depending on the region; companies in Russia, Israel, Spain, Singapore, and the United States all have varying relationships with their home governments, other firms (including middlemen and brokers), international government customers, and even cyber-criminal groups. However, the study of offensive cyber capabilities has largely over-indexed on firms based in Israel and Europe rather than the United States’ greatest geopolitical rival: China.7 This is surprising, as the Chinese hacking and cybersecurity ecosystem is robust. Chinese companies have, on multiple occasions, are directly linked to Chinese government-sponsored cyber operations against the United States. Moreover, the development of offensive cyber capabilities in the United States remains largely unstudied or examined in a way that does a disservice to the domestic hacker community.8 

Why is this question important? 

At first glance, it can be difficult to see why the private sector zero-day exploit market—a series of obscure companies selling code that can enable governments to break into widely-used software—would be important in preserving national interests in cyberspace, particularly against China. A simple explanation of this relationship is as follows: the United States and its allies rely on an increasingly digital world, and China is both a savvy adversary and hardened target in cyberspace.9 When any country’s intelligence community wishes to infiltrate high-value, hard-to-access digital targets, it likely must use zero-day exploits or other bespoke (i.e., custom-made or tailored) offensive cyber capabilities. Intelligence organizations from both the United States and China, due to decreasing internal supply and rising demand for such capabilities,10 have increasingly relied on acquiring such exploits from the private sector zero-day exploit market.11 However, the private sector zero-day market is murky and more international than policymakers expect; even if the United States and China are truly entering a “New Cold War,” both countries still source capabilities from an overwhelmingly opaque international market of offensive cyber capability firms, and do not know if they are being supplied with potentially overlapping capabilities. In short, any cyber operation that relies on an acquired capability, conducted by the United States, China, or anyone else, carries a counterintelligence and operational security risk, with no guarantee that they can source a similar capability in the future. Thus, securing the cyber supply chain (understanding the industry, constraining malicious actors, and ensuring availability from trusted parties) is important to address such risks. 

While former President Joe Biden’s administration sought to constrain private sector actors with additional regulation and placing bad actors on the entities list,12 these policies were framed around human rights concerns largely out of Europe and Israel. President Donald Trump’s administration is moving away from this approach, focusing on China as a geostrategic threat over transnational digital repression framings,13 as well as signaling willingness to engage with private sector actors in the space. The Trump administration, as of 2025, has accelerated plans for a US Cyber Command (USCYBERCOM) 2.0, focusing on working better with private industry partners.14 This is a continuation of the first Trump administration’s policies: Trump was the first president to delegate the authority for offensive cyber operations down to the secretary of defense (through National Security Presidential Memorandum–13) allowing USCYBERCOM more leeway to conduct operations without presidential approval, albeit still with a robust interagency review process.15

If the United States wishes to further leverage its cyber prowess in the international arena by leveraging private sector partners, does it have the supply chain and acquisition capabilities to back it up—especially if its adversary is the People’s Republic of China? Although the author does not condone general analogies between cyber and other domains, supply chain and acquisition analysis in the cyber domain can be similar to nuclear or other arms proliferation questions. For example, to answer whether a country has the capability to construct a nuclear weapon, one must understand how much enriched uranium the country can easily acquire. Similarly, to answer whether a country can become a cyber power that can access the hardest of digital targets, one must ask how easily it can source and acquire zero-days and other offensive cyber capabilities. 

Methodology 

This report combines quantitative data analysis and interviews of experts from across the offensive cyber capability ecosystem. The underlying research—conducted over ten months, from June 2024 to March 2025—occurred in three stages.16 It has since been revised and updated. The first was a comprehensive literature review of US-China cyber conflict, how the offensive cyber capabilities industry works, and recent policies on combating the proliferation of spyware from the Biden administration (which has impacted zero-day exploit acquisition and sales). The second then analyzed data scraped from the open internet, largely from the website “CTFTime” (well-known for tracking Capture the Flag (CTF) competitions internationally),17 as well as secondary sources containing anonymized and aggregated information on the cybersecurity ecosystem. This report includes statistics from this dataset—the full dataset is available upon request. The third stage involved interviewing experts from across the national security and offensive cybersecurity ecosystem. The interviews, which began in December 2024 and concluded in March 2025, comprise the most significant aspects of this research. The approximately thirty experts consulted, both virtually and in person, came from one or more of the following backgrounds: 

  • Business leaders and senior employees of offensive hacking or vulnerability research companies in the United States, United Kingdom, Australia, New Zealand, and Canada; 
  • Senior defense acquisition and innovation officials in the US government; 
  • Security researchers internationally who focus on China or wider Asia-Pacific cyber issues; 
  • Current and/or former US and Five Eyes (FVEYs) intelligence officials; and 
  • Current and/or former US national security policy officials. 

To narrow the project’s scope, and given the foreign intelligence and military concerns China poses, this paper focuses primarily on acquiring zero-days for foreign intelligence and military customers, rather than for domestic law enforcement. Although some of the analysis and ultimate policy recommendations may be applicable to law enforcement, the analysis was conducted with intelligence and military end uses in mind. Because of the lack of publicly available reporting on this topic, the interviews are a major part of the paper’s findings. A list of interviewees can be found in Appendix B. For security reasons, many interviewees asked to remain unattributed. Anonymous interviewees are not individually cited in the text to avoid identifying them based on their aggregate comments. 

The author’s background as a student, cybersecurity practitioner, think tank fellow, and founder of a Washington DC-based hacking conference18 heavily contributed to sourcing interviews with the hacking and cyber policy community. However, the author recognizes that, given the highly fragmented nature of the offensive cyber capability industry, the findings in this paper are likely only part of the wider truth, and reflect her biases and affiliations. Many sources are former and current industry colleagues. One of the interviewees is her husband, Derek Bernsen, whose DARPA program, Intelligent Generation of Tools for Security (INGOTS), is mentioned in the paper. Any omissions, errors, or factual inaccuracies are the author’s alone. 

The majority of the paper consists of an analysis of the US supply and acquisition funnel of offensive cyber capabilities, followed by an analysis of China’s supply and acquisition funnel, from which the author makes conclusions and recommendations for US policy moving forward. There are plenty of risks to this approach, two of which are mirror imaging bias and “whataboutism” (justifying an approach because another party has conducted similar activity). The author has tried to, wherever possible, seek to remove such fallacies from her analysis. She justifies the overall approach through the following (somewhat obligatory) Sun Tzu quote: 


知己知彼,百战不殆.” 

(“Know yourself and your enemy, and you will not know defeat in battle”). 


Analysis

This section addresses the relative supply chains for offensive cyberspace operations to the United States and China, building around a tripartite model to encompass a set of industry and government relationships characterized by significant degrees of internal complexity, opacity, and fragmentation. This model addresses (1) what the underlying international market of offensive cyber capabilities looks like, (2) what parts of this international market supply China and/or the United States with offensive cyber capabilities, and (3) how the United States and China acquire such capabilities. 

A. The international offensive cyber supply chain 

Global cyber network
Source: Emma Schroeder. Adapted from photograph by Basma Alghali (Unsplash license) and image by Gordon Johnson (Pixabay content license).

All software is built by people, and there are three types of bespoke software often used in a cyber operation:19 (1) exploit code that takes advantage of a software vulnerability, (2) a malware payload, and (3) technical command and control.20 All three are “offensive cyber capabilities.” While individual governments with the right expertise can build their respective capabilities in-house, many rely heavily on commercial vendors.21 In a 2024 report, the Atlantic Council identified forty-nine commercial vendors along with thirty-six subsidiaries, twenty-four partner firms, twenty suppliers, and a mix of thirty-two holding companies, ninety-five investors, and one hundred and seventy-nine individuals, including many named investors.22 Despite over-indexing on firms in Italy, Israel, and India, companies and individuals named in this dataset hailed from every major continent except for Antarctica, suggesting that each continent likely has hackers that provide offensive cyber capabilities to governments.23 While only a small subset of these firms can and do sell zero-day exploits, these named vendors are likely just the tip of the iceberg. Top-tier vulnerability research talent exists worldwide, hailing not just from the FVEY countries (the United States, Canada, United Kingdom, New Zealand, and Australia)24 and China but also from smaller nations like Egypt, Vietnam, and Cyprus (see Figure 1).25

Figure 1: Heatmap of major known commercial vendors for offensive cyber capabilities, suppliers, and investors, 2024

Map of the global spyware market
Source: Jen Roberts et al., Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and Its Threats to National Security and Human Rights, Atlantic Council, September 4, 2024, https://www.atlanticcouncil.org/in-depth-research-reports/report/mythical-beasts-and-where-to-find-them-mapping-the-global-spyware-market-and-its-threats-to-national-security-and-human-rights/.

Moreover, the above dataset excludes talent not yet plugged into the government cyber marketplace. CTF competitions (hacking contests in a simulated environment), Live hacking competitions (where hackers hack into systems live on stage), and bug bounty programs (usually company-run reward programs that encourage hackers to find and report system vulnerabilities) enable hackers to develop similar skill sets as those required for government-sponsored hacking. These programs and competitions are both common recruiting pipelines for defensive cybersecurity companies and offensive vendors alike.  

The number of individuals that participate in such programs globally is staggering. In 2020, HackerOne, a well-respected bug bounty platform, reported around 600,000 users spanning 170 countries.26 A 2024 survey by Bugcrowd, one of the largest bug bounty and vulnerability disclosure companies on the internet, revealed most of Bugcrowd’s over 200,000 hackers hailed from India, Egypt, Nigeria, Pakistan, Nepal, Vietnam, Australia, and the United States;27 78 percent of them are self-taught, and 58 percent of them were under twenty-five years old.28 While not all of these individuals possess the skills to find zero-day vulnerabilities and write code to exploit them, multiple security experts interviewed estimated that there are likely thousands of international individuals able to do so, with numbers in the low hundreds that can be trained to do so well.29

What is required to create and sell a zero-day exploit? 

Finding a vulnerability in a technology product or system is a highly manual, labor-intensive process that requires in-depth knowledge of how the target product works. Vulnerability researchers usually acquire such knowledge by reading through a target’s codebase and dependencies for small idiosyncrasies and mistakes.30 Depending on the size of the codebase (ranging from hundreds to millions of lines of code),31 this can be a time-consuming process. 

However, finding a vulnerability (or “bug”) is only the first step to creating a zero-day exploit. Once a bug is found, there are a series of follow-up questions that need answers. Is the bug exploitable (i.e., can it be used to do anything useful)? If so, can it be exploited reliably, or could it alert the target that something is wrong? Does the exploit work on only one version of the target or across multiple versions? These complex questions usually require additional quality assurance (QA) testing to produce a field-ready exploit, with the QA’s rigor depending on the risk aversion of the end customer.32 Any additional time spent conducting QA tests carries a risk that the technology firm producing the product finds the underlying vulnerability in the meantime and patches it, decreasing the value of the exploit.33

Instead of selling a single exploit, it is usually more lucrative and impactful to link the individual exploit (known as an “exploit primitive”) with others to create an “exploit chain,” using multiple exploit primitives in conjunction with one another to achieve a particular effect, such as gaining full control over a system. As of 2025, exploit chains are no longer just an option for greater impact; now, they are often necessary to achieve any effect on a modern, enterprise-grade system. Many recent offensive security talks at major conferences,34 alongside security advisories from dominant technology firms,35 have moved away from analyzing primitives and toward analyzing exploit chains for this reason. However, not every exploit primitive can be used in the same chain. When trying to create a functioning full exploit chains (“full chains”), a company may work with middlemen (or “brokers”) to purchase primitives for the exploit chain they want to build.36 This comes with additional risks. Since middlemen work with other middlemen, the original source of a zero-day exploit is often difficult to ascertain. This also raises the potential that multiple parties have access to the same exploit, which, in turn, leads to a higher likelihood of discovery. 

Because only a small number of big technology firms create most of the products used globally today, bug collisions (i.e., the parallel independent discovery of a vulnerability by multiple researchers) are also growing increasingly common.37 This dynamic increases the risk for buyers and sellers, as a bug collision means an exploit is more likely to be used by multiple parties, resulting in a higher risk of discovery or false attribution by the private sector. This also erodes trust between the buyers and sellers of a capability, as the buyer can only take the seller’s word that the bug was concurrently discovered rather than resold. 

While selling offensive cyber capabilities (and particularly zero-day exploits) to governments is a lucrative profession, it is a risky industry. Creating a zero-day exploit to leverage against a widely used technology product may require between six and eighteen months of full-time engineering and research work.38 Unless an offensive cyber capability firm has multiple engineers working on different products or uses different payment schemes, this timeline can lead to long downtimes between exploit sales. This “feast-or-famine” payout schedule carries risks for companies that rely on one or two windfalls a year to pay their overhead and engineering costs.39

In addition, finding a customer to sell exploits to is more difficult than it first seems. In general, potential sellers must find an existing government contract through which to sell their exploits or know the right government individual to speak with.40 Unless an offensive cyber capability firm has hired employees who have recently left a government interested in such capabilities, actual buyers may be extremely hard to find.41 Thus, international hackers without former government connections normally sell their products to middlemen, many of whom operate internationally.42 Even then, the exploit may go through multiple levels of middlemen to get to a government customer,43 frustrating both buyers and sellers. Buyers know that exploits sold to them have extremely high mark-ups, given the number of middlemen involved, and often will not know who the original bug producers are. Meanwhile, sellers are likely aware of the extreme markups, but do not know whether their bugs were sold to multiple governments.44

Throughout both the development and sale of an exploit, offensive cyber capability firms are also subject to counterintelligence risks by adversary governments. Since 2022, North Korea has consistently targeted vulnerability researchers globally to steal their tools and exploits.45 Vulnerability researchers also frequently report being solicited by foreign intelligence at security conferences, falsely claiming to work for FVEYs governments.46 On the U.S. side, government response to this counterintelligence threat has been half-hearted at best. While the Cybersecurity and Infrastructure Security Agency (CISA) reportedly announced initiatives to protect high-risk communities against cyber threat actors in 2024,47 security researchers who have tried to contact CISA have not found the program helpful.48 As a result, the offensive cyber capability industry does not perceive that the US government is interested in protecting this community, even from one of the world’s most unpopular and totalitarian nation-states. 

As a result, most vulnerability researchers do not spend more than a decade in the profession, instead choosing to pivot into less risky segments of the cybersecurity industry.49 The individuals who stay in the market tend to do so for some combination of three reasons. First, they firmly believe in the mission—this largely describes either likely former government employees who have moved out to the private sector or individuals who wish to have their work “used for good.”50 Second, they are profit-motivated. The “feast” element of the feast-or-famine model provides an incredible windfall for certain highly skilled individuals. Third, they simply enjoy the challenge. A large portion of the vulnerability research community, and the hacker community writ large, exhibits a large amount of awe for their vocation (i.e., the only person who hacks textile looms, or the first person to “pop,” or exploit, the newest iPhone can feel like a superpower).51 This vocational awe creates camaraderie among the most passionate vulnerability researchers worldwide. For some researchers, exploitation is art, and they will often try to put the art above the artist. In that sense, some individuals in the global market, particularly those who interact more with the international community online or participate on international CTF teams, perceive geopolitics as an inconvenient truth.52 Chinese and Russian researchers can admire the work done by American researchers, and vice versa, while understanding that they will likely never work together.53 

B. The US acquisition pipeline

photo of DEFCON crowd
The DEFCON (DEF CON) hacking conference in Las Vegas, Nevada, in 2014. Source: Tony Webster, Wikimedia Commons, https://commons.wikimedia.org/wiki/File:DEFCON_22_%2814704446530%29.jpg.

“An individual researcher who isn’t informed on what bugs are selling for may sell a good bug for 100k. By the time it makes it to a customer, an individual bug could go for 750k to 1 million dollars.” 
– Former ONCD Official. 

“The system by which zero day vulnerabilities are acquired is horrendously inefficient and broken.” 
Senior DOD official working on offensive cybersecurity research programs


Given this international sphere of private sector hackers with the capability to find and exploit capabilities, how does the United States develop and leverage this community to supply its offensive cyber operations? The sections below—and those mirrored in the following section on China—focus on sources of supply (companies that provide capabilities and talent pools that support them) and acquisition methods (contracts, regulations, and informal roadblocks or enablers). 

Supply—International, opaque, and loosely affiliated networks. 

Companies—Prime and subcontractor ecosystem. 

While the US government has highly sophisticated cyber capabilities developed in-house, it increasingly purchases offensive cyber capabilities from a wide network of prime and subcontractors. Many of the large firms that sell offensive cyber capabilities to the US government are the same defense contractors that sell it other forms of software or even weapons. Large, traditional prime contractors like Raytheon (rebranded RTX)54 and L3Harris,55 as well as more technology-focused firms like Peraton, compete for multi-million dollar government contracts to support cyber operations and provide capabilities to the government.56 Many individuals who work for these firms are former DOD or Intelligence Community employees.57

When large prime contractors cannot fulfill contract requirements, they often portion out the work to subcontractors. Some prime contractors are heavily reliant on small businesses, boutique research firms, and even individual researchers to satisfy contracts. Many of these subcontractors attract high-end vulnerability researchers and exploit developers worldwide, who are looking for flexible hours, high pay, and a company culture that better reflects the hacker community.58 Some contractors, to boost available capital, are funded or partially owned by venture capital, private equity, or other investment firms, which can shape the company structure and strategy. For example, AE Industrial, a private investment firm, acquired Israeli firm Paragon in 2024, and sought to merge it with US subcontractor RedLattice, which it also owns.59 The United States also likely sources its tooling through its intelligence-sharing relationship with the FVEYs.60 Given its existing close cooperation between the five countries’ signals intelligence (SIGINT) agencies and emphasis on “cooperative security”, this cooperation likely translates to capability sharing as well.61 

The services and products such firms provide (whether as the subcontractor or the prime contractor) differ based on their government contract vehicle. Internal research and development services contracts enable government research teams to break into harder targets by providing supplement staff.62 Procurement contracts for zero-day exploits exist in various forms, and subscription models for a company’s full catalog (i.e., a flat fee for year-long access to everything the company finds) are not uncommon.63 For less sophisticated government clients, private sector firms may provide Access-as-a-Service models (i.e., black-box and end-to-end solutions) where the contractor guarantees product maintenance for a specified timeframe.64  These Access-as-a-Service models combine zero-day exploits with other tooling into an all-in-one spyware solution, such as NSO Group’s Pegasus spyware.65 Many prime contractors and subcontractors in the United States and FVEYs experience similar issues and risks listed in the previous section (i.e., feast-or-famine timeframes, middlemen, counterintelligence risks, and general difficulty of the field), which impacts recruitment. 

Some companies that provide capabilities directly to the US government have been innovating in the nexus between artificial intelligence (AI) and cyber operations. However, while individual researchers use AI to assist with code auditing and fuzzing, many focused on this field affiliate with academic institutions or large US technology (“Big Tech”) firms rather than government contractors.66 Open, unclassified offensive initiatives do exist. For example, the Intelligent Generation of Tools for Security (INGOTS) program, within the Defense Advanced Research Projects Agency (DARPA), seeks to automate the creation, modification, modeling, and analysis of exploit chains.67 However, INGOTS is an exception to the norm. Most of the US intelligence community experiments with AI in-house,68 and US policymakers currently spend far more money to encourage companies to use AI for defensive applications (e.g., DARPA’s AIxCC partnership with Anthropic, Google, Microsoft, OpenAI, the Linux Foundation, and the Open Source Security Foundation to design, test, and improve novel AI systems to automatically find and fix vulnerabilities in code).69

The DOD’s AI strategy (originating in 2018 with updates in 2020 and 2023) has revolved around “Responsible AI”—developing and using AI capabilities in accordance with the DoD AI Ethical Principles while delivering better, faster insights and improved mission outcomes.70 While the Trump administration has been moving away from “Responsible AI” strategies, its new Project Stargate, an injection of $500 billion over the next four years building new AI infrastructure in the United States, is giving significant funding to OpenAI, whose investments in cybersecurity have been largely defensive in nature.71

Domestic talent—Decentralized, defense-forward. 

Feeder systems into US and US-affiliated offensive security firms come from a loose conglomerate of internship programs, cybersecurity conferences, and hacking competitions. Technology companies sponsor many of these conferences and competitions  to encourage talent to go into defensive cybersecurity careers (a worthwhile but orthogonal field for the purposes of this paper’s analysis). The bug bounty industry, as well as the defensive cybersecurity industry in the United States, hires plenty of hackers and former government cyber engineers (who might otherwise apply to work in offensive capability development) into defensive or more IT-focused roles.“SkillBridge and CSP Coordinators,” Microsoft: Military Affairs, accessed March 16, 2072 Some programs have formal relationships with the government, like the CyberCorps Scholarship for Service program, Hack the Pentagon, or University-based NSA Centers of Excellence.73 However, many of these programs funnel students into defensive jobs. Notably, of the 461 NSA cyber centers of excellence, only twenty-one are certified to train students in cyber operations.74

Few universities have applied (i.e., non-theoretical) offensive cyber programs that feed directly into the private vulnerability research industry.75 Many students who learn how to hack in college do so through extra-curricular security clubs or CTF teams. In 2024, among all registrants, the United States had the most registered academic teams competing in CTFs on popular platforms.76 Many CTFs that US teams compete in are at cybersecurity conferences,77 hosted by academic institutions,78 or sponsored by technology companies.79 However, without consistent funding, alumni engagement, and professor buy-in, these clubs and teams often risk disappearing entirely due to lack of overt support from their home universities.80

Moreover, few university programs produce engineers ready to write fully functioning exploits. Multiple vulnerability research firms interviewed referenced a “training valley of death,” where entry-level engineers out of university still require a year or more of talent development before they can produce a marketable product.81 While some intermediate-level trainings exist in companies or at conferences, they are currently insufficient—in either technical depth or timeframe.82

The US government has created more support for hacking contests, but at a much smaller scale than in other countries. The US National Institute of Standards and Technology (NIST) published a report on cyber competitions in 2016, suggesting that parts of the US government have historically understood the importance of such contests in developing offensive talent.83 NIST currently supports the US Cyber Games to recruit, train, and develop the team representing the United States in international cybersecurity competitions, this program engages with 2,000 individuals in a single contest, the US Cyber Open, and annually trains approximately 150 students.84 Unfortunately, it is far from the lofty, nationwide efforts pitched in NIST’s initial paper and is dwarfed by the sheer size of Chinese sponsored competitions (as shown in later sections). 

Undermining all these efforts is the anti-government sentiment that remains strong within the US cybersecurity and hacking community, which likely contributes to difficulty in maintaining an offensive talent pipeline. Much of the original US hacking community emerged from countercultural activities like phone phreaking (i.e., bypassing Pacific Bell telephone lines to make long-distance phone calls without paying). Law enforcement responses from the 1960s to the early 2000s treated many hackers as criminals rather than innovators. In 1990, the Secret Service’s Operation Sundevil seized more than forty computers and 23,000 data disks from teenagers in fourteen American cities and charged individuals who managed hacker magazine “Phrack” with interstate transport of stolen property. The charge was based on information published by Phrack that later proved to have been already publicly available.85 The arrests and subsequent court cases resulted in the creation of the Electronic Frontier Foundation.86 While the US government has made significant strides toward repairing the relationship with domestic hackers in recent years, anti-government sentiment still persists.87

Reliance on and integration with the wider international hacking community 

The US hacking community relies on and interacts heavily with the international hacking community. Multiple FVEYs vulnerability research company employees and founders interviewed claimed to hire individuals from other FVEYs countries, Europe, and South America to provide services.88 This international nature of US talent is most publicly apparent at the upper echelons of vulnerability research and exploitation competitions. Pwn2Own, sponsored by the American-Japanese cybersecurity software company Trend Micro, is the epitome of Western live-hacking competitions for vulnerability research companies. While initially starting at a security conference in Canada, the competition has expanded to events in the United States, Canada, Japan, Ireland, and Germany.89 While the United States had the most participating teams by country at Pwn2Own Ireland in 2024, they numbered only four teams out of seventeen, which included countries like the Netherlands, France, Vietnam, Taiwan, and South Korea (see Figure 2). 

Figure 2: Number of teams participating in Pwn2Own Ireland 2024, by country

Figure 2
Source: Dustin Childs, “Pwn2Own Ireland 2024: Day Four and Master of Pwn,” Trend Micro, Zero Day Initiative, October 25, 2025, https://www.thezdi.com/blog/2024/10/25/pwn2own-ireland-2024-day-four-and-master-of-pwn.

The talent pipeline for offensive security in the United States also corroborates this claim, particularly when looking at CTF competitions. CTFs serve as talent development and recruitment for both vulnerability research firms and the wider cybersecurity industry. Data from the CTFTime website (used widely in the West for tracking CTF competitions) shows the United States, as a country, has the most registered teams (16,774 as of August 19, 2024).90 However, there are just as many teams that are “international” in nature—over 16,000 either do not align with a single country, or have members competing and collaborating on the same team from multiple countries (see Figure 3). 

Figure 3: Teams on CTFtime by country, as of August 2024 (thousands)

Figure 3
Notes: Far left column represents “unaligned” or “international” teams.
Source: Winnona DeSombre Bernsen, data from CFTtime.com.

The most famous CTF competition in the world also corroborates this trend. DEF CON CTF, held annually in Las Vegas during DEF CON – the world’s largest hacker conference, attracts both university students and seasoned industry professionals alike. Of the top twelve scoring teams in 2024, none of them came solely from the United States. All the top teams with US players were either international teams who practiced remotely with each other to qualify as a team, or multiple single-country teams that merged with each other to compete (see Figure 4).91 For example, the 2024 winner was Maple Mallard Magistrates, a joint Canadian and US team formed by participants at Carnegie Mellon University, Korean-American Vulnerability Research Company Theori, Inc.,92 and the University of British Columbia. Notably, joint Chinese and Russian teams, as well as single-country teams out of China placed within DEF CON CTF 2024’s top twelve. 

Figure 4: Top scoring teams at the 2024 DEF CON CTF, and their countries of origin

Source: Winnona DeSombre Bernsen from an initial CFTtime scoreboard for DEF CON CTF 2024, accessed April 5, 2025, https://ctftime. org/event/2462/.

US offensive cyber capability acquisition methods 

Organizations that contract capabilities for cyber include federal intelligence agencies, military, and law enforcement—such as the NSA, USCYBERCOM,93 and the Federal Bureau of Investigation (FBI). Contract requirements differ by agency. Some organizations can ingest single exploits, while others do not have the in-house talent to independently weaponize capabilities. Normally, the latter organizations require end-to-end, black-box solutions that necessitate additional engineering work and safeguards.94

Government contracts for offensive cyber are compliance-heavy and favor large primes 

The contracting ecosystem, with its many compliance requirements, inherently favors large prime contractors despite the earlier noted heavy reliance on small businesses, boutique research firms, and even individual researchers to fulfill contracts.95

Put simply, small cyber businesses find it incredibly difficult to navigate DOD acquisition processes.96 Little reporting on the specifics of US offensive cyber capability acquisitions is openly available. Yet, the general US software contracting requirements offer valuable insight. The feast-or-famine timelines of zero-day exploit contracts require a company to have existing capital to withstand long downtimes between sales (like a large prime contractor), in which smaller companies may be one faulty bug away from going bankrupt.97 Any prime contractor on a government contract (i.e., a contractor bidding directly on a government contract) must also meet the incredibly stringent standards within the Federal Acquisition Regulations, including having cleared individuals for classified government contracts, meeting cybersecurity and other regulatory requirements,98 and getting financial systems audited.99

Clearance requirements are also a large pain point for small exploit businesses, as many exploit contracts are classified. Businesses must go through the complex and costly Facility Clearance process to bid or even perform on such contracts,100 which is difficult for smaller vendors.101 Moreover, certain contracts have active clearance prerequisites, which requires a vulnerability research company to have the resources to obtain employee clearances (or find another vendor to sponsor the needed clearances). This can also exclude foreign companies from the bidding process (as foreigners, in general, cannot hold US security clearances).102

Despite the hacker community’s international nature, some customers also informally restrict the nationalities of employees who may work on contracts, limiting the ability of companies who wish to hire hackers abroad.103 Despite all these regulations, interviewees confirmed that many of these smaller firms and foreigners may, in effect, actually be working on such contracts anyway, via the sales of their services and products to added layers of contractors (or middlemen) at, of course, an additional expense to the government.104

On the government side, additional focused regulations and policies trigger based on the product or agency’s risk aversion 

Aside from the procurement process, additional regulations trigger (and place added burdens on the government buyer) depending on the type of offensive cyber capability acquired. If an exploit is sold to the government individually, the government organization must send the exploit through the Vulnerabilities Equities Process (VEP). All vulnerabilities sold to the United States government go through the VEP. Effectively, it is an interagency process that balances whether to disseminate vulnerability information to the vendor/supplier in the expectation that it will be patched or to use the vulnerability for national security and law enforcement purposes.105 It is possible to get a waiver to circumvent the VEP, but only if the government agency can assert a deeply pressing national security need for immediate use.106

If the exploit is sold as part of an end-to-end spyware solution (or via an Access-as-a-Service model), other regulations also trigger. The US government, under Executive Order 14093, must ensure that a solution does not pose “significant counterintelligence or security risks to the United States Government or significant risks of improper use by a foreign government or foreign person.”107 Biden signed the order in 2023 to prevent the US government from supporting businesses that also enable human rights abuses abroad while mitigating the risk of such businesses to US government interests. Because end-to-end spyware solutions enable less sophisticated clients to conduct cyber operations, vendors providing such solutions have been caught selling to authoritarian countries, many of whom had not yet built high-end cyber operations organizations in-house and did not have regulations to deter government spying on civil society organizations, political opposition groups, or journalists. The most famous example of a vendor engaging in such activity was the Israeli company NSO Group, whose sale of its Pegasus spyware to the Saudi government resulted in the spying on and subsequent assassination of Washington Post journalist Jamal Khashoggi.108

The US military and intelligence communities also have additional internal requirements for procured zero-day vulnerabilities, particularly in the name of stealth and risk-aversion. Zero-day exploits provide the lowest risk of detection in a cyberspace operation (as they do not rely on previously known “n-day” vulnerabilities) and can offer initial access to a system by exploiting pre-existing weaknesses rather than having to somehow manufacture weaknesses in an adversary system. However, to further minimize the discovery risk of an operation, a government buyer may further require a seller to submit its product to QA testing for reliability to see whether and how often an exploit fails.109 Failure means that the exploit does not succeed in triggering the desired activity and potentially leaves suspicious artifacts on the target device.110 The reliability requirement adds cost and time, and it can also create risk of intellectual property and trade secret theft if the third party conducting QA is a competitor of the original seller.111

0-days v. n-days: What’s the difference? 

The focus on zero-day exploits as capabilities in this paper may suggest that zero-day exploits are the dominant methods of exploiting systems. The opposite is true: zero-day exploits are not the dominant way to exploit systems and get information in the offensive ecosystem. Oftentimes, the simplest methods of obtaining access are the most effective, even if they may get attributed, or “burned.”112 While simple methods can include phishing emails or social engineering, they can also include “n-day exploits”—exploit code that uses known vulnerabilities to achieve a certain goal, effectively relying on a target not regularly updating their systems. 

A zero-day exploit, when compared to an n-day, or other more common capability, is similar to comparing an F-35 fighter jet to a commercially-made drone: one is an exquisite, highly tailored capability, while the other can be made cheaply and at scale—however, while there are incredibly important things an F-35 can do that drones cannot, both can fly from point A to point B and deliver a payload. 

A government buyer’s interest in stealth can, at times, create market inefficiencies. Various vendors interviewed claimed that certain government customers may not tell a seller what type of target or exploit they want, leading to an inefficient process, where vendors might work on an exploit that a government customer has no intent to purchase.113 Alternatively, vendors said that other government customers purchase a company’s entire catalog of exploits to hide the specific exploit they are after. However, this is likely a decreasing practice given the increasing cost of zero-day exploits.114 Both of these practices likely seek to increase operational security and avoid the risk that anyone outside the government buyer learns of any intended targets in cyberspace, especially when dealing with a market of increasingly international firms. 

Given the increasing costs of exploits and stagnating budgets, US government customers can also become territorial against others within the interagency. Some vendors interviewed noted that government customers can become possessive and completely unwilling for their vendors to share exploits with other customers.115 This can cause vendors to avoid selling even completely distinct products to other government agencies, for fear of damaging the relationship with a current buyer.116 While buying bugs jointly is a potential interagency option, it is rare. Coordinating the movement of funding between agencies is time-consuming, requiring forethought that is not consistent with the normal marketplace tempo.117 Throughout this relationship, trust between the supplier and end client is key. There is a risk that the government client will cut into the supplier’s bottom line by being too risk-averse and territorial.118 There is also the risk that the supplier has worked with untrustworthy parts of the international supply chain, resulting in an untrustworthy product for the government client. In this field, trust is currency. 

International and regional policies around exploit sales affecting government purchasers are also on the horizon. In 2024, the United Kingdom and France initiated the Pall Mall Process as an international dialogue meant to establish guiding principles for the “development, facilitation, purchase, and use of commercially available cyber intrusion capabilities.”119 The process emerged from international outrage over NSO Group’s sales to numerous authoritarian countries worldwide, alongside additional revelations that the offensive cyber capabilities market was growing rapidly. This mission, in theory, is much broader than “end-to-end” spyware: it encompasses development, sales (from brokers or companies), and use of spyware– which includes the acquisition, development, and maintenance of zero-day exploits.120 The consultation summary report initially included laudable proposals around zero-day exploitation, such as encouraging VEP programs internationally and creating clear guidelines for vendors in the space.121 However, several follow-on reports on Pall Mall have focused mainly on applying international law frameworks toward government use of such capabilities or state-by-state policies guides. This suggests not only a divergence in stakeholder interest for what topic Pall Mall should tackle first but also a divergence in understanding of how to translate international norms to an operational level across countries.122

US Big Tech companies as a strategic counterweight 

Because the use of zero-day exploits in cyber operations inherently takes advantage of weaknesses in private sector software products, US domestic technology companies’ cybersecurity measures are a strategic obstacle to US offensive cyber goals. In many ways, this is a strategic obstacle by design. The public outcry over US intelligence community’s efforts to influence the distribution of deliberately insecure products,123 or mandating backdoors into existing technology products124 has shifted US policy away from built-in eavesdropping tools and towards ensuring that US products are secure by design.125 However, companies like Google, Apple, Meta, Microsoft, or Cisco are frequent targets for vulnerability research and exploitation because their products are so prevalent. Any private sector vendor, with or without insider knowledge, can easily assume that a zero-day exploit against a widely used application will likely be more attractive to a potential government customer, and thus are incentivized to exploit those applications. This is particularly obvious in the mobile market, where Android (developed by Google) is on 71 percent of all mobile phones globally, and iOS (developed by Apple) is on 28 percent—in other words, 99 percent of global mobile phones run US Big Tech software.126 As a result, plenty of offensive cyber capability firms worldwide have been found selling products with iOS and Android exploits.127

US Big Tech companies, to protect against exploitation and government operations against their users, have invested heavily into cybersecurity defenses, taken steps to make their products secure, and thwarted government attempts to make their products less secure through regulation.128 The complexity and robustness of cybersecurity mitigations (such as sandboxing, logging crashes, and other exploit mitigations) have prolonged development cycles for exploits (from days or weeks in the early 2000s to 6 to 18 months or more)129 and have also driven up prices.130

The actions by US Big Tech companies have made zero-day exploitation incredibly difficult over the last decade for five reasons. First, security measures have resulted in hyper-specialization within the offensive cyber capabilities industry. As product codebases become ever more complex, learning how a product works to find vulnerabilities becomes more time consuming, and vulnerability researchers have fewer incentives to look at more than one product.131 Second, thanks to layered security measures, most vulnerability research shops now must not only find single exploits (i.e., exploit primitives), but also be able to chain them into exploit chains to successfully gain access to the newest iOS or Android phone.132 Third, the act of chaining exploits together and maintaining the chain for a government customer has also become increasingly complicated,133 with large technology firms employing quick turnarounds to fix vulnerabilities (i.e., “quick-patch cycles”).134 Fourth, some US Big Tech companies have created threat-hunting teams, like Google’s Project Zero, dedicated to researching zero-days found “in-the-wild” (i.e., being actively exploited by an attacker)135 and conducting novel research136 to directly thwart efforts made by offensive firms to exploit any devices.137 

Finally, Western Big Tech firms have begun suing offensive cyber capability firms in US federal courts. While the lawsuits do not yet involve US firms, the precedent set in these cases may open US contractors to risks of future lawsuits. In 2019, WhatsApp sued NSO Group for violating the Computer Fraud and Abuse Act (CFAA), the primary US anti-hacking law, and the WhatsApp platform’s terms of service.138 This case was widely regarded as a win for human rights. Namely, a large company with a wide history of providing products to human-rights-abusing governments, who primarily used the platform to spy on domestic civil society groups and even against US government personnel, was forced to cease their activities exploiting WhatsApp software and to pay significant fines.139 However, because the argument laid out in the case relied on an explanation of how NSO’s exploits worked, both vendors and government officials alike have concerns about the ripple effects it may cause in the zero-day research community.140 In particular, NSO Group was found in violation of the CFAA because their Pegasus spyware used a WhatsApp exploit to deliver Pegasus to WhatsApp users across all major operating systems, even despite the fact that they were likely doing so on behalf of a government customer.141 While, unlike with the Israel-based NSO Group, the national security carve-out in the CFAA could protect most US firms, this particular part of the anti-hacking law has not yet been tested in US courts.142

C. China’s acquisition pipeline 

Chinese offensive cyber capability firm No Sugar Tech’s website. Source: No Sugar Tech, accessed April 5, 2025, https://www.nosugartech.com.

“This market [for offensive cyber] is basically land reclamation. Look at the legion model of Huawei and Qi Anxin – they’ve got 10,000 people, and we have a team of 100.” 
– Leaked discussion between co-founders of Chinese cyber mercenary company iSoon, January 14, 2022.

“Why would the PLA want to work with us? We are a non-Chinese party … they cannot control what we tell people. [But] the PLA could always go through a third party, or go through someone else … I [would] not have a problem selling something to the Chinese government.” 
– Thomas Lim, former founder of Singaporean Exploit Firm COSEINC (Risky Business podcast, 2014).


Supply—Well established, comprehensive feeder systems 

Companies—Prime and subcontractor ecosystem, with outsourcing of both capability and operations to the private sector. 

China’s offensive cyber capabilities firms are also a mix of both large prime contractors and smaller bespoke companies. However, unlike US defense primes, prime contractors for China’s offensive cyber projects are often the same Chinese big tech firms that sell products in the global market. China’s major cybersecurity firms, such as QiAnXin, Huawei, Qihoo360, and NSFocus provide services directly to the Chinese military—Qihoo360, China’s leading antivirus company, assisted with China’s hack of the US health insurance company Anthem.143 Many of the large technology firms also have internal bespoke teams that focus on offensive security work. However, unlike the Google Project Zero model, such internal teams directly provide research on exploitation to the government rather than making government-funded zero-day research hard. Chinese large technology firms also directly fund or subcontract work to small- and medium-sized offensive security start-ups.144 Cofounders of such offensive security start-ups are usually serial entrepreneurs, who also encourage families to enter the industry.145 For large tech firms that do not have embedded offensive security teams or bid for government contracts directly, China’s 2021 Vulnerability Disclosure Law forces engagement with the overall offensive pipeline regardless (as explained in the sections below). 

Chinese offensive cyber capabilities firms (both prime and subcontractors), such as No Sugar Tech seen in the image above, provide multiple offensive-cyber services at once. These can include various offerings, selling targeting platforms, various hacking services, or even access to victims’ devices and data directly to the Chinese government—an outsourcing of both capability and operations to the private sector. This is a much broader remit than US firms, which often only provide the capabilities. When Chengdu-based offensive security company iSoon’s marketing materials and internal chat logs were leaked online in 2023, researchers discovered that iSoon sold all three services (hack-for-hire, selling victim data gained by directly hacking targets, and targeting platforms for such hacking) to a variety of Chinese government clients.146 iSoon also subcontracted for the major Chinese cybersecurity company Qi An Xin, while sourcing vulnerabilities and other capabilities from other firms when they could not source services in-house.147 For example, iSoon cooperated with Chengdu 404 on research regarding “software vulnerability of information systems”—Chengdu 404 was previously indicted by the US Department of Justice (DOJ) for conducting computer intrusion campaigns against more than 100 global victims.148

Chinese researchers also experiment heavily with changing the underlying cyber landscape by using AI, with government support. As early as 2017, the Chinese government began to integrate “intelligentization” into its armed forces and contractors: the concept of incorporating numerous emerging technologies—including decentralized computing, data analytics, quantum computing, AI, and unmanned or robotic systems—into the PLA’s conceptual framework.149 Chinese cyber actors have been using large language models since 2024 to create deepfakes for disinformation campaigns,150 but this likely only scratches the surface. Researchers believe China already utilizes even more cutting-edge AI research in cyber operations. Since 2021, at least six Chinese universities with links to known Chinese state-sponsored cyber operations have been conducting cutting-edge AI research.151 Moreover, China’s AI industry has deep connections with its offensive cyber industry. Since 2021, an AI tool created by Huawei, a sanctioned Chinese company, has been a dominant contributor to the Linux kernel. A majority of contributions from Huawei’s AI tool, known as “HULK bot,” are fixing previously unknown vulnerabilities (the tool is a machine-learning enabled fuzzer).152 Despite Western-led efforts to prevent Chinese firms from obtaining semiconductors able to support the training of high-end large language models, this has not impacted Chinese AI firms as deeply as initially expected and suggests that Chinese cyber operators will increasingly be able to utilize AI research in the future.153

Domestic talent—Large, centralized, state-sponsored 

While the United States relies on an international talent pool to secure these capabilities, China largely relies on its domestic talent but is moving to capture more of the market in East Asia. China has an incredibly robust domestic talent pool of offensive hacking talent: the Chinese hacking ecosystem, as judged by their CTF competitions alone, is immense. Government sponsorship ensures large-scale funding, extensive participation, and stable career pipelines for top competitors—China’s top ten CTF national competitions attract over 11,000 participants on average.154 This is in stark contrast to the 2,000 individuals participating in the US Cyber Open, the top contest within the US’s relative handful of government-sponsored contests. By sheer numbers alone, it is unsurprising that China each year has more graduates in the science, technology, engineering, and mathematics (or “STEM”) fields than the United States produces in total college graduates.155 

Of course, the Chinese CTF ecosystem is only part of a comprehensive and deliberate feeder system from universities, cybersecurity conferences, and hacking competitions into the Chinese offensive cyber apparatus. Chinese military universities and high-end science and engineering schools produce high-caliber graduates in deeply applied offensive cybersecurity research, some of whom are encouraged to develop final projects that involve hacking into US companies.156 Many of them, upon graduating, either work on offensive teams of existing offensive security firms, found an offensive cyber start-up, or work directly for high-end teams in China’s Ministry of State Security (MSS) or People’s Liberation Army (PLA).157 Talent pools from China’s higher education are also supplemented by a wide array of government-sponsored hacking competitions and conferences. The Chinese government has hosted hundreds of official CTF and other industry standard hacking competitions, often in partnership with many of its ecosystem’s offensive security companies and with universities that provide financial incentives for students to participate.158 Many other CTF competitions were directly founded by top Chinese teams that used to compete internationally,159 while other competitions have involved breaking into real foreign technology products or even enterprise systems.160 The Chinese government and its major offensive firms seek to recruit directly from these competitions.Interview with Dakota Cary, Fellow, Atlantic Council Global China Hub, January 8, 2025.  

Unlike the United States, the People’s Republic of China (PRC) has the unique advantage of having a hacking community that originated in explicit, patriotic alignment with state interests, making such hackers easier to recruit. One of China’s first hacker groups was the Hongke Union who, in 2001, famously took down the White House website and defaced websites of US businesses in retaliation for the collision between a US spy plane and a Chinese fighter jet off of Hainan Island.161 In the early to mid-2000s, as China was experiencing unprecedented economic growth, China’s hackers either professionalized and created technology companies, were co-opted directly into China’s growing cyber forces, or both. For example, the head of the Green Army, Jiye Shen (a.k.a. “Goodwill” on hacker forums), created the internet security company NSFocus in 2000.162

Meanwhile, the PLA, in 2005, directly recruited Tan Dailin (谭戴林, a.k.a. Wicked Rose), a student from the Sichuan University of Science and Engineering, to design hacking tools for the Chinese military.163 Wicked Rose then formed a patriotic hacking group to break into DOD computer systems in 2006.164 MSS, China’s foreign intelligence organization, also began recruiting talent both directly and indirectly during the early 2000s.165 This organization has suited the many hackers less able to conform to physical fitness tests or other rigid requirements the PLA typically requires of its military recruits, with just as many benefits.166 

The Chinese government has spent the last decade effectively closing off its domestic talent pool from outside influence. From 2016 to 2021, China effectively began to prevent hackers from sharing research with the global hacking community. In July 2016, Wooyun, a vulnerability disclosure platform created by the Chinese “ethical hacking” community, which had engaged frequently with Taiwanese and other international hackers, was suddenly taken down, and its founding members were arrested by Chinese authorities without charges.167 Some China researchers speculate that the takedown was an action taken at the behest of the MSS, China’s primary intelligence service, who wished to control the vulnerability marketplace.168 In 2018, China announced a regulation (“Regulating the Promotion of Cybersecurity Competitions”) effectively banning hackers from travelling abroad to participate in hacking competitions, as well as requiring any vulnerabilities found through domestic competitions to be directly reported to the Ministry of Public Security (MPS), China’s law enforcement organization, and other relevant departments.169 Chinese hacker participation at contests like Pwn2Own dropped to zero, and the number of presentations given by Chinese researchers at Taiwanese conferences fell precipitously.170

More recently, China has expanded its reach into East and Southeast Asia through hacking competitions and partnerships with regional researchers, seeking to secure additional talent on its own terms. Academics from the Harbin Institute of Technology and Beijing University of Posts and Telecommunications have advocated for actively engaging with hacking communities in East Asia seeking to influence future international standards for how vulnerabilities are discovered and managed.171 While Chinese hackers cannot participate in most Western hacking competitions, Chinese CTF events often attract or even outright invite talent in the wider East and South Asian regions to participate. The QiangWang Cup and RealWorldCTF (respectively, linked to the PLA and MSS) are two Chinese hacking contests that historically have had participants from Vietnam, Japan, Russia, Ukraine, and even the United States.172 Moreover, China prolifically sponsors and hosts international hacking conferences to draw in international talent. Chinese researchers, while unable to participate in most outside hacking competitions, still have a large presence at “Hack in the Box” Dubai and other conferences, which reflects the coordination and sharing that China and the United Arab Emirates have in cyberspace. Chinese conference “GeekCon” (active in China from 2014 to 2021) re-established itself in Singapore from 2021 onwards, soliciting international talks and insinuating that they still abided by China’s vulnerability disclosure laws.173 Elite Chinese and South Korean offensive security research companies (Pangu Team and POCSecurity, respectively) consistently collaborate to recruit international talent to MOSEC, a conference on mobile security hosted in Shanghai every year.174

It is clear that China, while limiting the activities of its domestic hackers, already sources some vulnerabilities from foreign hackers living abroad. COSEINC, a Singaporean vulnerability research company run by Thomas Lim (a Singaporean national with ties to China),175 was put on the US entities list in 2021, likely for selling exploits to the Chinese government.176 Lim, a known entity in East Asia’s vulnerability research circles, publicly stated that he was not against selling his products to the Chinese government.177 China may also be tricking researchers into handing over bugs to the Chinese state. In 2021, Taiwanese vulnerability researcher Orange Tsai reported a vulnerability to Microsoft that impacted its exchange servers two days after a Chinese Advanced Persistent Threat (APT) group began exploiting the same vulnerability in its operations. This suggests that either two separate individuals (one Chinese and one Taiwanese) independently discovered the vulnerability, or information about the vulnerability was somehow obtained from the researcher by a Chinese entity.178 

China’s offensive cyber capability acquisition methods. 

Government contracts for offensive cyber care less about stealth than access and provide additional resources to firms. 

The Chinese system accepts higher operational risk for the sake of speed and flexibility. China’s acquisition system has decentralized mechanisms, such that even provincial and municipal government entities contract directly with local cyber firms. iSoon’s former website listed over fifty-six different clients, ranging from the MPS to a wide variety of various provincial, city, and municipal public security bureaus—effectively the equivalent of FBI field offices.179 Based on the leaks, iSoon held individual contracts for goods and services with several municipal and provincial level bureaus (similar in size to the Cincinnati or Pittsburgh police departments) purchasing hack-for-hire capabilities. Chinese legal scholars have also bemoaned China’s national intelligence apparatus’s lack of clear pre-, mid-, and post-supervision structures for intelligence operations more broadly.180 This suggests that decentralization is a feature of the overall system rather than an exception.181 

Unlike in the United States, where government acquisition is slow and risk-averse, Chinese firms can operate opportunistically, sometimes combining cybercrime with state-sponsored activity, with minimal fear of reprisal as long as they align with state interests. Internal discourse from within the Chinese hacker community suggests that, despite China’s cybersecurity laws and ancillary legislation on regulating vulnerabilities, there is a grey zone for what activity is permitted, versus what may get a patriotic Chinese hacker “invited to tea” at MPS or MSS offices.182One famous example is Wicked Rose, who, after creating the NCPH hacker group and defacing multiple US websites, was arrested by the MPS in 2009 for engaging in domestic cybercrime.183 He likely received a commuted sentence in exchange for an agreement to contract for the MSS just two years later (which resulted in Wicked Rose founding Chengdu 404, a company indicted by the DOJ in 2020), and was likely permitted to continue his criminal activities as long as they targeted victims outside China.184 China researchers interviewed have also suggested that the Chinese government gives hackers significant leeway, while underpaying them for services and handling its most sensitive matters in-house.185 While the Chinese government deliberately depresses prices and exercises monopsony power, its decentralized model and allowance of a “grey zone” enables a more flexible contracting environment that enables smaller players. Small and medium-sized companies like iSoon, Chengdu 404, and others have been shown to obtain contracts through a mix of “guanxi” (networking and relationship building) and formal contracting processes.186 

Most importantly, the PRC’s overall contracting process, including the loose leash on its corporate hackers-for–hire, largely does not penalize organizations when they are caught or attributed. In 2013, the security firm Mandiant published a report on APT1, the first publicly-outed Chinese threat group, and attributed it to the Chinese PLA Unit 61398.187 While the report initially sent shockwaves through the Chinese state security apparatus, many quickly realized that naming and shaming did not result in strategic level or department level pain.188 Rather, most US policies that resulted from “naming and shaming” threat groups fell into two groups: DOJ indictments of individual Chinese hackers (who likely were not planning on leaving China for a US-extradition friendly state anyway) or economic sanctions on Chinese offensive security companies that did not plan on doing much business with Western firms.189 Thus, while middle managers of China’s security services likely must prioritize both operational tradecraft and obtaining intelligence of strategic value to the Chinese Communist Party, the goal of obtaining such intelligence significantly outweighs the requirement to adhere to tradecraft and professionalism, as there are few real costs of attribution on the managers of such operations.190 Of course, like the grey zone, there are likely exceptions to this rule, such as if a single Chinese company causes the wider CCP intelligence apparatus to “lose face.”191

China’s apparent preference for results over attribution also enables Chinese organizations to utilize riskier capabilities (such as noisier, easier-to-detect n-day vulnerabilities) and to reuse infrastructure, even when it allows Western organizations to better detect them. In that sense, truly “burning” (or disposing of) a capability is much rarer in China.192 Moreover, this preference provides room for private-sector hackers to experiment. Some Chinese offensive cyber capability shops can also observe what other countries’ offensive teams are doing “in-the-wild” and attempt to echo the techniques of other countries’ APT groups.193 For example, Chinese APTs were able to exploit a vulnerability linked to NSA hacking tools leaked online in 2017, prior to the leak itself, suggesting that either an elite Chinese team found the same bug as the NSA during a similar timeframe, or they were able to detect the NSA exploit, reverse engineer it, and then use it themselves.194 

Finally, CCP intelligence and law enforcement mechanisms clearly provide consistent resourcing to their offensive firms, likely to help shorten the feast-or-famine cycles. Experts following the Chinese cyber capabilities market largely agree that the Chinese government likely has a method of vulnerability sharing among both their private sector and government operators, with tiers of access and privileges.195 The sources of vulnerabilities likely range from hacking competitions like the Tianfu Cup,196 acquisitions from existing contractors (both foreign and domestic), and vulnerability reports into the MSS-operated China National Vulnerability Database (CNNVD), and other government vulnerability databases. 

China’s combination of revealed results-forward preference over stealth, and commitment to resource sharing with its private sector, results in a unique vulnerability resourcing process, where small subsets of more elite hacking “A-teams” get early access to the zero-day vulnerabilities. However, once the vulnerability is discovered, the Chinese government opens the capability to other groups.197 This was famously evidenced in the 2021 Microsoft Exchange attacks, where a Chinese APT group exploited a vulnerability targeting Microsoft Exchange two days before the vulnerability was reported to Microsoft on January 5th.198 Before Microsoft could issue a patch for the vulnerability, multiple other Chinese APT groups began using the same exploit in their campaigns.199 Microsoft released a patch for the vulnerability on March 2nd – one day later, Chinese threat groups began exploiting the vulnerability en-masse.200 However, while the Microsoft Exchange vulnerability is the most notorious example, Chinese threat analysts have seen this pattern play out for even non-critical vulnerabilities in other public-facing services, such as web servers, virtual private networks (VPNs), and other edge devices.201 This rapid weaponization of both 0day and n-day vulnerabilities also explains why certain campaigns use relatively new vulnerabilities or access points to gain entry into targets that are relatively low-hanging fruit—at this point, the “D-teams” have obtained access to the capabilities previously used by “A-teams.”202 In some senses, this results in an enormous ability to efficiently weaponize offensive cyber capabilities—this system enables organs of the PRC government to efficiently build, acquire, and weaponize capabilities ranging from the mediocre to the exquisite.203 It also stands in stark contrast to the US model, effectively extending the shelf-life of a purchased capability. 

Currently, China has yet to engage with the Pall Mall process or other international codes of practice to regulate the acquisition and use of offensive cyber capabilities. 

China uses its CTF and regulatory ecosystem to solicit bugs informally from hackers for national security use; its major technology companies are strategic allies in sourcing exploits. 

As stated previously, China effectively prevented its domestic vulnerability research talent pool from sharing research with the wider community between 2016 and 2021. During this time, China began ramping up hacking opportunities and vulnerability disclosure programs domestically: the CNNVD (the previously mentioned MSS-run vulnerability database) grew its partnerships from fifteen technical support units and partner companies in 2016 to 151 companies in 2023.204 This expansion drew in Chinese Big Tech firms like Tencent, Huawei, and Hikvision, which would report vulnerabilities in their own products. Other partners also included specialized offensive capability firms. Moreover, hackers who could no longer compete internationally were encouraged to compete in Chinese live-hacking competitions, like the famous Tianfu Cup, founded in 2018 as a “Chinese Pwn2Own.”205 However, both the Tianfu Cup and the CNNVD have ties to the Chinese intelligence and law enforcement apparatus. In 2017, researchers found that if a vulnerability was reported to the CNNVD that had value to MSS cyber operations, the CNNVD would delay publishing the vulnerability, write an exploit for the vulnerability, and use it in operations.206 Meanwhile, the Tianfu Cup was (and remains) a vulnerability feeder system for the MPS, China’s national police. Vulnerabilities submitted as part of the Tianfu Cup competition are sent straight to the MPS, which would be used in law enforcement operations against Uighurs and other minority groups.207 If the vulnerabilities were not already full exploit chains (i.e., ready-to-use), the MPS would disseminate the proof-of-concept code to private firms to further exploit.208

In addition to its domestic researchers, China has even integrated its respective heavyweight  tech firms into its offensive cyber programs. Unlike US Big Tech companies, which act as a strategic blocker against the US vulnerability ecosystem, Chinese technology companies (and even foreign tech companies operating in China) are far more beholden to the Chinese government and have largely been co-opted into the CCP’s vulnerability acquisition funnel. This is unsurprising. While Chinese technology firms have similar market caps to their Western counterparts, their primary consumers are still domestic Chinese users. For example, Huawei, the leading smartphone company in China, only makes up 4 percent of the global smartphone market.209

China began integrating “civil-military fusion” concepts into its cybersecurity industry starting in 2017, embedding military units into its domestic cybersecurity companies.210 Setting up a PLA military-civil fusion center in a company enables the Chinese military to connect with industry peers and resources almost seamlessly by embedding military members into companies to work side-by-side with internal staff.211 Various entities, including universities and private companies, use this model to collaborate with the Chinese government to submit zero-days, co-partner on defense research labs, and set up private IT infrastructure for state-sponsored hacking operations.212

PRC’s integration of technology companies into its offensive pipeline does not end with staffing choices. State policies demand forced disclosures of vulnerabilities. Since 2021, the PRC has required all software companies operating in China to (reluctantly or otherwise) report vulnerabilities that impact any systems, regardless of source, directly to the PRC government. In 2021, China released new regulations on vulnerability management, the Regulations on the Management of Network Product Security Vulnerabilities (RMSV),213 which mandates reporting all industry-wide discoveries of vulnerabilities to the Chinese government within 48 hours.214 This affects all technology companies operating in China, including foreign software firms. In the disclosure, companies are encouraged to upload proof-of-concept code and instructions on how to replicate the vulnerability, which would undoubtedly be helpful to Chinese offensive missions.215 It also has impacted US critical infrastructure firms: one of the companies found to comply with the Chinese law is Schneider Electric, a US industrial control systems and energy company, whose products (and subsequent vulnerabilities) are likely offered with minimal alteration in both the US and Chinese markets.216 

Companies that do not comply with the law are penalized. In 2021, an engineer in Chinese company Alibaba found and disclosed a critical zero-day vulnerability impacting Apache Log4j (a widely used software application) to the US Apache Foundation (maintainers of Log4j) instead of notifying Chinese regulators.217 As a result, Chinese regulators suspended a cooperative partnership with Alibaba regarding cybersecurity threats and information-sharing platforms for six months.218 It is important to note that this RMSV process is separate from and, in many ways, completely counterproductive to the internationally accepted bug bounty and coordinated vulnerability disclosure process.219 Instead of interfacing directly with the manufacturer of a technology product and encouraging them to be more secure, China’s RMSV regulation circumvents this process by (1) mandating that the Chinese government be notified first instead of the company and (2) persuading the sharing of exploit code, but only with the government. 

Despite this, Chinese technology firms still contribute to finding bugs in Western technology firms. Chinese researchers accounted for 27 percent of all vulnerabilities reported to the bug bounty programs of Apple, Google Android, and Microsoft from 2017 to 2023.220 Many of these contributions are also from security companies that have links to the Chinese intelligence apparatus.221 These contributions are frequently linked to a small handful of individuals within these companies, and a company’s contributions to such bug bounty programs fall when one or more Chinese hackers transitions between security companies.222 Given the strict chokehold the CCP holds on these firms and their vulnerability reporting pipelines, researchers in the US speculate that the CCP’s security services recognize that some slackening of restrictions is necessary to retain a truly robust talent pool, especially for hackers that are motivated by international recognition rather than mission or money.223 It is also likely beneficial to the PRC that its hackers and companies are seen as responsible stakeholders in the global cybersecurity market. 

Key findings 

During the literature review, data analysis, and expert interviews (as laid out in the above sections), nine key findings emerged: 

  1. Zero-day exploitation is becoming more difficult, opaque, and expensive. The global hacking ecosystem is highly international and fragmented. The amount of time and capital required to develop an impactful capability has escalated dramatically in the last decade, leading to riskier feast-or-famine contract cycles. The growing number of publicly discovered zero-day threats does not detract from this market trend, in fact, the increase suggests a concurrent rising number of players in the international market. Multiple sources interviewed estimate the number of individuals consistently producing zero-day exploits is in the low hundreds globally. 
  1. Middlemen create market inefficiency and erode trust in the market. Given the lack of transparency in the zero-day market, middlemen with prior government connections further drive up costs and create inefficiency in the US and FVEYs market, while eroding trust between buyers and sellers. 
  1. The United States relies on international talent, while China relies on domestic might. The US offensive cyber workforce relies heavily on international talent pools in South America, Europe, and other FVEYs countries. China’s domestic cyber pipeline dwarfs that of the United States, but China is also increasingly moving its supply network out to the Middle East and East Asia. 
  1. Talent investment in US offense is lacking. US government investment into the offensive talent pipeline, however sparse, has focused on defensive jobs, whereas China has well established and comprehensive feeder systems within its offensive apparatus. US talent in exploit development also experiences a “Training Valley of Death” between junior and intermediate levels. 
  1. US acquisition favors large prime contractors, slows acquisition in pursuit of stealth, and adds additional risk through opacity. US cyber capability acquisition favors large defense contractors, who take on heavy compliance burdens while shifting project requirements to smaller firms. The US government internally prioritizes extremely high levels of accuracy, trust, and stealth, which can create market inefficiencies and a reliance on high-cost, exquisite zero-day exploit procurements. Certain US government customers deliberately lengthen the contract cycle by refusing to share information about desired capabilities with firms, leading to an inefficient process where firms may work on an exploit that a customer has no intent to purchase. 
  1. China’s acquisition uses decentralized contracting methods, outsources operations, shortens contract cycles through additional resourcing, and prolongs the life of an exploit through “n-day usage.” While China also relies on large prime contractors, government ministries have decentralized government procurement processes, such that even provincial government offices issue contracts to firms. China’s regulatory environment actively encourages vulnerability reporting to the state, often integrates corporate research with government offensive strategies, and widely enables private sector hack-for-hire operations. China has also shortened the feast-or-famine contract cycle for exploits by providing additional resources to its private sector firms, and it continues to use exploits after their discovery. 
  1. US cybersecurity goals, coupled with Big Tech’s dominance, are strategic counterweights to the US offensive capability program. Because zero-day exploits in cyber operations take advantage of weaknesses in private sector software products, the global market dominance of the US Big Tech companies ensures that, as such, they act as a strategic obstacle to US offensive cyber goals. This demonstrates a strategic trade-off between economic prosperity (and global trust in US products), and national security. In contrast, China’s tech firms have a far less global market share, and they are a strategic enabler of China’s offensive cyber program. 
  1. International partnerships for unique offensive cyber capabilities attempt to leverage different circles, but the opaque market offers no guarantees. The United States leverages international alliances, particularly within the FVEYs intelligence-sharing network, to bolster its cyber capabilities. In contrast, China focuses on cultivating regional influence and integrating offensive cyber capabilities from East Asia and the Middle East. However, given the opaque international market, preference for full chains leveraging multiple exploit primitives, and the increase in bug collisions, there is no 100 percent guarantee of unique capability. 
  1. China leans forward on AI in cyber operations. China’s offensive cyber industry is already heavily integrated with AI institutions, and China’s private sector has been proactively using AI for cyber operations. The US government’s primary efforts with both AI and cyber have largely been defensive in nature, or within the intelligence community internally, although some DARPA programs have encouraged open offensive innovation. 

Recommendations


“We are not going to deter the adversary with defenses only… I will work to strengthen our offensive cyber capabilities to ensure the President has the options. He needs to respond to this growing threat.”Katie Sutton, Nominee for Assistant Secretary of Defense for Cyber Policy (2025).224


It is impossible for the United States to match China’s supply of zero-day exploits by sheer numbers alone, and adopting the Chinese policies for acquisition and supply is the equivalent of stooping to the level of an authoritarian state. However, there are myriad ways to materially and quickly bridge this gap. Informed by analysis from over 30 expert interviews and open-source data gathering, this report concludes by offering ten recommendations across supply, acquisition, and operations to close this capability gap. Each of these recommendations must be filtered through a consideration of timeline (swift action is needed given the increasing potential for conflict with China in the coming years), feasibility (cyber is one of the last bipartisan domains but with implications for contentious national issues and cross-cutting networks of civil society, government, and industry stakeholders), buy-in from the hacker community (alienation or acceptance from this community will determine failure or success), and maintaining Western values (to learn from CCP cyber models without adopting them wholesale). 

Supply 

  1. The United States government should create vulnerability research accelerators through existing investment vehicles. 

The United States struggles to obtain capabilities from skilled smaller firms, relying on prime contractors with burdensome overhead costs. Creating Vulnerability Research Accelerators (VRAs) through the DOD’s Strategic Capabilities Office (SCO), In-Q-Tel, or the Defense Innovation Unit (DIU) could significantly bolster the supply of zero-day exploits by fostering the growth of small, specialized research teams. This would circumvent the de facto requirement for a small business to go through a prime contractor to sell offensive capabilities to the government. These accelerators would focus on supporting small businesses (those with at least five dedicated vulnerability researchers), ensuring that funding and resources are directed toward those generating the original research rather than prime contractors with existing relationships with the government. The VRAs would help these companies navigate the complex federal contracting process, get Small Business Administration certifications, hold and pay for security clearances, and connect companies directly to government contracts. By doing so, the accelerator would significantly lower the barrier to entry and reduce administrative burdens that often deter small but highly skilled teams from engaging with government contracts directly. 

  1. The NSA should expand its CAE-CO program, provide grants to private organizations that support existing CTFs and offensive security conferences, and directly fund CTF teams at top universities. 

Domestic CTF teams at universities die without adequate funding and support. The NSA should bolster the pipeline of skilled vulnerability researchers while demonstrating that the US government values and invests in offensive security talent. It could do so by providing grants to private organizations or academic institutions that support CTF competitions, offensive security conferences, and university-based CTF teams. Directly sponsoring CTFs and hacker clubs at leading universities would nurture talent at the source, as CTFs have long been a testing ground for some of the world’s best exploit developers and security researchers. Government funding, paired with resources and mentorship, would encourage students to view vulnerability research as a viable career path, ultimately fostering a new generation of skilled researchers. The NSA, through these grants, could also encourage additional academic institutions to create programs that comply with CAE-CO accreditations or postgraduate programs that solve the “Training Valley of Death,” taking apprentice vulnerability researchers to cyber “journeymen” status. 

This program should also pair with grants among FVEYs and other allies to fund companies that conduct “cyber journeyman”-like training, host international CTFs and security conferences, or hire international researchers at higher rates than Chinese or other firms, expanding the pool of talent while strengthening partnerships abroad. This approach would help cultivate both domestic and international pipelines of vulnerability researchers, ensuring that the United States and its partners remain competitive in offensive security innovation. This is most important to do within international fora outside the US sphere of influence. For example, offensive conferences in South Korea, Thailand, and Singapore could provide ample networking opportunities with hackers who risk of getting pulled into China’s vulnerability acquisition orbit. The international hacker community tends to view the US government with skepticism, but it is notably more receptive to private companies that are perceived as supporting the community—even if those companies work closely with the government. By positioning itself as an enabler rather than a direct participant, the US government can build trust while supporting the development of offensive security skills. 

  1. DOD and Congress must expand programs on AI-enabled vulnerability research and consider n-day exploitation where possible. 

Investing in technologies that reduce dependency on zero-days—such as automation, AI-driven vulnerability discovery, and novel exploitation techniques—would future-proof US cyber capabilities, effectively “intelligentizing” DOD’s cyber organizations. As software security continues to advance, traditional exploit chains are becoming harder to develop and maintain. While defense is important, the DOD must also prioritize research into next-generation exploitation methods that can help sustain offensive capabilities in the long term—particularly for other, harder targets in East Asia. Expanding government programs, like AIxCC and INGOTS,225 while encouraging offensive firms to create additional tools, like Google’s OSSFuzz,226 would enable firms already conducting vulnerability research to do so in a more scalable manner while also assisting defensive efforts. Alternatively, creating a section under the National Defense Authorization Act (NDAA) for “automated code auditing” or “exploit chain generation for both n-day and 0day” for the armed services could send a demand signal to the wider defense innovation ecosystem, encouraging venture capital and other investment firms to find ways to scale the labor-intensive process of vulnerability research. 

To combat excess slowdowns due to risk aversion, as well as to extend the life of an acquired capability, USCYBERCOM should also consider additional policies around n-day exploitation and use. This could lengthen the lifecycle of an acquired capability, prevent excess waste and time in contract cycles, and also provide additional resourcing to junior-level talent in offensive cyber firms (who can likely exploit n-days but are not yet able to reliably conduct zero-day exploitation). USCYBERCOM is an ideal organization to try new policies around n-day acquisition as, while stealth is important in military operations, it is not required for all of them. 

  1. DOJ should provide legal guidance and counter-intelligence protection to vulnerability researchers. 

Vulnerability researchers in the private sector, particularly those who participate in bug bounties, often rely on their companies or entities like the Security Research Legal Defense Fund227 to defend themselves from lawsuits that seek to chill their research. The legal challenges are only more numerous for individuals selling these capabilities for national security purposes, especially if the individual is selling capabilities for classified purposes, which cannot be disclosed in court without greymail concerns. While the US government has clear interests in protecting security research (e.g., through DOJ policies not criminally prosecute good faith security research and the CFAA’s subsection for a national security carve out to hacking),228 as well as protecting individuals from counterintelligence threats, there is no centralized task force actively looking to protect hackers (especially ones without clearances), and no policy priority to ensure that civil lawsuits are settled with an eye on how they impact private sector hacking supply chains.229 

One potential solution is to empower the DOJ’s Civil Division to intervene in civil lawsuits through existing procedural mechanisms if an offensive capability firms’ researcher faces a lawsuit by a technology company (particularly if the researcher works for government interests).230 This would likely need pairing with a publication on transparent criteria for how to define “government interest” for CFAA purposes, and how firms can seek protection under those terms (similar to how the DOJ’s “good-faith security research” policy published in 2022 clarified what cases DOJ would or would not prosecute against hackers).231 Another approach would be to establish a federally funded legal defense fund modeled after the Security Research Legal Defense Fund, providing independent legal support to security researchers working on US government contracts. Additionally, a task force could be created within the FBI or the Office of the Director of National Intelligence’s (ODNI) National Counterintelligence and Security Center (paired with the first “demand” option below) to address counterintelligence concerns raised by hackers and provide a clear point of contact for researchers facing foreign threats or legal retaliation. These measures would help foster a safer and more reliable environment for the private sector supply chain supporting US cyber operations. 

Demand

  1. Create a government-sponsored vulnerability broker for the US intelligence community within a federally funded research and development center. 

On the demand side, establishing a government-sponsored broker for vulnerability acquisition could streamline the fragmented and opaque market, particularly for companies without existing connections into the US federal contracting system and individual researchers who may reach out to private sector middlemen. The current landscape relies heavily on private brokers, who often inflate prices and obscure the true value of individual exploits. A government-backed intermediary could improve efficiency, offer more predictable payment structures, and reduce the risks associated with relying on third-party brokers. While this effort could be coordinated at a National Security Council (NSC) level, a Federally Funded Research and Development Center (FFRDC) would likely be the best place to implement such a program. This is because, thanks to interagency equities and Title 10 / Title 50 concerns, there is likely no single agency within the Intelligence Community or DOD that a government-sponsored middleman could work without spawning duplicate structures across the ecosystem, causing a drain of government resources.232 

Such a program would likely need an individual at the helm with experience in exploit acquisition, one who would understand the needs of the various agencies and also be able to interface directly with the hacker community. Any bug would still need to go through the VEP,233 and then funnel vulnerabilities to existing contracts based on need. This middleman program should also be able to solicit bugs regardless of origin, directly contracting with friendly international suppliers beyond even the FVEYs. This program could also offer additional insights into the zero-day supply chain for future coordination amongst the FVEYs and additional regional allies. 

  1. Decentralize, internationalize, and simplify the process for purchasing bugs. 

Government acquisition moves at a glacial pace, even for cyber capabilities. The US government must find ways to decentralize purchasing authority away from prime-heavy government contracts. Secretary of Defense Pete Hegseth, in March 2025, began moving towards more efficient software acquisition mechanisms. However, this effort is largely tailored to commercial software solutions (which zero-day exploits are not).234 The DOD could create an acquisition vehicle specifically for cyber capabilities used in support of SIGINT or defensive efforts, particularly for cheaper capabilities purchased directly from researchers or small firms. This could be in the form of creating a Software Acquisition and Practices (SWAP) for offensive cyber specifically, or by expanding programs for offensive cyber acquisitions under Other Transaction Authorities.235 Any acquisition mechanism, to succeed, cannot contain US person or clearance requirements, allowing companies the flexibility to hire international talent. 

Congress could also alter the US government’s Simplified Acquisitions Program to enable the US government to purchase offensive cyber capabilities. All products that support overseas contingency operations236 or that facilitate defense against or recovery from a cyber-attack can already be purchased via the micro-purchase program (if the cost is less than $20,000) and can be acquired through the Simplified Acquisitions Program (if the cost is less than $800,000 domestically or $1.5 million abroad).237 It is far more likely that lower-tier vulnerabilities will fall under the Simplified Acquisitions program than the micro-purchase program, but the micro-purchase program could provide for one-off technical projects or additional resources given to offensive cyber capabilities firms, which could supplement government operations and lessen the burden of feast-or-famine cycles.238 

  1. Resource such processes accordingly. 

Raising the budget for zero-day acquisition across the government is also essential to ensure companies do not go out of business when making exclusive sales to the government. Increased funding would allow the US government to secure higher-quality vulnerabilities and reduce concerns that a single purchase of a critical exploit does not ruin the acquisition budget for the rest of the fiscal year. Additionally, while big-ticket iOS and Chrome vulnerabilities garner widespread attention, real cyber operations often rely on lower-profile but highly specialized exploits tailored to niche devices and environments. These require not only technical sophistication but also partnerships, trust, and deep operational knowledge—especially when targeting software specific to a particular region or industry. Policymakers must recognize this complexity and resource the ecosystem accordingly, ensuring both intelligence-gathering and operational effectiveness while holding stakeholders accountable for outcomes. Expanding cyber-specific pathways of the Simplified Acquisitions Program (which already exist for “facilitating defense against or recovery from cyber [attacks]”) and raising the cap for cyber capabilities up to $3 million that fall under a simplified acquisitions program would further assist this effort to buy higher quality, harder target exploits. 

Policy

  1. Identify highly skilled foreign researchers and hire them wherever possible. 

When zero-day exploits and bespoke cyber capabilities are created by a finite pool of international talent (and especially if the number of highly skilled vulnerability researchers globally is indeed in the low hundreds), talent recruitment becomes a zero-sum game. To maintain a competitive edge, the United States and its allies must focus not only on acquiring superior capabilities but also on attracting and retaining top talent—both foreign and domestic—while actively countering adversary advancements through a combination of acquisition, disruption, and strategic talent recruitment. Many top-tier vulnerability researchers might qualify for the “Gold Card” visa program by lowering the tier requirement (e.g., $500,000 instead of $5 million).239 Moreover, many private sector technology firms would also likely be interested in recruiting this talent for defensive purposes. US firms can hire vulnerability researchers to make the ecosystem safer. 

US alliances also become particularly useful in this regard. As China attempts to expand its offensive hacking talent pool to researchers in East Asia, South Asia, and the Middle East, encouraging companies that provide cyber capabilities to the FVEYs to hire foreign talent, work with foreign firms, and invite foreign researchers to cybersecurity conferences will likely be a necessary counter strategy to prevent this from occurring. While recruiting hundreds of hackers through the FVEYs seems like a daunting task, this is far less than the over 1600 German nuclear and rocketry scientists brought over to the United States alone from the Cold War-era program, Operation Paperclip.240

  1. Catch and burn capabilities. 

Not every researcher will want to work for the US government or its allies. While some researchers prefer to focus on the work, many Chinese researchers enjoy the mission of working for their home governments. This likely comprises a significant pool of potential vulnerabilities in China every year. The MSS currently has 324 partner companies, who have disclosed almost 4,000 vulnerabilities to the CNNVD.241 Thus, the US intelligence community should actively identify offensive capabilities not just leveraged by adversary states, but also offensive capabilities likely being sold to adversary states, to either disclose them to vendors who can fix them or use them in false flag operations. This will assist US companies in making their products more secure, while also imposing costs on an adversary. 

  1. Deepen offensive cyber collaboration among allies. 

Replicating these policies among US partners and allies is crucial to shaping and maintaining the base of offensive talent and capability. Shielding up-and-coming talents from the Chinese sphere of influence will be vital to maintaining a long-term competitive advantage. If the FVEYs cannot convince individuals to come directly to FVEYs countries, getting them out of China’s sphere of influence would suffice. Creating diplomatic programs through the US State Department focusing on technical talent exchange and industry-wide collaboration (which would benefit both defensive and offensive vulnerability research talent) would be ideal to do so. While key countries in Europe and South America would likely be an important start beyond the FVEYs, deepening cyber relationships with South Korea and Thailand (two treaty allies) would likely be key countries to engage. 

However, the more countries that the US partners with, the higher the risk that the United States funds a capability that may be used to commit human rights abuses or to spy on US persons. The Pall Mall initiative, which attempts to establish global norms around ethical hacking and responsible offensive cybersecurity practices, represents a step toward addressing this complexity, if the coalition focuses on actual acquisition of capabilities rather than use. Encouraging the Pall Mall process to create better guidance on hiring foreign and uncleared talent to address counterintelligence risks and creating a coalition of countries willing to sell exploits to one another with proper human rights safeguards (particularly with the goal of stepping away from China’s sphere of influence) would be crucial steps towards developing a coalition with proper guardrails in place. 

Conclusion 

Given the finite international zero-day marketplace, it is imperative that the United States and its allies continue to ensure the availability of such capabilities (understanding the industry, rooting out malicious actors, and developing trusted sources) while limiting China’s access to those same capabilities. If the United States fails to do so, it risks losing its competitive edge to adversaries—most notably China—who are investing heavily in cultivating their domestic cyber talent pipeline and enabling a more flexible, market-driven approach to acquisition. China’s permissive regulatory environment and government-backed support for private-sector hacking companies have allowed it to scale its capabilities rapidly. Without a corresponding investment in the US ecosystem—both in terms of talent development and acquisition reform—the United States could face long-term strategic disadvantages. 

The current landscape is bleak. China has a larger supply of hackers than the United States, and its offensive pipeline has grown incredibly robust in the last decade. If, from an operational perspective, China is already a peer adversary in cyberspace,242 China’s hacking capabilities will likely exceed those of the United States very soon, if it has not already. 

However, this moment also presents an opportunity. The United States can strengthen its position by embracing policies that nurture a robust domestic talent pipeline, reduce barriers to entry for small vulnerability research businesses, and streamline the government’s acquisition process to work more effectively with the private sector. Investing in legal protections, expanding support for hacker communities, and fostering international partnerships can secure the supply chain while building trust between the government and researchers. 

Ultimately, the United States must not only maintain parity with China but also ensure that it remains at the forefront of offensive cybersecurity capabilities. Choices made today will determine whether the United States can sustain its cyber advantage or whether, when called upon to do more, the US offensive cyber supply chain crashes and burns itself. 

About the author

Winnona DeSombre Bernsen is nonresident fellow with the Cyber Statecraft Initiative, part of the Atlantic Council Tech Programs, and a Master of Public Policy/Juris Doctor candidate at Harvard Kennedy School and Georgetown Law.

She was formerly a security engineer at Google’s Threat Analysis Group, tracking targeted threats against Google users, and she is the founder of the offensive security conference DistrictCon, held in Washington DC. In recent years, Winnona has organized policy content at DEF CON and authored multiple pieces on offensive cyber capability proliferation. 

Acknowledgements 

This paper could not have been written without the assistance of my many mentors and colleagues in hacking and cyber policy. Thank you for fielding my tireless questions, vouching for me to potential interviewees, and reviewing my copious notes. A special thank you to the Atlantic Council, Trey Herr, and Nikita Shah for giving me the opportunity to pursue this project, to Margin Research for their partnership and assistance with data gathering, and to Mark Griffin and the local Washington DC hacker community for their interview corroboration assistance. 

This paper is dedicated to my husband Derek (who has tirelessly supported my four-year odyssey through graduate and law school), Sophia d’Antoine, and all the members of our shared Book Club. While this thesis was produced over the last year, our discussions over the last half-decade have deeply influenced the final product. 

Appendices

Appendix A: Abbreviations and key terms 

Access-as-a-Service: a form of offensive cyber capabilities service that provides black-box technological solutions to customers looking to break into devices.  

artificial intelligence (AI): the ability of computers or machines to perform tasks that traditionally require human intelligence, such as learning, reasoning, problem-solving, and perception 

Advanced Persistent Threat (APT): a sophisticated, sustained cyber campaign in which an intruder establishes an undetected presence in a network to steal sensitive data over a prolonged period of time. 

bespoke: This term refers to tailored or customized entities, services, or products within the information security environment. 

bug bounty programs: Programs run by companies to encourage hackers to find and report security vulnerabilities in their software. Hackers receive monetary rewards (“bounties”) for valid reports, enabling companies to identify and fix issues before malicious actors exploit them. 

bug collision: The parallel, independent discovery of a vulnerability by multiple researchers. 

Capture the Flag (CTF): Hacking competition in a simulated environment where participants solve security challenges, like exploiting vulnerabilities, reverse engineering, or cryptography, to “capture flags” (hidden tokens representing successful completion). 

China National Vulnerability Database (CNNVD): A national vulnerability database of the PRC, operated by the MSS, China’s foreign intelligence service. 

Chinese Communist Party (CCP): China’s, or PRC’s, ruling political party. It holds ultimate authority over the state, military, and society. 

Computer Fraud and Abuse Act (CFAA): United States federal law that criminalizes and provides for civil penalties for various forms of computer-related fraud and abuse. 

Cybersecurity and Infrastructure Security Agency (CISA): component of the United States Department of Homeland Security responsible for cybersecurity and infrastructure protection 

Defense Advanced Research Projects Agency (DARPA): research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. 

Exploit Broker: An intermediary company or middleman that purchases vulnerabilities and exploits from researchers and sells them to government agencies or other clients.  

exploit chain: A sequence of multiple exploit primitives used in conjunction with one another to achieve a particular effect, such as gaining full control over a system. 

exploit primitive: a basic exploit that, on its own, may not be enough to compromise a system but can be leveraged in combination with other primitives to achieve a more significant effect. 

Federal Bureau of Investigation (FBI): the domestic intelligence and security service of the United States and its principal federal law enforcement agency. 

Federally Funded Research and Development Center (FFRDC): public-private partnerships that conduct research and development for the United States Government—famous examples include Lawrence Livermore National Laboratory, MIT Lincoln Laboratory, and MITRE. 

Five Eyes (FVEYs): An intelligence-sharing alliance comprising five countries: the United States, United Kingdom, Canada, Australia, and New Zealand. 

live hacking: Live onstage demonstrations of hackers exposing system bugs or hacking into systems. 

Ministry of Public Security (MPS): China’s national police agency, responsible for law enforcement, domestic security, and maintaining public order. 

Ministry of State Security (MSS): China’s primary civilian intelligence and security agency, responsible for foreign intelligence, counterintelligence, and internal security. 

National Security Agency (NSA): The US intelligence agency under the DOD tasked with SIGINT collection and cybersecurity. 

n-day exploit: A tool or piece of code that exploits an n-day vulnerability (a known security flaw), typically targeting systems that have not yet applied the vendor’s patch. 

n-day vulnerability (n-day): A publicly disclosed software vulnerability that is known to the vendor, and a patch is likely available. Yet, it is still exploitable if systems remain unpatched. 

National Defense Authorization Act (NDAA): U.S. federal law that sets the annual budget and authorizes appropriations for the U.S. Department of Defense, nuclear weapons programs of the Department of Energy, and other defense-related activities. 

National Institute of Standards and Technology (NIST): agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. 

People’s Liberation Army (PLA): The armed forces of the PRC, controlled by China’s ruling party, the CCP. 

People’s Republic of China (PRC): The official name of mainland China, governed by the CCP. 

Proof of Concept (PoC): Sample code showing that a particular vulnerability is exploitable. It proves an attack is feasible but may not be a fully reliable exploit. 

quality assurance (QA): systematic efforts taken to assure that the product delivered to customer meet with the contractual and other agreed upon performance, design, reliability, and maintainability expectations of that customer. 

Regulations on the Management of Network Product Security Vulnerabilities (RMSV): a set of regulations in China that mandate network product providers to promptly report any security vulnerabilities in their products to the CCP. 

signals intelligence (SIGINT): intelligence derived from electronic signals and computer systems used by foreign targets. 

Strategic Capabilities Office (SCO): rapid prototyping organization within the DOD to address high priority operational and strategic challenges. 

US Cyber Command (USCYBERCOM): The unified combatant command of the DOD responsible for conducting cyberspace operations. 

US Department of Defense (DOD): United States Department in charge with coordinating and supervising the U.S. armed services. 

US Department of Justice (DOJ): United States Department that oversees the domestic enforcement of federal laws and the administration of justice. 

Vulnerabilities Equities Process (VEP): process used by the U.S. federal government to determine on a case-by-case basis how it should treat zero-day vulnerabilities. 

zero-day vulnerability (0day / zero-day): A software vulnerability that is unknown to the software vendor and has not yet been patched. 

zero-day exploit: A tool or piece of code that takes advantage of a zero-day vulnerability to compromise a system. 

Appendix B: List of cited interviewees 

  1. JD Work, Professor at National Defense University. 
  1. Ian Roos, VP of Intelligence, Margin Research.  
  1. Mei Danowski, Natto Thoughts. 
  1. Dakota Cary, Fellow, Atlantic Council Global China Hub. 
  1. Adam Kozy, CEO of SinaCyber. 
  1. Derek Bernsen, DARPA Program Manager. Note, Mr. Bernsen’s comments do not reflect the opinions of DARPA, the DOD, or the US Government. 
  1. Chi-en (Ashley) Shen, Security Researcher. 
  1. Former US Intelligence Community Official (Background Interview) 
  1. Founder of Vulnerability Research Company 1 (Background Interview). 
  1. Founder of Vulnerability Research Company 2 (Background Interview). 
  1. Founder, Vulnerability Research Company 3 (Background Interview). 
  1. Founder, Former Vulnerability Research Vendor (Background Interview). 
  1. Former ONCD Official (Background Interview). 
  1. U.S. Government China Cyber Analyst (Background Interview). 
  1. Founding Member of Vulnerability Research Company (Background Interview). 
  1. Pwnie Award Organizer (Background Interview). 
  1. Member of Defense Science Board, Study on Cyber as a Strategic Capability (Background Interview). 
  1. China Area Specialist in the Vulnerability Research Space (Background Interview). 
  1. Security Researcher with Experience in Collection and Cyber Operations (Background Interview). 
  1. CTO of Defense Contractor in the DOD / IC space (Background Interview). 
  1. USG China Analyst (Background Interview). 
  1. DOD Cyber Official (Background Interview). 
  1. Senior DOD Cyber Official 1 (Background Interview). 
  1. Senior DOD Cyber Official 2 (Background Interview). 
  1. USG Cyber Official (Background Interview). 
  1. Independent Security Researcher (Background Interview). 
  1. Former Senior Intelligence Official (Background Interview).  

Explore the program

The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

1    Alexei Bulazel (@0xAlexei), “That’s right. America has incredible offensive cyber power. We need to stop being afraid to use it,” X, December 24, 2024, 1:39 p.m., https://x.com/0xAlexei/status/1871626708488720565.  
2    David DiMolfetta, “Contractors Could Hack Back against Adversaries, Top Cyber Democrat Says,”. NextGov, April 2, 2025, https://www.nextgov.com/cybersecurity/2025/04/contractors-could-hack-back-against-adversaries-top-cyber-democrat-says/404233/.
3    “L3harris Trenchant Ltd (Overview),” Pomanda, accessed April 3, 2025, https://pomanda.com/company/09068202/l3harris-trenchant-ltd.
4    Asaf Lubin, “Unpacking WhatsApp’s Legal Triumph Over NSO Group,” Lawfare, January 7, 2025, https://www.lawfaremedia.org/article/unpacking-whatsapp-s-legal-triumph-over-nso-group.
5    Sam Sabin, “Cyber’s Big Budget Week,” Politico, March 28, 2022, https://www.politico.com/newsletters/weekly-cybersecurity/2022/03/28/cybers-big-budget-week-00020739.
6    Maddie Stone and James Sadowski, “A Review of Zero-Day In-the-Wild Exploits in 2023,” Google, March 27, 2024, https://blog.google/technology/safety-security/a-review-of-zero-day-in-the-wild-exploits-in-2023/; Sergiu Gatlan, “Google: Spyware Vendors Behind 50% of Zero-Days Exploited in 2023,” BleepingComputer, March 27, 2024, https://www.bleepingcomputer.com/news/security/google-spyware-vendors-behind-50-percent-of-zero-days-exploited-in-2023/; Casey Charrier et al., “Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis,” Google Cloud (blog), April 29, 2025, https://cloud.google.com/blog/topics/threat-intelligence/2024-zero-day-trends
7    Dave Aitel, “OffensiveCon23—Information Security Is an Ecology of Horrors and You Are the Solution,” YouTube video, accessed March 8, 2025, https://www.youtube.com/watch?v=BarJCn4yChA&ab_channel=OffensiveCon.
8    Halvar.flake, “Book Review: ‘This Is How They Tell Me the World Ends,’” ADD / XOR / ROL (blog), February 23, 2021, https://addxorrol.blogspot.com/2021/02/book-review-this-is-how-they-tell-me.html.
9    Jonah Victor, “China’s Thickening Information Fog: Overcoming New Challenges in Analysis,” Center for the Study of Intelligence 68, no. 23, September 2024, https://www.cia.gov/resources/csi/studies-in-intelligence/studies-in-intelligence-68-no-3-extracts-september-2024/chinas-thickening-information-fog-overcoming-new-challenges-in-analysis/.
10    Evan Rosenfield, “The NSA’s Brain Drain Has a Silver Lining,” Defense One, April 12, 2023, https://www.defenseone.com/ideas/2023/04/nsas-brain-drain-has-silver-lining/385051/.
11    Winnona DeSombre Bernsen, “Same Same, but Different, Margin Research, February 29, 2024, https://margin.re/2024/02/same-same-but-different/.
12    Bureau of Industry and Security, “Commerce Removes Sandvine from Entity List Following Significant Corporate Reforms to Protect Human Rights,” US Department of Commerce, October 21, 2024 (release), https://www.bis.gov/press-release/commerce-removes-sandvine-entity-list-following-significant-corporate-reforms-protect-human-rights.
13    Thomas Latschan, “Deep Rift between US and Europe Opens up in Munich,” Deutsche Welle, February 15, 2025, https://www.dw.com/en/deep-rift-between-us-and-eu-opens-up-in-munich/a-71624354.
14    Martin Matishak, Pentagon Fast-Tracks ‘Cyber Command 2.0’ Review, Requests Authorities Wish List,” The Record, February 21, 2025, https://therecord.media/hegseth-cyber-command-2-0-review-authorities-wish-list.
15    “NSPM-13 and the Future of Cyber Warfare,” Hudson Institute (virtual event), May 5, 2022, https://www.hudson.org/events/2109-virtual-event-nspm-13-and-the-future-of-cyber-warfare52022
16    This project was originally developed as a Policy Analysis Exercise product for the Atlantic Council during the author’s time at Harvard Kennedy School.
17    “About CTF (Capture the Flag),” CTFTime, accessed March 16, 2025, https://ctftime.org/.
18    DistrictCon, accessed April 3, 2025, https://www.districtcon.org.
19    This assumes that the target for a cyber operation has been selected and that they do not respond to phishing emails or other forms of access.
20    Winnona DeSombre et al., A Primer on the Proliferation of Offensive Cyber CapabilitiesAtlantic Council, March 1, 2021, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/a-primer-on-the-proliferation-of-offensive-cyber-capabilities/.
21    Gatlan, “Google: Spyware vendors behind 50% of zero-days.”
22    Jen Roberts et al., Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and Its Threats to National Security and Human RightsAtlantic Council, September 4, 2024, https://www.atlanticcouncil.org/in-depth-research-reports/report/mythical-beasts-and-where-to-find-them-mapping-the-global-spyware-market-and-its-threats-to-national-security-and-human-rights/.
23    Roberts et al., Mythical Beasts and Where to Find Them.
24    FVEYs is an intelligence alliance within the five governments rather than set by companies. However, because the five governments often share intelligence, a US company selling offensive cyber capabilities to the US government will often be able to sell to other FVYEs countries without much concern if they wish to expand into international markets.
25    Aitel, “OffensiveCon23—Information Security Is an Ecology of Horrors.” 
26    Adam Bannister, “Bug Bounty Earnings Soar, but 63% of Ethical Hackers Have Withheld Security Flaws – Study,” The Daily Swig, February 24, 2020, https://portswigger.net/daily-swig/bug-bounty-earnings-soar-but-63-of-ethical-hackers-have-withheld-security-flaws-study.
27    Christopher Kissel and Mathew Marden, “The Business Value of Bugcrowd Security Solutions,” IDC Business Value, October 2021, https://www.bugcrowd.com/wp-content/uploads/2023/12/business-value-bugcrowd-security-solutions.pdf.
28    “Inside the Mind of a Hacker,” Bugcrowd, 2024, https://www.bugcrowd.com/resources/report/inside-the-mind-of-a-hacker/.
29    Background Interview, Founder of Vulnerability Research Company 2, January 8, 2025; corroborated by Background Interview, Independent Security Researcher, January 31, 2025; corroborated by Background Interview, Former US Intelligence Community Official, December 27, 2024. 
30    Mark Dowd, “OffensiveCon22—Keynote—How Do You Actually Find Bugs?” YouTube video, April 21, 2022, https://www.youtube.com/watch?v=7Ysy6iA2sqA
31    Note: the Linux kernel has over 27 million lines of code as of 2024. See conversation: “How much code is in Linux? General Linux Question,” FOSS Community, August 2024, https://itsfoss.community/t/how-much-code-in-linux/12493.
32    Background Interview, Founder of Vulnerability Research Company 2, January 8, 2025.
33    Dowd, “OffensiveCon22—Keynote—How Do You Actually Find Bugs?”  
34    “Huawei NetEngine AR617VW Authenticated Root RaCE,” Wr3nchsr, October 31, 2023, https://wr3nchsr.github.io/huawei-netengine-ar617vw-auth-root-rce/; Guang Gong, “TiYunZong: An Exploit Chain to Remotely Root Modern Android Devices,” Blackhat USA, n.d., https://i.blackhat.com/USA-20/Thursday/us-20-Gong-TiYunZong-An-Exploit-Chain-To-Remotely-Root-Modern-Android-Devices.pdf.
35    Phil Muncaster, “Apple Patches Two Zero-Days Exploited in Pegasus Attacks,” Infosecurity Magazine, September 8, 2023, https://www.infosecurity-magazine.com/news/apple-patches-two-zerodays-pegasus/.
36    “Zero-Day Marketplace Explained: How Zerodium, BugTraq, and Fear Contributed to the Rise of the Zero-Day Vulnerability Black Market – API Security,” Wallarm, June 18, 2024, https://lab.wallarm.com/zero-day-marketplace-explained-how-zerodium-bugtraq-and-fear-contributed-to-the-rise-of-the-zero-day-vulnerability-black-market/.
37    Background Interview, Founder of Vulnerability Research Company 2, January 8, 2025; corroborated by Background Interview, Founder of Vulnerability Research Company 1, January 15, 2025; corroborated by Background Interview, Founding Member of a Vulnerability Research Company, January 11, 2025; corroborated by Background Interview, Independent Security Researcher, January 31, 2025.
38    Background Interview, Former ONCD Official, January 8, 2025; corroborated by interview with Derek Bernsen, DARPA Program Manager, January 5, 2025 (Note: Bernsen’s comments do not reflect the opinions of DARPA, the DOD, or the US Government); corroborated by Background Interview, Founding Member of a Vulnerability Research Company, January 11, 2025.
39    Background Interview, Former ONCD Official, January 8, 2025; corroborated by Bernsen interview, January 5, 2025; corroborated by Background Interview, Founding Member of Vulnerability Research Company, January 11, 2025. 
40    Background Interview, Founder of Vulnerability Research Company 2, January 8, 2025; corroborated by Background Interview, Founder of Vulnerability Research company 3, January 9, 2025. 
41    Bernsen interview, January 5, 2025; corroborated by Background Interview, Former ONCD Official, January 8, 2025.
42    Wallarm, “Zero-Day Marketplace Explained: How Zerodium, BugTraq, and Fear Contributed.”
43    Bernsen interview, January 5, 2025; corroborated by On Background Interview, USG Cyber Official, January 26, 2025.
44    This government contracting process may be a uniquely “Western” phenomenon. China analysts posit that the Chinese government has deliberately created avenues for foreigners to offer bugs to the Chinese government in a relatively frictionless way (Interview with Adam Kozy, CEO of SinaCyber, January 17, 2025). 
45    Andy Greenberg, “North Korea Hacked Him. So He Took Down Its Internet,” Wired, February 2, 2022, https://www.wired.com/story/north-korea-hacker-internet-outage/; Clement Lecigne and Maddie Stone, “Active North Korean campaign targeting security researchers,” Google: Threat Analysis Group (blog), September 7, 2023, https://blog.google/threat-analysis-group/active-north-korean-campaign-targeting-security-researchers/
46    Background Interview, Former US Intelligence Community Official, December 27, 2025; corroborated by Background Interview, Founding Member of Vulnerability Research Company, January 11, 2025.
47    ”High-Risk Communities,” Cybersecurity and Infrastructure Security Agency, accessed June 9, 2025, https://www.cisa.gov/audiences/high-risk-communities.
48    Background Interview, Founder, Former Vulnerability Research Vendor, January 8, 2025.
49    Background Interview, Founder, Former Vulnerability Research Vendor, January 8, 2025.
50    Background Interview, Independent Security Researcher, January 31, 2025.
51    Halvar Flake, “OffensiveCon20—Keynote—Why I Love Offensive Work, Why I don’t Love Offensive Work,” YouTube video, April 17, 2020, https://www.youtube.com/watch?v=8QRnOpjmneo; corroborated by Background Interview, Founder of Vulnerability Research Company 2, January 8, 2025; corroborated by Background Interview, Founder of Vulnerability Research company 3, January 9, 2025; corroborated by Background Interview, Founder of Vulnerability Research Company 1, January 15, 2025.
52    Background Interview, Founder, Former Vulnerability Research Vendor, January 8, 2025; corroborated by Background Interview, Founder of Vulnerability Research Company 1, January 15, 2025.
53    Background Interview, Pwnie Award Organizer, January 12, 2025; corroborated by Background Interview, USG China Analyst, January 22, 2025. 
54    Aaron Mehta, “Raytheon is Now RTX. Here’s What That Means for Its Defense Arm,” Breaking Defense, June 23, 2023, https://breakingdefense.com/2023/06/raytheon-is-now-rtx-heres-what-that-means-for-its-defense-arm/.
55    “L3Harris® Fast. Forward., Domain Cyber,” accessed March 16, 2025, https://www.l3harris.com/capabilities/cyber
56    “Peraton Awarded $889M Contract to Support U.S. Army Cyber Command (ARCYBER) and Cyber Mission Partners,” Peraton, January 9, 2024, https://www.peraton.com/news/peraton-awarded-889m-contract-to-support-arcyber-and-cyber-mission-partners/.
57    On Background Interview, Founding Member of Vulnerability Research Company, January 11, 2025. 
58    Andy Greenberg, “Inside Endgame: A Second Act for the Blackwater of Hacking,” Forbes, February 14, 2014 [update], https://www.forbes.com/sites/andygreenberg/2014/02/12/inside-endgame-a-new-direction-for-the-blackwater-of-hacking/; On Background Interview, Founding Member of Vulnerability Research Company, January 11, 2025.
59    A.J. Vicens, “Israeli Spyware Firm Paragon Acquired by US Investment Group, Report Says,” Reuters, December 16, 2024, https://www.reuters.com/markets/deals/israeli-spyware-firm-paragon-acquired-by-us-investment-group-report-says-2024-12-16/.
60    Josh Gold, “The Five Eyes and Offensive Cyber Capabilities: Building a ‘Cyber Deterrence Initiative,’” NATO Cooperative Cyber Defence Centre of Excellence,” October 30, 2020, https://ccdcoe.org/library/publications/the-five-eyes-and-offensive-cyber-capabilities-building-a-cyber-deterrence-initiative/.
61    Gold, “The Five Eyes and Offensive Cyber Capabilities.”
62    On Background interview, Former US Intelligence Community Official, December 27, 2024; corroborated by Background Interview, Independent Security Researcher, January 31, 2025.
63    Aitel, “OffensiveCon23—Information Security Is an Ecology of Horrors.”
64    Background Interview, Independent Security Researcher, January 31, 2025.
65    Winnona Desombre et al., Countering Cyber Proliferation: Zeroing in on Access-as-a-ServiceAtlantic CouncilScowcroft Center, March 2021, https://www.atlanticcouncil.org/wp-content/uploads/2021/03/Offensive-Cyber-Capabilities-Proliferation-Report-1.pdf.
66    Yizheng Chen et al., “DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection,” Association for Computing Machinery: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (October 2023), 654-68,  https://doi.org/10.1145/3607199.3607242; Ziyang Li, Saikat Dutta, and Mayor Naik, “LLM-Assisted Static Analysis for Detecting Security Vulnerabilities” (Version 2), Cornell University: arXiv, November 24, 2024, https://doi.org/10.48550/ARXIV.2405.17238
67    System for Award Management, (2024, September 1). “Intelligent Generation of Tools for Security (INGOTS) Contract Opportunity,” US General Services Administration, accessed March 16, 2025, https://sam.gov/opp/98406eb5b34641468e25287249077c48/view
68    “Research Overview,” National Security Agency: Central Security Service, accessed June 9, 2025, https://www.nsa.gov/Research/Overview/#:~:text=We%20bring%20increased%20depth%2C%20resilience,teaming%20with%20artificial%20intelligence%20agents.
69    “Overview – Interview with Dr. Kathleen Fisher,” AixCC: AI Cyber Challenge, accessed April 5, 2025, https://aicyberchallenge.com/overview/
70    DOD Data, Analytics, and Artificial Intelligence Adoption Strategy, US Department of Defense, June 27, 2023 [publication clearance date], https://media.defense.gov/2023/Nov/02/2003333300/-1/-1/1/DOD_DATA_ANALYTICS_AI_ADOPTION_STRATEGY.PDF.
71    Executive Order No. 14179, “Removing Barriers to American Leadership in Artificial Intelligence,” 90 FR 8741 (January 23, 2025), https://www.federalregister.gov/documents/2025/01/31/2025-02172/removing-barriers-to-american-leadership-in-artificial-intelligence; “Security on the Path to AGI,” OpenAI, March 26, 2025, https://openai.com/index/security-on-the-path-to-agi/; Emil Sayegh, “Stargate AI Project: The $500 Billion Gamble to Dominate the Future,” Forbes, January 22, 2025,  https://www.forbes.com/sites/emilsayegh/2025/01/22/stargate-ai-project-the-500-billion-gamble-to-dominate-the-future/.  
73    “CAE Institution Map,” CAE in Cybersecurity Community, June 9, 2025 [map update], https://www.caecommunity.org/cae-map; “CyberCorps: Scholarship for Service,” US Office of Personnel Management, accessed March 16, 2025, https://sfs.opm.gov/.
74    CAE in Cybersecurity Community, “CAE Institution Map.” 
75    Background Interview, Former US Intelligence Community Official, December 27, 2024; corroborated by Background Interview, Independent Security Researcher, January 31, 2025.
76    Data gathering by Winnona DeSombre—full data available upon request. 
77    “DEF CON 24 Hacking Conference, Capture the Flag,” DEF CON Communications, Inc. accessed March 16, 2025, from https://defcon.org/html/defcon-24/dc-24-ctf.html.
78    “CSAW’25 Capture the Flag, US-Canada, Mena, Europe, India, Mexico,” New York University OSIRIS Lab, accessed March 16, 2025, from https://www.csaw.io/ctf.
79    Capture the Flag with Google,” Google CTF, accessed March 16, 2025, https://capturetheflag.withgoogle.com/.
80    Background Interview, Former US Intelligence Community Official, December 27, 2024; corroborated by Background Interview, Independent Security Researcher, January 31, 2025.  
81    Background Interview, Founder of Vulnerability Research Company 1, January 8, 2025, corroborated by Background Interview, Founder, Vulnerability Research Company 3, January 9, 2025; corroborated by Background Interview, Independent Security Researcher, January 31, 2025.
82    Advanced Cyber Training Program, accessed May 14, 2025, from https://www.mantech.com/focus-areas/cyber-training/
83    Katzcy Consulting, “Cybersecurity Games: Building Tomorrow’s Workforce,” National Institute for Standards and Technology (NIST), 2016, https://www.nist.gov/system/files/documents/2017/04/24/cyber_games-_building_future_workforce_final_1031a_lr.pdf.
84    National Cyber Workforce Strategy, June 25, 2024. https://web.archive.org/web/20240816044309/https://www.whitehouse.gov/wp-content/uploads/2024/06/NCWES-Initial-Report-2024.06.25.pdf. 
85    John Perry Barlow, “A Not Terribly Brief History of the Electronic Frontier Foundation,” November 8, 1990, Electronic Frontier Foundation. https://www.eff.org/pages/not-terribly-brief-history-electronic-frontier-foundation.
86    “A History of Protecting Freedom Where Law and Technology Collide,” Electronic Frontier Foundation, October 7, 2011, https://www.eff.org/about/history.
87    Aitel, “OffensiveCon23—Information Security Is an Ecology of Horrors.” 
88    Background Interview, Founder of Vulnerability Research Company 1, January 8, 2025, corroborated by Background Interview, Founder, Vulnerability Research Company 3, January 9, 2025; corroborated by Background Interview, Founder, Former Vulnerability Research Vendor, January 8, 2025.
89    Zero Day Initiative Blog, Trend Micro, accessed March 16, 2025, https://www.thezdi.com/blog.
90    Data gathering by Winnona DeSombre—full data available upon request.
91    cts🌸 (@gf_256), “The real CTF skill is Mergers & Acquisitions,” X (then as Twitter: https://t.co/jpQClGf1KU), May 28, 2023, 6:03 p.m., https://x.com/gf_256/status/1662942688155451395.
92    Theori (Company Profile and Financial), Crunchbase, accessed March 16, 2025, https://www.crunchbase.com/organization/theori.
93    Justin Doubleday, “CYBERCOM Embraces the Non-Traditional as Acquisition Program Grows,” Federal News Network, April 15, 2024, https://federalnewsnetwork.com/defense-news/2024/04/cybercom-embraces-the-non-traditional-as-acquisition-program-grows/.
94    Background Interview, Founding Member of Vulnerability Research Company, January 11, 2025; corroborated by Background Interview, Independent Security Researcher, January 31, 2025; corroborated by Background Interview, Former ONCD Official, January 8, 2025; corroborated by Background Interview, Senior DOD Cyber Official 1, January 23, 2025. 
95    Background Interview, Founding Member of vulnerability research company, January 11, 2025. 
96    Interview with Ian Roos, VP of Intelligence, Margin Research, March 9, 2025.
97    On Background Interview, Former ONCD Official, January 8, 2025; corroborated by Bernsen Interview, January 5, 2025; corroborated by Background Interview, Founding Member of Vulnerability Research Company, January 11, 2025; corroborated by Background Interview, Founder, Former Vulnerability Research Vendor, January 8, 2025; corroborated by Background Interview, Independent Security researcher, January 31, 2025.
98    “Government Contractor Requirements,” National Institute of Standards and Technology (NIST), August 2, 2024 [update], https://www.nist.gov/itl/smallbusinesscyber/guidance-topic/government-contractor-requirements.
99    Chelsea Meggitt, “Prime Contractors – Move from Sub to Prime Contracting,” Collaborative Compositions, September 13, 2022, https://collaborativecompositions.com/prime-contractors-move-from-sub-to-prime-contracting/.  
100    “Facility Clearances,” Defense Counterintelligence and Security Agency, accessed March 16, 2025, https://www.dcsa.mil/Industrial-Security/Entity-Vetting-Facility-Clearances-FOCI/Facility-Clearances/
101    Roos interview, March 9, 2025.
102    Background Interview, Former ONCD Official, January 8, 2025; corroborated by Bernsen interview, January 5, 2025; corroborated by Background Interview, Founding Member of Vulnerability Research Company, January 11, 2025.
103    On Background Interview, Founder, Vulnerability Research Company 3, January 9, 2025; corroborated by Background Interview, Founder of Vulnerability Research Company 1, January 8, 2025; corroborated by Background interview, Founder, Former Vulnerability Research Vendor, January 8, 2025.
104    Background Interview, Former ONCD Official, January 8, 2025. 
105    “Vulnerabilities Equities Policy and Process for the United States Government, Trump White House Archives, November 15, 2017, https://trumpwhitehouse.archives.gov/sites/whitehouse.gov/files/images/External%20-%20Unclassified%20VEP%20Charter%20FINAL.PDF.
106    Background Interview, CTO of Defense Contractor in the DOD / IC Space, January 22, 2025; corroborated by interview with JD Work, Professor at National Defense University, January 31, 2025. 
107    Executive Order 14093, “Prohibition on Use by the United States Government of Commercial Spyware That Poses Risks to National Security,” 88 FR 18957 (2023, March 30), https://www.federalregister.gov/documents/2023/03/30/2023-06730/prohibition-on-use-by-the-united-states-government-of-commercial-spyware-that-poses-risks-to.
108    Stephanie Kirchgaessner, (2021, July 18). Saudis Behind NSO Spyware Attack on Jamal Khashoggi’s Family, Leak Suggests,” The Guardian, July 18, 2021, https://www.theguardian.com/world/2021/jul/18/nso-spyware-used-to-target-family-of-jamal-khashoggi-leaked-data-shows-saudis-pegasus
109    Background Interview, Independent Security Researcher, January 31, 2025; corroborated by Background Interview, Founder of Vulnerability Research Company 1, January 8, 2025; Background Interview, DOD Cyber Official, January 23, 2025; corroborated by Bernsen interview, January 5, 2025. 
110    On Background Interview, CTO of Defense Contractor in the DOD / IC space, January 22, 2025.
111    On background interview, Independent Security Researcher, January 31, 2025; corroborated by Background Interview, Founder of Vulnerability Research Company 1, January 8, 2025. 
112    Background Interview, Former ONCD Official, January 8, 2025; corroborated by Background Interview, Founder, Vulnerability Research Company 3, January 9, 2025.
113    Background Interview, Independent Security Researcher, January 31, 2025; corroborated by Background Interview, Founder of Vulnerability Research Company 2, January 8, 2025.
114    Background Interview, Independent Security Researcher, January 31, 2025; corroborated by Background Interview, Founder, Former Vulnerability Research Vendor, January 8, 2025.
115    Background Interview, Independent Security Researcher, January 31, 2025; corroborated by Background Interview, Founder of Vulnerability Research Company 1, January 8, 2025; corroborated by Background Interview, Founder, Former Vulnerability Research Vendor, January 8, 2025.
116    Background Interview, Independent Security Researcher, January 31, 2025; corroborated by Background Interview, Founder of Vulnerability Research Company 1, January 8, 2025; corroborated by Background Interview, Founder, Former Vulnerability Research Vendor, January 8, 2025.
117    Background Interview, Member of Defense Science Board, Study on Cyber as a Strategic Capability, January 15, 2025.
118    Background Interview, Founder, Former Vulnerability Research Vendor, January 8, 2025; corroborated by Background Interview, Founding Member of Vulnerability Research Company, January 11, 2025; corroborated by Background Interview, Independent Security researcher, January 31, 2025; corroborated by Background Interview, Former U.S. Intelligence Community Official, December 27, 2025.
119    “Pall Mall Process: Consultation on Good Practices Summary Report,”. UK Foreign, Commonwealth and Development Office, January 8, 2025, https://www.gov.uk/government/publications/the-pall-mall-process-consultation-on-good-practices-summary-report.
120    UK Foreign, Commonwealth and Development Office, “Pall Mall Process: Consultation On Good Practices Summary Report.
121    UK Foreign, Commonwealth and Development Office, “Pall Mall Process: Consultation On Good Practices Summary Report.
122    Louise Marie Hurel et al., “The Pall Mall Process on Cyber Intrusion Tools: Putting Words into Practice,” March 14, 2025, https://rusi.org/explore-our-research/publications/commentary/pall-mall-process-cyber-intrusion-tools-putting-words-practice
123    “The Clipper Chip,” Electronic Privacy Center, accessed April 5, 2025,. https://archive.epic.org/crypto/clipper/.
124    “Amicus Briefs Apple v. FBI,” Electronic Privacy Information Center, accessed April 5, 2025, https://epic.org/documents/apple-v-fbi-2/.
125    “Secure by Design: It’s Time to Build Cybersecurity into the Design and Manufacture of Technology Products,” Cybersecurity and Infrastructure Security Agency (CISA), accessed April 5, 2025, https://web.archive.org/web/20250102030020/https://www.cisa.gov/securebydesign.
126    “Mobile Operating System Market Share Worldwide May 2024 – May 2025,” chart,  StatCounter GlobalStats, accessed April 4, 2025, https://gs.statcounter.com/os-market-share/mobile/worldwide.
127    Maddie Stone, “0-days exploited by commercial surveillance vendor in Egypt,” Google Threat Analysis Group, September 22, 2023,. https://blog.google/threat-analysis-group/0-days-exploited-by-commercial-surveillance-vendor-in-egypt/; Bill Marczak et al., “Triple Threat: NSO Group’s Pegasus Spyware Returns in 2022 with a Trio of iOS 15 and iOS 16 Zero-Click Exploit Chains,” Munk School Citizen Lab, University of Toronto. April 18, 2023, https://citizenlab.ca/2023/04/nso-groups-pegasus-spyware-returns-in-2022/
128    “Apple Can No Longer Offer Advanced Data Protection in the United Kingdom to New Users,” Apple Support (UK), February 24, 2025,. https://support.apple.com/en-gb/122234.
129    Background interview, Founder of Vulnerability Research Company 1, January 15, 2025; corroborated by Background Interview, Founder of Vulnerability Research Company 2, January 8, 2025; corroborated by Background Interview, Founding Member of Vulnerability Research Company, January 11, 2025; corroborated by Background Interview, Founder of Vulnerability Research company 3, January 9, 2025.
130    Background interview, Founder of Vulnerability Research Company 1, January 15, 2025; corroborated by Background Interview, Founding Member of Vulnerability Research Company, January 11, 2025; corroborated by Background Interview, Founder of Vulnerability Research company 3, January 9, 2025. 
131    Work interview, January 8, 2025; corroborated by Background Interview, Founder, Former Vulnerability Research Vendor, January 8, 2025.
132    Background Interview, Founder of Vulnerability Research Company 2, January 8, 2025; corroborated by Background Interview, Founder of Vulnerability Research company 3, January 9, 2025; corroborated by Background Interview, Founder of Vulnerability Research Company 1, January 15, 2025; corroborated by Background Interview, Founding Member of Vulnerability Research Company, January 11, 2025.
133    Flake, “OffensiveCon20—Keynote—Why I Love Offensive Work, Why I don’t Love Offensive Work.”
134    About Project Zero, Project Zero, accessed June 9, 2025, https://googleprojectzero.blogspot.com/p/about-project-zero.html.
135    Ben Hawkes, “0day ‘In the Wild,’” Project Zero, May 15, 2019, https://googleprojectzero.blogspot.com/p/0day.html.
136    Ravie Lakshmanan, “Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices,” The Hacker News, January 10, 2025,. https://thehackernews.com/2025/01/google-project-zero-researcher-uncovers.html.
137    All bugs found by Project Zero are disclosed to the affected company directly, and the company is given 90 days to fix the underlying issue before Google publishes technical details about the bug openly—encouraging rapid remediation of the vulnerability. However, Big Tech’s actions have not been without scrutiny. In 2020–21, Google’s Project Zero unilaterally and publicly shut down multiple Western-led counter-terrorism operations in cyberspace because they found the operations used vulnerabilities in Android and Chrome products. See: Patrick Howell O’Neill, “Google’s Top Security Teams Unilaterally Shut Down a Counterterrorism Operation,” MIT Technology Review, March 26, 2021, https://www.technologyreview.com/2021/03/26/1021318/google-security-shut-down-counter-terrorist-us-ally/; Michael Coppola, “Google: Stop Burning Counterterrorism Operations,” author blog, June 24, 2024, https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/
138    Suzanne Smalley, “NSO Ruling Is a Victory for WhatsApp, but Could Have a Small Impact on Spyware Industry,”. The Record, January 10, 2025, https://therecord.media/nso-whatsapp-ruling-may-have-limited-impact-on-spyware-ecosystem.
139    Asaf Lubin, “Unpacking WhatsApp’s Legal Triumph Over NSO Group,” Lawfare, January 7, 2025, https://www.lawfaremedia.org/article/unpacking-whatsapp-s-legal-triumph-over-nso-group.
140    Background Interview, Member of Defense Science Board, Study on Cyber as a Strategic Capability, January 15, 2025.
141    Lubin, Unpacking WhatsApp’s Legal Triumph Over NSO Group.”
142    Fraud and related activity in connection with computers, 18 U.S.C. § 1030(f). 
143    “The Chinese Private Sector Cyber Landscape,” Margin Research, , April 25, 2022, https://margin.re/2022/04/the-chinese-private-sector-cyber-landscape/.
144    Margin Research, “The Chinese Private Sector Cyber Landscape.”
145    Background Interview, U.S. Government China Cyber Analyst, January 9, 2025.
146    Cyber Treat Research Team, “A comprehensive Analysis of I-Soon’s Commercial Offering,” HarfangLab, March 1, 2024, https://harfanglab.io/insidethelab/isoon-leak-analysis/.
147    DeSombre Bernsen, “Same Same, but Different.”
148    DOJ Office of Public Affairs, “Seven International Cyber Defendants, Including ‘Apt41’ Actors, Charged in Connection with Computer Intrusion Campaigns Against More Than 100 Victims Globally,” release [archives], US Department of Justice, September 16, 2020, https://www.justice.gov/archives/opa/pr/seven-international-cyber-defendants-including-apt41-actors-charged-connection-computer; Natto Team, “i-SOON: Kicking off the Year of the Dragon with Good Luck … or Not,” Natto Thoughts [Substack newsletter], February 28, 2024, https://nattothoughts.substack.com/p/i-soon-kicking-off-the-year-of-the
149    Elsa Kania, “AlphaGo and Beyond: The Chinese Military Looks to Future ‘Intelligentized’ Warfare,” Lawfare, June 5, 2017, https://www.lawfaremedia.org/article/alphago-and-beyond-chinese-military-looks-future-intelligentized-warfare.
150    Derek B. Johnson, “Chinese Hackers Turn to AI to Meddle in Elections, CyberScoop, April 5, 2024, https://cyberscoop.com/microsoft-ai-election-taiwan/.
151    Dakota Cary, “Academics, AI, and APTs. How Six Advanced Persistent Threat-Connected Chinese Universities are Advancing AI Research,” Center for Security and Emerging Technology, March 2021, https://cset.georgetown.edu/publication/academics-ai-and-apts/.
152    Dave Aitel et al., China’s Cyber Operations: The Rising Threat to American Security, Margin Research, August 20, 2022, https://margin.re/content/files/2024/02/China-s-Cyber-Operations-Full-Report-Updated.pdf.
153    Kelly Ng et al., “DeepSeek: The Chinese AI App that Has the World Talking,” BBC News, February 4, 2025, https://www.bbc.com/news/articles/c5yv5976z9po
154    Dakota Cary and Eugenio Benincasa, Capture the (Red) Flag: An Inside Look into China’s Hacking Contest EcosystemAtlantic Council, October 18, 2024, https://www.atlanticcouncil.org/in-depth-research-reports/report/capture-the-red-flag-an-inside-look-into-chinas-hacking-contest-ecosystem/
155    Remco Zwetsloot et al., “China is Fast Outpacing U.S. STEM PhD Growth,” Center for Security and Emerging Technology, August 2021, https://cset.georgetown.edu/publication/china-is-fast-outpacing-u-s-stem-phd-growth/; Brendan Oliss, Cole McFaul, and Jaret C. Riddick, “The Global Distribution of STEM Graduates: Which Countries Lead the Way?” Center for Security and Emerging Technology, November 27, 2023, https://cset.georgetown.edu/article/the-global-distribution-of-stem-graduates-which-countries-lead-the-way/; Melanie Hanson, “College Graduation Statistics,” Education Data Initiative, March 15, 2024 [update], https://educationdata.org/number-of-college-graduates
156    On background Interview, U.S. Government China Cyber Analyst, January 9, 2025. See also information on Real World CTF: Cary and Benincasa, Capture the (Red) Flag.
157    Background Interview, U.S. Government China Cyber Analyst, January 9, 2025. See also information on Real World CTF: Cary and Benincasa, Capture the (Red) Flag.
158    Cary and Benincasa, Capture the (Red) Flag.
159    Eugenio Benincasa, “From Vegas to Chengdu: Hacking Contests, Bug Bounties, and China’s Offensive Cyber Ecosystem,” ETH Zurich Center for security Studies, June 10, 2024, https://css.ethz.ch/en/center/CSS-news/2024/06/from-vegas-to-chengdu-hacking-contests-bug-bounties-and-chinas-offensive-cyber-ecosystem.htmlhttps://doi.org/10.3929/ethz-b-000675181.
160    Cary and Benincasa, Capture the (Red) Flag.
161    Wun Nan, “From Hackers to Entrepreneurs: The Sino-U.S. Cyberwar Veterans Going Straight,” South China Morning Post, August 21, 2013, https://www.scmp.com/news/china/article/1298200/hackers-entrepreneurs-sino-us-cyberwar-veterans-going-straight.
162    Scott J. Henderson, The Dark Visitor: Inside the World of Chinese Hackers, Lulu.com (2007),’ https://books.google.com/books?id=NYIiAQAAMAAJ
163    Adam Kozy, “Testimony before the U.S.-China Economic and Security Review Commission Hearing on ‘China’s Cyber Capabilities: Warfare, Espionage, and Implications for the United States,’” February 17, 2022, https://www.uscc.gov/sites/default/files/2022-02/Adam_Kozy_Testimony.pdf.
164    Ken Dunham and Jim Melnick, “‘Wicked Rose’ and the NCPH Hacking Group,” Krebs on Security, November 2012, https://krebsonsecurity.com/wp-content/uploads/2012/11/WickedRose_andNCPH.pdf.
165    Kozy interview, January 17, 2025.
166    Kozy interview, January 17, 2025.
167    Gene Lin, “Founder of China’s Largest ‘Ethical Hacking’ Community Arrested,” Hong Long Free Press, March 31, 2020, https://hongkongfp.com/2016/07/30/founder-chinas-largest-ethical-hacking-community-arrested/
168    Kozy interview, January 17, 2025.
169    Translation: “Notice on Regulating the Promotion of Cybersecurity Competitions,” Center for Security and Emerging Technology, May 13, 2021, https://cset.georgetown.edu/publication/notice-on-regulating-the-promotion-of-cybersecurity-competitions/; Cary and Benincasa, Capture the (Red) Flag.
170    Interview with Security Researcher Chi-en (Ashley) Shen, January 9, 2025. 
171    对漏洞治理体系革新发展的思考与建议, 哈尔滨工业大学 (张兆心, 孔珂) / 北京邮电大学 (刘欣然) [Thoughts and suggestions on the innovation and development of vulnerability management system, Harbin Institute of Technology (Zhang Zhaoxin, Kong Ke) / Beijing University of Posts and Telecommunications (Liu Xinran)], China Information Security Magazine, May 1, 2024. https://www.scribd.com/document/816402725/%E7%94%B5%E5%AD%90%E5%88%8A202405. Corroborated by Background Interview, China Area Specialist in the Vulnerability Research Space, January 16, 2025.
172    Cary and Benincasa, Capture the (Red) Flag.
173    Cary and Benincasa, Capture the (Red) Flag; corroborated by Interview with Security Researcher Chi-en (Ashley) Shen, January 9, 2025.
174    MOSEC 2023, accessed March 16, 2025, https://www.mosec.org/en/2023/
175    “China, Singapore, United States: Blacklisted by the US, Zero Day Distributor COSEINC Works on for China’s Pwnzen,” Intelligence Online, August 11, 2021,. https://www.intelligenceonline.com/surveillance–interception/2021/11/08/blacklisted-by-the-us-zero-day-distributor-coseinc-works-on-for-china-s-pwnzen,109703349-art.
176    David Sun, “Singapore Cyber-Security Firm Blacklisted by the U.S. Along with Those Linked to Pegasus Spyware,” The Straits Times, November 4, 2021, https://www.straitstimes.com/singapore/singapore-cyber-security-firm-blacklisted-by-the-us-along-with-those-linked-to-pegasu.
177    Patrick Gray and Adam Boileau, “Risky Business #310—Export Exploits? Wassenaar Says No,” Risky Business Podcast, February 14, 2014, https://risky.biz/RB310/.
178    Matthieu Faou, Thomas Dupuy, and Mathieu Tartare, “Exchange Servers under Siege from at least 10 APT Groups,” ESET Research, March 10, 2021, https://www.welivesecurity.com/2021/03/10/exchange-servers-under-siege-10-apt-groups/.
179    安洵信息-专业领先 信誉卓著. [Anxun Information – Professional leadership and outstanding reputation.], accessed March 16, 2025, https://web.archive.org/web/20240219105947/http:/www.i-soon.net/pc_partner.html.
180    我国国家情报监督体系构建研究.[Research on the construction of my country’s national intelligence supervision system.] (2025). 情报杂志 [Intelligence Magazine], 44(2), 38–43.
181    Schwarck, E. (2024, November 15). The Power Vertical: Centralization in the PRC’s State Security System. Retrieved March 16, 2025, from https://jamestown.org/program/the-power-vertical-centralization-in-the-prcs-state-security-system/. Note: Operational decentralization should not be conflated with lack of oversight. Vertical leadership of local MSS units, where personnel authority rests with the internal party organs of a higher level unit within the central Ministry of State Security, has been in place since 2016–2017.
182    On Background Interview, China Area Specialist in the Vulnerability Research Space, January 16, 2025.
183    Kozy, “Testimony before the U.S.-China Economic and Security Review Commission Hearing,” February 17, 2022; DOJ Office of Public Affairs“Seven International Cyber Defendants, Including ‘Apt41’ Actors, Charged.”
184    Kozy, “Testimony before the U.S.-China Economic and Security Review Commission Hearing,” February 17, 2022; DOJ Office of Public Affairs, “Seven International Cyber Defendants, Including “Apt41” Actors, Charged.”
185    Background Interview, China Area Specialist in the Vulnerability Research Space, January 16, 2025.
186    Dina Temple-Raston, “192. Return to the Leak that Unmasked China’s Hackers-for-Hire,” podcast transcript, Recorded Future News, December 17, 2024, https://pod.wave.co/podcast/click-here/192-return-to-the-leak-that-unmasked-chinas-hackers-for-hire-a648d800.
187    Dan McWhorter, “Mandiant Exposes APT1 – One of China’s Cyber Espionage Units – and Releases 3,000 Indicators,” Google Cloud Blog, February 19, 2013, https://cloud.google.com/blog/topics/threat-intelligence/mandiant-exposes-apt1-chinas-cyber-espionage-units.
188    Kozy, “Testimony before the U.S.-China Economic and Security Review Commission Hearing,” February 17, 2022.
189    “Treasury Sanctions Company Associated with Salt Typhoon and Hacker Associated with Treasury Compromise,” release, US Department of the Treasury, February 8, 2025, https://home.treasury.gov/news/press-releases/jy2792; DOJ Office of Public Affairs, “U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage,” release [archives], US Department of Justice, May 19, 2014, https://www.justice.gov/archives/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor
190    Background Interview, China Area Specialist in the Vulnerability Research Space, January 16, 2025.
191    Background Interview, China Area Specialist in the Vulnerability Research Space, January 16, 2025. 
192    Background Interview, China Area Specialist in the Vulnerability Research Space, January 16, 2025; corroborated by Kozy interview, January 17, 2025; corroborated by Interview with Mei Danowski, Natto Thoughts, January 8, 2025.
193    Kozy interview, January 17, 2025. 
194    Threat Hunter Team, “Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak,” Symantec and Carbon Black, May 6, 2019, https://www.security.com/threat-intelligence/buckeye-windows-zero-day-exploit.
195    Cary interview, January 8, 2025; corroborated by Background Interview, China Area Specialist in the Vulnerability Research Space, January 16, 2025; corroborated by Background Interview, USG China Analyst, January 22, 2025.
196    Patrick Howell O’Neill, “How China Turned a Prize-Winning iPhone Hack against the Uyghurs,” MIT Technology Review, May 6, 2021, https://www.technologyreview.com/2021/05/06/1024621/china-apple-spy-uyghur-hacker-tianfu/.
197    Cary interview, January 8, 2025; corroborated by Background Interview, China Area Specialist in the Vulnerability Research Space, January 16, 2025; corroborated by Background Interview, USG China Analyst, January 22, 2025.
198    Faou, Dupuy, and Tartare, “Exchange Servers under Siege.” 
199    Faou, Dupuy, and Tartare, “Exchange Servers under Siege.” 
200    Faou, Dupuy, and Tartare, “Exchange servers under Siege.”
201    Cary interview, January 8, 2025; corroborated by Background Interview, China Area Specialist in the Vulnerability Research Space, January 16, 2025; corroborated by Background Interview, USG China Analyst, January 22, 2025.
202    Cary interview, January 8, 2025; corroborated by Background Interview, China Area Specialist in the Vulnerability Research Space, January 16, 2025; corroborated by Background Interview, USG China Analyst, January 22, 2025.
203    On Background Interview, USG China Analyst, January 22, 2025.
204    Dakota Cary and Kristin Del Rosso, Sleight of Hand: How China Weaponizes Software VulnerabilitiesAtlantic Council, September 6, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/.
205    Karen Chiu, “Chinese Hackers Break into Chrome, Microsoft Edge and Safari in Competition,” South China Morning Post, November 19, 2019, https://www.scmp.com/abacus/tech/article/3038326/chinese-hackers-break-chrome-microsoft-edge-and-safari-competition.
206    Priscilla Moriuchi and Bill Ladd, “China’s Ministry of State Security Likely Influences National Network Vulnerability Publications, Recorded Future, November 16, 2017, https://www.recordedfuture.com/blog/chinese-mss-vulnerability-influence.
207    Howell O’Neill, “How China Turned a Prize-Winning iPhone Hack against the Uyghurs.”
208    DeSombre Bernsen, “Same Same, but Different.”  
209    Monsoor Iqbal, “TikTok Revenue and Usage Statistics (2025),” Business of Apps, February 25, 2025 [update], https://www.businessofapps.com/data/tik-tok-statistics/; “WeChat Users by Country 2025,” World Population Review, accessed May 14, 2025, https://worldpopulationreview.com/country-rankings/wechat-users-by-country; Emmanuel Oyedeji, “Huawei Overtakes Apple to Become the Leading smartphone Brand in China,” Techloy, January 23, 2025, https://www.techloy.com/huawei-overtakes-apple-to-become-the-leading-smartphone-brand-in-china/.  
210    Danowski interview, January 8, 2025.
211    Danowski interview, January 8, 2025.
212    Benincasa, “From Vegas to Chengdu.” 
213    Stewart Scott et al., Dragon Tails: Preserving International Cybersecurity ResearchAtlantic Council, September 14, 2022, https://www.atlanticcouncil.org/in-depth-research-reports/report/preserving-international-cybersecurity-research/.
214    Andy Greenberg, “How China Demands Tech Firms Reveal Hackable Flaws in Their Products,” Wired, September 6, 2023, https://www.wired.com/story/china-vulnerability-disclosure-law/.
215    “Vulnerability laws create ‘bug bounties with Chinese characteristics.’” (2024, January 10). Retrieved March 16, 2025, from https://therecord.media/china-vulnerability-disclosure-military-government-dakota-cary
216    Greenberg, “How China Demands Tech Firms Reveal Hackable Flaws.”
217    Scott et al., Dragon Tails.
218    “China Regulator Suspends Cyber Security Deal with Alibaba Cloud,” Reuters, December 22, 2021, https://www.reuters.com/world/china/china-regulator-suspends-cyber-security-deal-with-alibaba-cloud-2021-12-22/.
219    Scott et al., Dragon Tails
220    Benincasa, “From Vegas to Chengdu.”
221    Benincasa, “From Vegas to Chengdu.”
222    Benincasa, “From Vegas to Chengdu.”
223    Background Interview, China Area Specialist in the Vulnerability Research Space, January 16, 2025.
224    Martin Matishak (@martinmatishak), “Sutton: ‘ … While We Need Strong Defenses We Are Not Going to Deter the Adversary with Defenses Only, and That, If Confirmed, I Will Work to Strengthen Our Offensive Cyber Capabilities to Ensure the President Has the Options, He Needs to Respond to This Growing Threat,’” X, May 6, 2025, 10:20 a.m., https://x.com/martinmatishak/status/1919759233978945681.
225    AixCC AI Cyber Challenge,” accessed March 16, 2025, https://aicyberchallenge.com/.
226    Abhishek Arya et al., “OSS-Fuzz: Continuous Fuzzing for Open Source Software,” Google / OSS-Fuzz, 2025 (beginning with original post 2016), https://github.com/google/oss-fuzz.
227    “Security Research Legal Defense Fund,” accessed March 16, 2025, https://www.securityresearchlegaldefensefund.org/.
228    18 U.S.C. 1030(f); Justice Manual, “9-48.000—Computer Fraud and Abuse Act,” US Department of Justice, February 19, 2015, https://www.justice.gov/jm/jm-9-48000-computer-fraud.
229    “Counterintelligence,” Federal Bureau of Investigation, accessed March 16, 2025, https://www.fbi.gov/investigate/counterintelligence
230    “South Dakota High School Activities Ass’n—United States’ Motion To Intervene As Plaintiff-Intervenor,” US Department of Justice, Civil Rights Division, August 6, 2015, https://www.justice.gov/crt/south-dakota-high-school-activities-assn-united-states-motion-intervene-plaintiff-intervenor.
231    DOJ Office of Public Affairs, “Department of Justice Announces New Policy for Charging Cases under the Computer Fraud and Abuse Act,” release [archives], US Department of Justice, May 19, 2022, https://www.justice.gov/archives/opa/pr/department-justice-announces-new-policy-charging-cases-under-computer-fraud-and-abuse-act.
232    Also, the White House Office of Budget Management (OMB) is in charge of designating all IT-related government-wide acquisition contracts. See: Clinger Cohen Act of 1996 (40 U.S.C. 1401 et seq, 1996) in Department of Defense Chief Information Officer Desk Reference, Volume I Foundation Documents, August 2006, https://dodcio.defense.gov/portals/0/documents/ciodesrefvolone.pdf
233    Trump White House Archives, “Vulnerabilities Equities Policy and Process for the United States.”
234    Pete Hegseth, “Memorandum for Senior Pentagon Leadership, Commanders of Combatant Commands, Defense Agency, and DOD Field Activity Directors, Subject: Directing Modern Software Acquisition to Maximize Lethality, US Department of Defense,” March 6, 2025, https://media.defense.gov/2025/Mar/07/2003662943/-1/-1/1/DIRECTING-MODERN-SOFTWARE-ACQUISITION-TO-MAXIMIZE-LETHALITY.PDF.
235    Other Transaction Authority (OTA), Defense Acquisition Encyclopedia / AcqNotes, accessed April 7, 2025, https://acqnotes.com/acqnote/careerfields/other-transaction-authority-ota.
236    10 U.S.C. § 101(a)(13)(A) (2025): “[a ‘contingency operation’ is a military operation that] is designated by the Secretary of Defense as an operation in which members of the armed forces are or may become involved in military actions, operations, or hostilities against an enemy of the United States…” This term has been used to describe Operation Enduring Freedom and other Global War on Terror operations, as well as US operations with North Atlantic Treaty Organization (NATO) countries after Russia’s invasion of Ukraine (Operation Atlantic Resolve). 
237    48 CFR § 2.101 – Definitions (2025).
238    Alternatively, if the secretary of defense simply designates USCYBERCOM’s hunt forward and other offensive cyber operations against adversaries as non-kinetic “contingency operations,” the entire US government could take advantage of its Simplified Acquisitions Program to purchase bugs in the name of contingency operations and cyber defense. However, this would likely be seen as deeply escalatory.
239    Agustina Vergara Cid, “Trump’s Immigration ‘Gold card’ Could Be a Win for America—With These Changes, The Hill, March 7. 2025 https://thehill.com/opinion/immigration/5181185-trumps-immigration-gold-card-could-be-a-win-for-america-with-these-changes/.
240    “A10. Operation Paperclip: How German Scientists Were Brought to the US after World War II,” Worcester Institute for Senior Education, accessed May 14, 2025, https://assumptionwise.org/event-5375339
241    Dakota (@dakotaindc.bsky.social), “New MSS ecosystem numbers from those 324 companies,” Bluesky, March 18, 2025, 9:05 p.m., https://bsky.app/profile/dakotaindc.bsky.social/post/3lkoyj7hstk2i
242    Adam Segal, “China Has Raised the Cyber Stakes: The ‘Salt Typhoon’ Hack Revealed America’s Profound Vulnerability,” Foreign Affairs, January 21, 2025, https://www.foreignaffairs.com/united-states/china-has-raised-cyber-stakes.

The post Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace  appeared first on Atlantic Council.

]]>
The ‘ironclad’ US-South Korea alliance is outdated. A new age requires a ‘titanium’ alliance. https://www.atlanticcouncil.org/blogs/new-atlanticist/the-ironclad-us-south-korea-alliance-is-outdated-a-new-age-requires-a-titanium-alliance/ Tue, 24 Jun 2025 16:47:40 +0000 https://www.atlanticcouncil.org/?p=854284 Washington and Seoul must set a new foundation for the seventy-year-old alliance that reflects the current strategic environment.

The post The ‘ironclad’ US-South Korea alliance is outdated. A new age requires a ‘titanium’ alliance. appeared first on Atlantic Council.

]]>

Click on the banner above to explore the Tiger Project.

SEOUL—Even as Washington’s attention is fixed on the Middle East this week, Korea may soon rocket back to the top of the White House’s agenda. North Korean leader Kim Jong Un could, for example, respond to US President Donald Trump’s reported interest in reengaging him either by launching a public confrontation punctuated by a new weapons tests or by suddenly offering a summit. Another possibility is that North Korea escalates against South Korea simply because it senses an opportunity. Yet another is that a regional crisis triggered by China has ripple effects for deterrence and the US military presence on the Korean Peninsula. Regardless of the cause, Washington’s ability to achieve its goals in such situations will in large part be determined by the strength of its alliance with Seoul.

With South Korean President Lee Jae-myung just beginning his term, and with Trump having not yet laid out his second-term plans for Korea issues, the time is ripe for Washington to engage Seoul. The two countries’ goal should be to set a new foundation for the alliance, one that reflects the current strategic environment. The US-South Korea alliance is often spoken about as being “born in blood” when the United States intervened to help defend South Korea after North Korea attacked in 1950. With the seventy-fifth anniversary of the start of the war upon us, it is time to honor that legacy but move beyond it.

Lee and Trump will have to lead this effort, but new politicos and old hands alike will need to work together to help achieve real transformation in the alliance. Neither side should default to old formulas and platitudes. For years, Washington has referred to the venerable alliance as “ironclad” as a reassurance to Seoul. But just as ironclad warships look powerful but are out of date, the alliance and its description should be updated to meet the demands of the times. As one US defense official reportedly put it in late May, it is time to “modernize” the alliance and “calibrate” the US force posture on the peninsula. Perhaps “titanium” is a more appropriate description of what the alliance should become, and below is how this change should start.

Posture check

One foundational issue with the alliance must be addressed as soon as possible: US military posture in Korea, which includes its size, its composition, its missions, and the associated cost-sharing. In addition, it must also include how US posture affects the alliance’s approach toward China. Conventional wisdom from both political parties in Washington and in Seoul is that the Trump administration is looking at cutting the US troop presence in South Korea. Informed observers expect that, at minimum, the administration will ask for more cost-sharing for this presence, given Trump’s comments suggesting that he would negotiate with South Korea on “payment for the big time military protection we provide.” At the same time, South Koreans’ longstanding concerns about being either abandoned or entrapped during a US-China war are coming back to the forefront.

Through the Special Measures Agreement (SMA), South Korea does pay a sizable portion of the costs of stationing roughly 28,000 US military members in South Korea. According to US Forces Korea, Seoul contributes around 18 percent, across all US military expenditures in Korea, which in 2026 will add up to the impressive sum of about $1.2 billion. However, past statements from Trump criticizing this agreement and citing a $10 billion figure suggest that he will still deem this amount insufficient.

These numbers are not the whole story, however. Despite bristling by some South Koreans at past demands by Trump for Seoul to pay more, this amount does not come in the form of a direct transfer to the US Treasury as though this is “protection money” or these personnel are Hessian mercenaries for hire. Under the SMA, these funds are mostly spent on goods and services provided by South Korean individuals and companies to sustain the US force presence. In other words, while they benefit the alliance, they are largely domestic subsidies for South Korea’s economy.

Moreover, the real cost, value, and investment of the US defense commitment to South Korea is hardly captured by the roughly 28,000 uniformed military personnel of US Forces Korea. This number is largely designed to provide a framework and sustainment for a much larger presence in a wartime scenario rather than combat power in its own right. Combined with large bases, supporting infrastructure, and many supporting civilian officials and contractors, this relatively small number of military personnel is essentially the down payment for a much larger commitment of forces—including the US nuclear deterrent—that helps deter North Korea and that would ensure Pyongyang’s defeat in a war. US Forces Korea’s presence, including US and South Korean personnel intermixed in bilateral facilities, also serves a “tripwire” function to strengthen deterrence, because a large-scale attack by North Korea (or China) would end up engulfing US forces immediately, pulling the United States directly into the fight.

The SMA is a good deal for South Korea, and it still would be even at a much higher price. South Koreans may not want to pay more, but they could contribute much more to defraying the cost of the US military presence without it being a major economic burden given South Korea’s gross domestic product of over $1.7 trillion. The United States undoubtedly benefits strategically from maintaining deterrence against North Korea—thereby enabling regional stability, peace, and prosperity—but South Korea benefits even more from keeping this direct threat at bay.

Beyond ‘ironclad’

Stationing US forces and having major bases in South Korea provide the United States strategic benefits beyond helping to deter North Korean aggression. As General Xavier Brunson, the US Forces Korea commander, noted in May, stationing forces in South Korea helps overcome the “tyranny of distance” given the size of the Indo-Pacific and Korea’s key location in the region.

Relocating those US forces elsewhere would be expensive, and there are not great options in the region for where to send them. In South Korea, the US forces have excellent opportunities to train and directly contribute to the regional stability that is vital for US and South Korean prosperity. In particular, the facilities in South Korea are key logistics hubs for the broader US presence in the Indo-Pacific, and the prospect of such bases being used to support the defense of Taiwan could help deter Beijing from aggression—particularly given the bases’ proximity to China.

But this value can only be realized if there are mutual reassurances about how the alliance will function in the event of a US-China war. As I outlined in a memo published last year, the South Korean president should at least tacitly affirm that Seoul will adhere to the 1953 mutual defense treaty as a two-way treaty, not just a commitment by the United States to defend South Korea against North Korea. If, for example, the United States were to come to the defense of Taiwan and China responded with strikes against US bases, particularly on the US territory of Guam, then South Korea must recognize that the United States could not accept Seoul remaining neutral and US Forces Korea being mere ringside spectators.

Regardless of Lee’s desire to avoid antagonizing Chinese President Xi Jinping, it is hard to imagine the Trump administration accepting that Washington must be willing to risk a nuclear attack by North Korea to save Seoul while South Korean forces, along with US forces and bases stationed in South Korea, are to remain idle while Americans are dying from Chinese missile attacks. For years, Washington has been deferential to South Korean sensitivities on this issue, and on the issue of “strategic flexibility” for US forces in South Korea, even when dealing with ostensibly “hawkish” administrations in Seoul. Now, however, it makes little sense that this should or could continue—particularly with a new US administration so clearly prioritizing deterrence of China and so clearly tired of allies taking the US commitment to their defense for granted.

The Trump and Lee administrations will need to address contentious issues around South Korea’s financial, political, and military commitment to the alliance in a mutually equitable way, supported by a robust and modernized combined US-South Korea defense and military structure. If they can do this, then they can set the stage for a new, stronger, and mutually beneficial alliance that will be better able to keep the fragile regional peace threatened by both nuclear-armed North Korea and China.

However, if the coming months reveal deep rifts between Seoul and Washington on the US presence in South Korea, this may itself lead to a new crisis, as Pyongyang and Beijing could see an opportunity to fracture an alliance that they view as brittle. When put to the test, the US-South Korean alliance should move beyond its “ironclad” legacy and be ready to hold up with the strength of titanium.


Markus Garlauskas is the director of the Indo-Pacific Security Initiative at the Scowcroft Center for Strategy and Security, leading the Council’s Tiger Project on War and Deterrence in the Indo-Pacific. He is a former senior US government official with two decades of service as an intelligence officer and strategist, including as chief strategist for US Forces Korea. He posts as @Mister_G_2 on X.


The Tiger Project, an Atlantic Council effort, develops new insights and actionable recommendations for the United States, as well as its allies and partners, to deter and counter aggression in the Indo-Pacific. Explore our collection of work, including expert commentary, multimedia content, and in-depth analysis, on strategic defense and deterrence issues in the region.

The post The ‘ironclad’ US-South Korea alliance is outdated. A new age requires a ‘titanium’ alliance. appeared first on Atlantic Council.

]]>
Donovan and Nikoladze cited in Foreign Policy on the systems of sanction evasion between China and Iran https://www.atlanticcouncil.org/insight-impact/in-the-news/donovan-and-nikoladze-cited-in-foreign-policy-on-the-systems-of-sanction-evasion-between-china-and-iran/ Tue, 17 Jun 2025 15:08:36 +0000 https://www.atlanticcouncil.org/?p=855229 Read the full article here

The post Donovan and Nikoladze cited in Foreign Policy on the systems of sanction evasion between China and Iran appeared first on Atlantic Council.

]]>
Read the full article here

The post Donovan and Nikoladze cited in Foreign Policy on the systems of sanction evasion between China and Iran appeared first on Atlantic Council.

]]>
Ullman in the Hill on how the simultaneity of crises threaten US national security https://www.atlanticcouncil.org/insight-impact/in-the-news/ullman-in-the-hill-on-how-the-simultaneity-of-crises-threaten-us-national-security/ Mon, 16 Jun 2025 20:05:02 +0000 https://www.atlanticcouncil.org/?p=853713 On June 16, Atlantic Council Senior Advisor Harlan Ullman published an op-ed in the Hill warning of a potential “crisis point” for the US government if domestic immigration protests intensify while tensions escalate in the Middle East. He argues that convergence of crises at home and abroad could overwhelm policymakers and stain the US government’s […]

The post Ullman in the Hill on how the simultaneity of crises threaten US national security appeared first on Atlantic Council.

]]>

On June 16, Atlantic Council Senior Advisor Harlan Ullman published an op-ed in the Hill warning of a potential “crisis point” for the US government if domestic immigration protests intensify while tensions escalate in the Middle East. He argues that convergence of crises at home and abroad could overwhelm policymakers and stain the US government’s ability to respond effectively.

International Advisory Board member

Harlan Ullman

Senior Advisor

The post Ullman in the Hill on how the simultaneity of crises threaten US national security appeared first on Atlantic Council.

]]>
Kroenig quoted in the Wall Street Journal on Trump’s potential framing of Israel’s strikes on Iran https://www.atlanticcouncil.org/insight-impact/in-the-news/kroenig-quoted-in-the-wall-street-journal-on-trumps-potential-framing-of-israels-strikes-on-iran/ Sat, 14 Jun 2025 20:15:00 +0000 https://www.atlanticcouncil.org/?p=853917 On June 13, Matthew Kroenig, Atlantic Council vice president and Scowcroft Center senior director, was quoted in the Wall Street Journal on how President Trump may choose to present Israel’s strikes on Iranian military and nuclear installations, as well as its military leadership, in light of his “peacemaker” pledge.

The post Kroenig quoted in the Wall Street Journal on Trump’s potential framing of Israel’s strikes on Iran appeared first on Atlantic Council.

]]>

On June 13, Matthew Kroenig, Atlantic Council vice president and Scowcroft Center senior director, was quoted in the Wall Street Journal on how President Trump may choose to present Israel’s strikes on Iranian military and nuclear installations, as well as its military leadership, in light of his “peacemaker” pledge.

I think he can go to the traditional Reaganites and say, “Peace through strength, we’re not letting evil regimes build nuclear weapons”…But he can also go to the MAGA folks and say, “No Americans were killed, we didn’t do this, and allies are stepping up and taking care of security threats for us.”

Matthew Kroenig

The post Kroenig quoted in the Wall Street Journal on Trump’s potential framing of Israel’s strikes on Iran appeared first on Atlantic Council.

]]>
Zier in Military Times analyzes US military deployment at southern border https://www.atlanticcouncil.org/insight-impact/in-the-news/zier-in-military-times-analyzes-us-military-deployment-at-southern-border/ Fri, 13 Jun 2025 11:06:01 +0000 https://www.atlanticcouncil.org/?p=853256 On May 28, Caroline Zier, nonresident senior fellow in the GeoStrategy Initiative, was published in the Military Times examining the Trump administration’s policy of using miliary personnel at the US southern border. Zier argues that the military’s “unprecedented” role at the border diverts time and resources from national security operations that “only the military can perform” […]

The post Zier in Military Times analyzes US military deployment at southern border appeared first on Atlantic Council.

]]>

On May 28, Caroline Zier, nonresident senior fellow in the GeoStrategy Initiative, was published in the Military Times examining the Trump administration’s policy of using miliary personnel at the US southern border. Zier argues that the military’s “unprecedented” role at the border diverts time and resources from national security operations that “only the military can perform” like deterring China in the Indo-Pacific.

Previous administrations have […] supplemented Department of Homeland Security missions with [Department of Defense] support. But the US military’s role in border security has historically been extremely limited, for important reasons.

Caroline Zier

The post Zier in Military Times analyzes US military deployment at southern border appeared first on Atlantic Council.

]]>
Experts react: Israel just attacked Iran’s military and nuclear sites. What’s next? https://www.atlanticcouncil.org/blogs/new-atlanticist/experts-react-israel-just-attacked-irans-military-and-nuclear-sites-whats-next/ Fri, 13 Jun 2025 03:07:04 +0000 https://www.atlanticcouncil.org/?p=853458 Our experts shed light on Israel’s major attack against Iran targeting its nuclear facilities and its implications for the region.

The post Experts react: Israel just attacked Iran’s military and nuclear sites. What’s next? appeared first on Atlantic Council.

]]>
It’s just the beginning. Early on Friday morning in the Middle East, Israeli jets carried out dozens of strikes against nuclear and military sites in Iran. Israeli Prime Minister Benjamin Netanyahu called it “a targeted military operation to roll back the Iranian threat to Israel’s very survival,” adding that the operation would continue “for as many days at it takes to remove this threat.” Israel’s closest ally was quick to distance itself from the strike, with US Secretary of State Marco Rubio saying that the United States was “not involved.” As reports of the damage rolled in, the commander of Iran’s Islamic Revolutionary Guard Corps (IRGC), Hossein Salami, was listed among those killed in the strikes, according to Iranian state media

Israel’s operation came as US-Iranian negotiations on Iran’s advancing nuclear program seemed to have reached an impasse and just after the International Atomic Energy Agency (IAEA) concluded that Tehran was in breach of its nuclear nonproliferation obligations. So how might Iranian forces respond? What will this mean for Israel, Iran’s nuclear program, the US-Israel relationship, and a region already experiencing great upheaval? Below, Atlantic Council experts shed light on what happened and what to expect next.

Click to jump to an expert analysis:

Jonathan Panikoff: Four questions that could shape the Middle East’s future 

Daniel B. Shapiro: Iran has never looked weaker

Shalom Lipner: Iran will seek to exact a heavy toll on both Israel and the United States

Landon Derentz: Sometimes you keep oil prices low for a reason

Matt Kroenig: An inevitability that will quickly de-escalate

Richard LeBaron: The US is getting dragged into a war it doesn’t want

Diana Rayes: Civilians are likely to be hit hardest in a prolonged regional conflict

R. Clarke Cooper: Iran apparently was given two choices

Daniel E. Mouton: This move will likely exacerbate Israel-US tensions

Kirsten Fontenrose: Will Arab states help defend against Iranian retaliation, or look the other way?

Mark N. Katz: Russia is not coming to Iran’s rescue

Perrihan Al-Riffai: This conflict threatens an already fragile global economy

Ellen Wald: Oil prices spike despite minimal material risk 

Ahmed Fouad Alkhatib: How will strikes impact Israel’s war in Gaza? 

Ariel Ezrahi: Netanyahu lacks the trust of his people to carry out this war 

Nicholas Blanford: Hezbollah is likely to express restraint

Sarah Zaaimi: Jerusalem prepares for the long haul

Thomas Warrick: It’s not too soon to think about the postwar plan

Rachel Whitlark: Israel likely achieved its goal of setting back Iran’s nuclear program

Emily Milliken: Israel’s strike could unravel the US cease-fire with the Houthis

Joze Pelayo: Trump should work with Gulf countries on a diplomatic response

Yaseen Rashed: Israel is taking a major risk with its Begin Doctrine


Four questions that could shape the Middle East’s future

The questions after Israel’s sweeping strikes against Iran’s military and nuclear sites outnumber the answers. In particular, there are four key questions whose answers will help determine the trajectory of the Middle East and perhaps beyond—not only over the coming weeks, but potentially for the coming years:

1. What is the scale of Israeli military operations in Iran?

Israel’s focus now is on Iran’s nuclear facilities, as well as undermining Iran’s command and control and military leadership, with the goal of trying to mitigate the intensity of Israel’s response (which started last night with Tehran launching one hundred drones). The Israelis are going to continue strikes for at least the coming days. The expectation is that they will go after key Iranian nuclear infrastructure to delay Iran’s timeline to a nuclear bomb, even if Israel on its own cannot fully eliminate Iran’s pathway to one.  

But is the scale of the attacks to come so large and diverse that Israel’s end goal is not only crippling Iran’s nuclear program but fomenting regime change? The targets Israel chooses will help determine the answer to that question, but a warning is also warranted. For years, many in Israel have insisted that regime change in Iran would prompt a new and better day—that nothing could be worse than the current theocratic regime. Iran is indeed led by a terrible autocracy that has undermined the growth of the country and tremendously hurt its own people. But history tells us it can always be worse. What is likely to follow a theocratic Iranian government is not democracy but Islamic Revolutionary Guard Corps–istan. Such a government is likely, at least initially, to be much more hardline than the current one. In such a case, Israel might find itself in a perpetual, ongoing, and far more intense war that is no longer in the shadows, as it has been for years.

Continue reading here:

New Atlanticist

Jun 13, 2025

After Israel’s strikes on Iran, these four questions could determine the Middle East’s future

By Jonathan Panikoff

The trajectory of the Middle East could be determined by how just a few critical questions are answered the coming days and weeks.

Iran Israel

Jonathan Panikoff is the director of the Atlantic Council’s Scowcroft Middle East Security Initiative and a former deputy national intelligence officer for the Near East at the US National Intelligence Council.


Iran has never looked weaker

Israel’s stunning, multifaceted strike against Iranian nuclear, ballistic missile, and regime leadership targets has thrown much into chaos: Iran’s ability to project power, Trump’s nuclear diplomacy, and US-Israel regional coordination.

Israel’s strikes lay bare the depth of Iran’s miscalculation following Hamas’s October 7, 2023 attack against Israel. Tehran’s Lebanese proxy, Hezbollah, and its key regional ally, the Assad regime in Syria, lie in ruins. Iran’s own state-to-state attacks against Israel in April and October 2024 produced little damage, while Iran suffered significantly from Israel’s October response.

Now, with that taboo also in the dustbin of history, Israel demonstrated its full penetration of Iran, and ability to wreak havoc across the Iranian system. Iran has never looked weaker, and its ability to respond meaningfully will be tested.

But the story does not end here. Israel pledges additional attacks, but Iran will now be supremely motivated to sprint to a nuclear breakout at hardened, underground facilities. The United States will surely assist Israel with defense against any Iranian retaliation. But Trump’s dream of a diplomatic resolution that ends Iranian enrichment appears dead. More likely, the US president will be faced with a decision on whether to use the United States’ unique capabilities to destroy Tehran’s underground nuclear facilities and prevent an Iranian nuclear weapon. The decision will split his advisers and political base, amid accusations, and perhaps his own misgivings, that Netanyahu is attempting to drag him into war.

The repercussions on trust and coordination in the US-Israel relationship could be long lasting, with implications for future rounds of conflict with Iran, negotiations on the next US-Israel military assistance agreement, and the wind-down to the war in Gaza. An ‘America first’ president, and an ‘Israel first’ prime minister, who have each made fateful decisions with minimal consultation or taking each other’s interests into account, will coexist uneasily for as many more months and years as they both serve.

Daniel B. Shapiro is a distinguished fellow with the Atlantic Council’s Scowcroft Middle East Security Initiative. He served as US ambassador to Israel from 2011 to 2017, and most recently as deputy assistant secretary of defense for Middle East policy. He also previously served as the director of the Atlantic Council’s N7 Initiative.


Iran will seek to exact a heavy toll on both Israel and the United States

JERUSALEM—Years of speculation over the possibility of an Israeli strike against Iran’s nuclear facilities ended at approximately 3:30 a.m. (Israel time) on Friday when first reports of explosions in Tehran began to circulate.

The timing of the Israeli operation—which was authorized after Israel’s leadership concluded that the Islamic Republic was on the threshold of a dangerous breakthrough in its efforts to acquire a nuclear weapons capability—took advantage of a rapidly shrinking window for military action, before relevant Iranian infrastructure became too advanced or well-protected. Trump’s declaration on Thursday that “I don’t want to say [an attack] is imminent,” together with expectations that Israel would stand down until (at least) after this weekend’s planned US-Iran talks in Oman, narrowed the opportunity for any element of surprise.

Israel’s initial targets have covered a wide spectrum, including, reportedly, multiple nuclear and other installations, as well as senior IRGC commanders and nuclear scientists. Israel’s intent is not only to eliminate Iran’s nuclear program, but also to undermine its potential to inflict retaliatory harm on Israel and defend against subsequent waves of Israel’s offensive.

The degree of Israeli coordination with the Trump administration will be pivotal to how this crisis unfolds. Rubio’s cryptic statement that “Israel advised us that they believe this action was necessary for its self-defense” does not clarify the extent of US (dis)agreement with that determination, or exactly what prior warning Israel may have supplied to the White House. Notwithstanding, and despite Rubio’s clarification that “we are not involved in strikes against Iran,” Iranian threats to exact a heavy price from both Israel and the United States will thrust the latter into the eye of the storm. Forthcoming decisions by the White House on the contours of US engagement will have a direct impact on Israel’s ability to persist with this campaign.

Shalom Lipner is a nonresident senior fellow at the Atlantic Council’s Scowcroft Middle East Security Initiative who previously worked in foreign policy and public diplomacy during his time at the Prime Minister’s Office in Jerusalem, where he served in the administration of seven consecutive Israeli premiers.


Sometimes you keep oil prices low for a reason

The Israeli strike on Iran’s nuclear infrastructure may be reverberating across global energy markets, but the tremors are far more restrained than the stakes might have suggested. Brent crude rose more than 10 percent, yet the per-barrel price remains below eighty dollars, well short of crisis levels. The moment underscores how strategic foresight in energy policy can shape the contours of geopolitical risk in the world’s most volatile corridors.

While headlines are focused on missiles and centrifuges, a quieter story lies in the market conditions that made such a strike politically viable. Israel’s actions benefited from the political leeway made possible by Trump’s efforts to “bring down the cost of oil.” It’s not to say the strike wouldn’t have happened otherwise, but—as shown during Trump’s first term—when energy markets can shield consumers from the worst effects of a supply disruption, policymakers have far greater latitude to escalate.

In 2018, Trump’s decision to withdraw from the Iran nuclear deal and impose “maximum pressure” was rooted in a belief that oil markets could absorb the shock. Internal White House analysis forecasted only modest price increases, with US production gains and global spare capacity acting as a buffer. Crucially, while the Strait of Hormuz has long symbolized energy risk, it was—and remains—unlikely to be closed. Iran needs the revenue. This gave the Trump administration confidence to confront Iran without fear of major energy disruption.

Israel’s strike today reinforces that view, operating in an energy environment shaped by the same strategic logic. Oil doesn’t need to stay cheap forever—just long enough to change the geopolitical equation. Trump’s push to keep prices low may have done more than remake global energy flows—it may have helped lay the groundwork for a decisive blow to Iran’s nuclear ambitions. 

Landon Derentz is senior director and Morningstar Chair for Global Energy Security at the Atlantic Council’s Global Energy Center. He previously served as director for energy at the White House National Security Council and director for Middle Eastern and African affairs at the US Department of Energy.


An inevitability that will quickly de-escalate

As I wrote more than a decade ago, this was inevitable.  

There were only three possible outcomes in the decades-long battle over Tehran’s nuclear aspirations: allow Iran to go nuclear, negotiate a permanent deal, or military action. A nuclear-armed Iran is unacceptable. A permanent deal is highly unlikely—as former US President Barack Obama’s 2015 nuclear deal proved. So, military action is the only viable option left.  

There are three key facilities for Iran’s nuclear opponents to destroy: Isfahan, Natanz, and Fordow. A US strike would have been more effective as it could have meaningfully degraded all of Iran’s key nuclear facilities, while Israel can destroy the above-ground facilities. The underground facilities are difficult, but don’t count Israel out. No one would have predicted it could take out Hezbollah with walkie talkies last year. Did Israel conduct commando raids or other creative attacks on the underground facilities? If so, this will meaningfully set back Iran’s nuclear program.  

As for the question of likely retaliation—Iran has few good options. Its Hamas and Hezbollah proxies are degraded, and Israel’s Iron Dome can demonstrably defend against missile and drone attacks. Iran is also afraid of a wider war, though those fears are misguided. This will de-escalate quickly, like Trump’s strike on Qassem Soleimani during his first term. The key questions are: What will happen in the coming weeks and months? Does Iran rebuild? Does Israel mow the grass? Or does Iran decide that it is not worth it to spend decades, and billions of dollars, and only have a pile of rubble to show for it? 

Matthew Kroenig is vice president and senior director of the Atlantic Council’s Scowcroft Center for Strategy and Security and the Council’s director of studies. 


The US is getting dragged into a war it doesn’t want

Israel’s attack on Iranian nuclear and military facilities was in direct defiance of Trump’s call for caution and negotiation. The United States has been seeking a negotiated solution—one that was not supported by Netanyahu’s government.  

The question now is not whether, but how, the United States will be dragged into a war it doesn’t want, and that Gulf states fear. Iranian retaliation directly against Israel will not translate into non-involvement from Washington, as Israel will then be drawn into a spiral of retaliation and counter-retaliation—requiring US military supplies, intelligence support, and diplomatic cover.  

So far, there is no evidence that Gulf states looked the other way as Israel used their airspace for the attacks, and this won’t be very difficult to confirm or deny.  

Then the question becomes how to protect US troops in the region and how to come to the aid of Guif friends. Given the Trump administration’s close ties to the Gulf, as well as Trump’s personal admiration for certain Gulf leaders, the region will expect the US administration to provide any help they request.  

Richard LeBaron is a nonresident senior fellow with the Atlantic Council’s Middle East Programs. He is a former US ambassador to Kuwait and a former deputy chief of mission at the US embassy in Israel. 


Civilians are likely to be hit hardest in a prolonged regional conflict

Just as corners of the Middle East were experiencing some semblance of stability, such as in parts of Syria and Lebanon, this latest escalation has the potential to reverse the region’s recent fragile gains. Beyond the immediate political and military consequences, the most profound impacts will be felt by civilians, particularly those already in humanitarian crises. 

A prolonged disruption in regional commerce and air travel, alongside rising fuel and food prices, will hit displaced populations, host communities, and those living under the poverty line the hardest. In Syria, where around 90 percent of the population lives in poverty, any shock to commodity prices or aid delivery will be devastating. In Lebanon and Jordan, already overstretched in hosting among the world’s highest refugee populations, the economic fallout may further strain public services and deepen social tensions. 

Meanwhile, the risk of environmental damage or public health crises from military action, including oil spills, water contamination, or infrastructure damage, could pose grave risks to civilians in both the Gulf and Iran. These are not theoretical concerns—they are real threats to food security, access to care, and basic human dignity for millions. 

The United States has a responsibility to act in ways that reduce harm, avoid a full-scale regional war, and protect civilian lives. That means using its leverage not to escalate but to contain the conflict, pressing all parties, including allies, to prioritize diplomacy over devastation. Failure to do so will not only ignite another war in the region, but it will also exacerbate existing circumstances for fragile communities across the region. 

Diana Rayes is a nonresident fellow for the Syria Project in the Atlantic Council’s Middle East Programs.


Iran apparently was given two choices

The Israeli preemptive strike is likely to disrupt Iran’s immediate capacity to develop a nuclear weapons program. However, it remains uncertain whether such an action will effectively deter the Iranian regime’s nuclear ambitions. 

The Iranian regime appears to have been given two choices: abandon its nuclear aspirations or face a lack of intervention from the Trump administration if Israel decided to strike Iranian nuclear facilities. 

Israel may have advocated for an earlier attack window, while the United States likely attempted to apply diplomatic measures. When diplomacy failed, the United States understandably announced an ordered departure for US embassy staff in Baghdad, while other US diplomatic posts in the region were placed on stand-by for ordered departure. 

Regardless of when the Trump administration became aware that the Israeli strike was imminent, questions remain: Will this unilateral action by Israel sufficiently deter Iran’s nuclear ambitions? How might the regime in Tehran respond? And how will the United States and the Gulf states seek to contain further conflict in the region? 

What is immediately clear is that economic and security conditions in the Middle East have become more volatile.  

R. Clarke Cooper is a distinguished fellow with the Atlantic Council’s Scowcroft Middle East Security Initiative and is the founder and president of Guard Hill House, LLC. He previously served as assistant secretary for political-military affairs at the US Department of State. 


This move will likely exacerbate Israel-US tensions

The start of what is likely to be a multi-day series of Israeli strikes across Iran is an unprecedented exchange in a long history of attacks between the regional rivals. Most importantly, Israel is going alone against Iran. In previous instances, the United States and Israel maintained regular communication and a coordinated defense posture. This coordination was spectacularly successful in the defense of Israel—including in both April and October 2024, which saw unbelievably low casualties and damage in light of the hundreds of missiles and unmanned aerial vehicles fired against Israel.  

This time is different. Trump’s pursuit of Iran nuclear negotiations has created skepticism in Israel. The unilateral nature of US negotiations and the removal of the Trump administration’s pro-Israel proponents, such as former National Security Advisor Mike Waltz and former Deputy Special Presidential Envoy Morgan Ortagus, could have only escalated this tension with Israel. These moves came alongside Trump’s avoidance of an Israel stop during his recent visit to the Middle East, as well as Netanyahu’s Oval Office visit in April, where he left empty handed on both tariff relief and Iran. 

The beginning of unilateral Israeli strikes is a sign that the country feels that it must take action to ensure its own security. Regardless of what led Israel to take this step, it is likely to further exacerbate any preexisting tensions between Israel and the United States.

Finally, Iran will now feel obligated to respond. Depending on the degree of damage that Israel has inflicted, Iran may respond in a way that broadens the conflict and creates collateral damage elsewhere in the region. How this will end is an unknown, but as has been the case in the past, a speedier ending is likely to depend on the United States.

Daniel E. Mouton is a nonresident senior fellow at the Scowcroft Middle East Security Initiative of the Atlantic Council’s Middle East Programs. He served on the National Security Council from 2021 to 2023 as the director for defense and political-military policy for the Middle East and North Africa for Coordinator Brett McGurk.


Will Arab states help defend against Iranian retaliation, or look the other way?

Among the many lessons to be drawn from this operation is one about the importance of speaking truth to power. The IRGC makes a practice of minimizing its vulnerabilities in reports to senior leadership. Leaked IRGC documents from the past several years revealed overstatements of capability and omissions of setbacks, perhaps intended to deflect questions about the bang for the buck in their budget. Recently the IRGC was reassuring political leadership that its air defenses could withstand an Israeli strike. This may have contributed to Tehran’s decision to refrain from making a deal with the United States before Trump’s two-month timeline elapsed. This resulted in Israel’s assessment that diplomacy has failed and strikes were necessary. The generals behind those white lies were the first targets.

But now comes the expected retaliation. And the big question is: Will the states in the Middle East participate in Israel’s defense as before? As nuclear talks went nowhere, both Iran and the United States wanted to know, leading to tug-of-war diplomacy in the Arab world.

The United States wants Arab states to turn on missile and drone detection and mitigation systems and look out for munitions launched from Iran toward Israel, while Iran wants Arab states to consider looking the other way if it stages retaliatory strikes that cross Arab airspace. Arab states have a logical reason to rebuff Iran’s request. Munitions flown into a country’s airspace without coordination with its capital are violations of sovereignty and a threat to its people and infrastructure. Taking them down is such a no-brainer that the United States would likely conclude that any munitions not reported or mitigated by Arab states were intentionally ignored. Neither the United States nor its Arab partners want that kind of tension to arise.

Kirsten Fontenrose is a nonresident senior fellow at the Scowcroft Middle East Security Initiative in the Atlantic Council’s Middle East Programs. She was previously the senior director for the Gulf at the National Security Council.


Russia is not coming to Iran’s rescue 

Just as on previous occasions when Israeli forces attacked Hamas, Hezbollah, and Iran itself, Moscow does not seem willing to defend its ally in Tehran. The Russian statement issued Friday was critical of Israel but gave no indication that Russia will take concrete actions against it or in support of Iran. Instead, the Russian Ministry of Foreign Affairs called for all parties to exercise restraint and prevent further escalation. Most remarkably, the last sentence of the statement noted that “we would like to remind you of the US’s readiness to hold another round of negotiations with Iran on the Iranian nuclear program in Oman.” In other words, Moscow itself seems to be calling on the Trump administration to resolve the situation instead of promoting Russia for the lead role in this. 

Moscow’s less than fulsome support (so far) for Iran must be causing renewed doubts in Tehran about what Iran is getting from Moscow in return for Iranian support to its war against Ukraine. On the other hand, there is nobody else Iran can turn to who would give it greater support in responding to Israel. Despite Iran’s threats about targeting American forces in the Gulf region, working with the Trump administration may be Iran’s best hope for restraining Israel. The Russian Foreign Ministry itself seems to be suggesting this. 

Mark N. Katz is a nonresident senior fellow with the Atlantic Council’s Middle East Programs and professor emeritus of government and politics at the George Mason University Schar School of Policy and Government. 


This conflict threatens an already fragile global economy 

Israel’s attack on Iran’s nuclear and military sites—resulting in the death of senior IRGC commanders—sparked immediate volatility in global energy markets. Brent crude jumped up as much as 14 percent intraday, briefly peaking at $78.50 before settling around $75, marking the sharpest spike since early 2022. While previous shocks during the Israel-Gaza war faded due to resilient oil infrastructure and global oversupply, this escalation is different: an oil exporter is now under direct attack. 

Markets are pricing in a heightened geopolitical risk premium, especially amid Iran’s threat to disrupt oil flows through the Strait of Hormuz, which carries nearly 20 percent of global crude. If Iran’s oil infrastructure is damaged or tanker routes are disrupted, Brent could surge to $120–$130 per barrel. Though OPEC+ could ease some pressure, market uncertainty remains high. 

At the same time, US tariff policies are weighing on global demand. The International Monetary Fund forecasts a 0.5 percent drop in global growth in 2025 due to ongoing trade tensions. This could counteract some of the supply-driven price spikes. However, if the United States joins the conflict—especially if nuclear talks collapse—the risk of sustained stagflation rises, threatening an already fragile global economy. 

Perrihan Al-Riffai is a nonresident senior fellow with the empowerME Initiative at the Atlantic Council’s Rafik Hariri Center for the Middle East. 


Oil prices spike despite minimal material risk

As Israeli jets attacked targets across Iran early Friday morning in the Middle East, oil futures started rising. Oil benchmarks initially rose 6 percent, then 9 percent and up to 11 percent as the scope of the attacks widened. Oil prices generally spike in response to any conflict in the Middle East, even when neither of the parties involved are major oil suppliers. In this case, Iran is a significant oil supplier, Israel is not.  
 
The reality is that the supply of oil from the Persian Gulf (about 20 percent of global seaborne oil shipments) is not materially at risk after Israel’s strikes, and it is unlikely to come under threat from Iran. That’s because of a few reasons: One, Israel isn’t targeting Iran’s oil production and export sites, so Iran derives no net benefit if it prevents Saudi, Emirati, Kuwaiti, Iraqi, Qatari or Bahraini oil from leaving the Persian Gulf. Two, should Tehran attempt to block Arab oil exports, its own oil exports would, in turn, be blocked. Iran can only benefit from stopping others from exporting if Tehran has no capacity to export oil itself. And three, Iran can’t stop traffic through the Strait of Hormuz for any significant amount of time because sea traffic can be rerouted around Iranian waters if necessary. 
 
China, which purchases most of Iran’s crude oil, does not want to see the flow of oil out of the Persian Gulf impeded. While China doesn’t have the naval capacity in the Persian Gulf to ensure this, it has become such a significant trading partner of Iran’s, that Iran cannot afford to see its trade with China disrupted. China is Iran’s largest customer and a significant customer of oil from Saudi Arabia and other Middle Eastern countries. China will use the full weight of its economic power to ensure that oil from all Persian Gulf exporters to Asia is not disrupted. 
  
Due to the severity of this attack, and the paradigm shift in diplomatic and nuclear relations that will result, oil prices may not retreat as quickly as they have after previous attacks. Much depends on when, how and against whom Iran retaliates. Regardless, it is important to remember that this is not the oil market of the 1990s and early 2000s. The market is well supplied from a variety of producers, with plenty of spare capacity should the Organization of the Petroleum Exporting Countries (OPEC) choose to employ it. The United States is not beholden to foreign oil producers and its foreign policy should reflect that. 
 
Ellen Wald, PhD, is a nonresident senior fellow with the Atlantic Council Global Energy Center and the president of Transversal Consulting. She is the author of “Saudi, Inc.: The Arabian Kingdom’s Pursuit of Profit and Power,” a book on the history and strategy of Aramco and Saudi Arabia. 


How will strikes impact Israel’s war in Gaza? 

The large-scale and devastating Israeli strikes against the Islamic Republic of Iran have opened a new chapter in the post-October 7 Middle East world. In addition to the kinetic damage that they have caused, the strikes are a clear indication that Tehran was proceeding with acquiring enough technology and materials to procure a nuclear weapon, which would have changed the entirety of the Middle East’s security and geopolitical architecture.  

Critically, there is the question of how these strikes impact Israel’s war in Gaza against Hamas and factions that are supported by the IRGC. Will Israel assassinate the Palestinian Islamic Jihad (PIJ) leadership in Tehran, along with other terror operatives? Will the attacks distract from Gaza, or provide the Israeli military with an opportunity to expand its assault on the Strip without international scrutiny? 

Another dimension of the Iranian ladder of escalation is what happens in the West Bank, which is under the fragile control of the Palestinian Authority (PA) and the Israeli military occupation. Does the IRGC have assets in the West Bank that it can activate to sow some chaos against the PA, in hopes of starting skirmishes with the Israel Defense Forces? Are there assets inside Israel who could engage in a targeted terror attack? 

Regardless of the rhetoric, and while this is a serious escalation, it is unlikely, at least for now, that the wave of Israeli airstrikes will result in a massive, global, or even regional war like many have been warning for years. This is due to the fact that Arab countries, the United States, and even Israel want to be measured and deploy strategies to avoid a regional conflagration that leads to massive death and destruction.

Ahmed Fouad Alkhatib leads Realign For Palestine, an Atlantic Council project that challenges entrenched narratives in the Israel and Palestine discourse. 


Netanyahu lacks the trust of his people to carry out this war

The Iranian regime is a group of dead men walking. Iran’s reign of terror both internally and externally has been a destructive and destabilizing force since the Islamic Revolution, supporting terrorist groups such as Hamas, Hezbollah, and the Houthis. Diplomatic efforts over the years to stall Iran’s race to obtain nuclear weapons have not been a resounding success so far. Hence the recent Israeli attack does not come as a surprise.  

That said, millions of Israelis distrust Netanyahu’s motivations and actions, whether as a peacetime or especially as a wartime prime minister. The Gaza war is a case in point. He appears to be prime minister bent on saving his own skin, aka saving his extreme right coalition to avoid facing trial for corruption and being held accountable for his government’s failure in connection with the October 7 attacks. He has done so at the clear expense of his country’s national security and democracy, as there is consensus among Israel’s security top brass and indeed the country that as prime minister Netanyahu needs to take responsibility. Netanyahu’s relations with Trump, the European Union, and most of the Middle East are at an all-time low, and there is unprecedented polarization within Israel stemming from Netanyahu’s divisive and inciting policies. This is not encouraging, to say the least, in this situation. 

One only hopes that the United States, working with its sensible Middle Eastern allies such as the United Arab Emirates, will help to bring a sensible outcome to this explosive time. 

Ariel Ezrahi is a senior nonresident fellow at the Middle East Programs, the architect of the Gas for Gaza project, and the head of the Energy Transition Sub-Committee for MENA2050. He also works in the climate finance space.


Hezbollah is likely to express restraint

With Israel launching an unprecedented wave of attacks against Iran’s nuclear facilities and related assets, many eyes are turning toward Lebanon to see if Hezbollah will respond on behalf of its patron. For now, however, Hezbollah is likely to adopt a policy of restraint, and the Iranians may not call upon its proxy to strike back. 

Until the recent fourteen-month war between Hezbollah and Israel, the Lebanese group was seen as a vital component of Iran’s deterrence architecture against the possibility of an attack on Iran’s nuclear program and on the regime itself. However, even before the latest war between Hezbollah and Israel, there were no guarantees that if Iran was struck by Israel, the United States, or a combination of the two that Tehran would call upon Hezbollah to respond with a punishing barrage of precision-guided missiles against targets across Israel.

That decision—whether or not to trigger a Hezbollah response—would have likely been based on the scale of the damage in Iran, and whether it posed an existential threat to the regime. If the Iranians calculated that the attack was survivable, then a Hezbollah response would be unnecessary and potentially counterproductive. Instead, Hezbollah would be held in reserve for the day the Iranians really needed it. That same calculus applies now, but with the added factor that Hezbollah’s military capabilities have been so degraded by the recent war that it no longer poses the same level of threat toward Israel. In addition, there is a strong sentiment of anger and frustration within the rank and file against Iran for, as they perceive it, letting Hezbollah down during the recent war by refusing to allow it to employ the full gamut of its military might to inflict real pain on the Israeli home front. 

That mood of resentment may have been on subtle display during the recent visit to Beirut by Iranian Foreign Minister Abbas Araghchi, who reportedly held a frosty meeting with Hezbollah leader Sheikh Naim Qassem, and was accompanied by two relatively junior party lawmakers while paying his respects to the tomb of late Hezbollah leader Sheikh Hassan Nasrallah.

For now, domestic calculations will likely help stay Hezbollah’s hand. However, that restraint could falter if the Israeli strikes against Iran continue and pose a direct threat to the regime. 

Nicholas Blanford is a nonresident senior fellow with the Atlantic Council’s Middle East Programs, covering the politics and security affairs of Lebanon and Syria.


Jerusalem prepares for the long haul

JERUSALEM—Despite the early signs of an imminent strike, with US regional embassies and military facilities evacuating a number of their staff, our plane landed in busy and bustling Ben Gurion airport undeterred by the news of a potential pre-emptive attack on Iranian nuclear facilities and leadership.

Just hours ago, senior experts and a US official at a Jerusalem dinner seemed optimistic that nothing out of the ordinary would occur and that the week’s developments represented a mere tactical escalation amid important nuclear talks. Analysts familiar with Israeli politics jokingly noted that if anything serious were to happen between Iran and Israel, it would need to be after next week due to Netanyahu’s son’s upcoming wedding. We later came to understand that the United States might have overestimated its capacity to deter their Israeli counterparts.

At 3:00 a.m. the peaceful Jerusalem ancient city walls were suddenly disturbed by piercing alarms calling everyone to take shelter in the nearest safe space. Our security team informed us that Israel had initiated a unilateral strike on Iran and that the United States was given a heads up about the events of the night. Sources reported that the Israeli war cabinet was gathering to discuss a Gaza cease-fire and hostage deal, and were surprised to discover that it was a briefing on the attacks. Some of them were sworn in writing to secrecy.

As we stand now, the mood in Israel is dug in for a long-haul operation to disable the capabilities of what they call the “head of the octopus,” after cutting many of its tentacles in Gaza, Beirut, and Damascus last year. Israel called thousands of its reservists back to duty, and Jerusalem is preparing for a potentially consequential retaliation from Tehran, as initial reports reveal substantial losses among the Iranian military leadership and nuclear scientists.

The Mullah regime’s response might not come immediately, as we witnessed with the 2024 events. Tehran will have to rally its defense systems after being drastically diminished, and now also face a crisis of leadership amid tonight’s high-level targets.

The United States, however, clearly tried to distance itself from the attacks and focused on prioritizing the safety and security of US facilities and personnel in the Middle East, although signaling a deadlock in US-Iranian nuclear talks. President Donald Trump is faced today with a crucial dilemma of either further decoupling from Israel and confirming US isolationism, or seizing a moment of weakness among Iran and its proxies by supporting Israeli ambitions to annihilate an enemy at the source.

Sarah Zaaimi is a resident senior fellow for North Africa at the Atlantic Council’s Rafik Hariri Center and Middle East programs. She is also the center’s deputy director for communications, overseeing strategic communications, editorial agenda, media relations, and social and digital marketing efforts.


It’s not too soon to think about the postwar plan

Israel’s strikes against Iranian command, nuclear, and military sites were not a warning shot. They were intended to start a change as decisive against the Iranian regime as Israel’s 2024 campaign against Hezbollah in Lebanon.

Importantly, Israel has no postwar plan for Iran beyond ending an existential nuclear threat. Israel should have thought this through months ago, but it really needs to think now about its post-war strategy. Regime change will not happen after an aerial campaign, no matter how effective. However much the IRGC was weakened by Israel’s strikes, including the reported death of senior IRGC military leaders, Tehran is still strong and coherent enough to prevent a popular “color” revolution. Regime change efforts from the United States and others elsewhere in the world should be a cautionary example of how hard this would be.

Israel is going to have to sustain a homeland defense strategy and keep striking nuclear, missile, and drone facilities in Iran. It also needs to develop, or work with the United States to develop, a workable strategy that gets Iran to end its nuclear threat to Israel. This will not be easy, and it will involve serious tradeoffs by Israel’s leaders, including how to end the war in Gaza on terms that will keep Hamas from coming back into power while giving the Palestinians a path toward reconstruction, dignity, and peace.

The best thing the United States can do now is to redouble its efforts to get a durable peace between Israel and the Palestinians in Gaza. Such a peace will require greater contributions by the United States, Arab allies, and Israel than anyone has been willing to make until now.

Thomas S. Warrick is a nonresident senior fellow in the Scowcroft Middle East Security Initiative and a former deputy assistant secretary for counterterrorism policy in the US Department of Homeland Security.


Israel likely achieved its goal of setting back Iran’s nuclear program

Early reporting suggests that the ongoing Israeli attack against Iran, Operation Rising Lion, has multiple, complementary goals. Israel appears to be aiming to cripple Iranian nuclear capacity and degrade Iranian retaliatory capabilities. To achieve these ends, Israel is conducting a combined air and intelligence operation to target nuclear installations, ballistic missile and air-defense sites, and key personnel in both the nuclear and military command structures.

We can understand this multipronged effort as targeting multiple threats to Israel’s security. First, successive Israeli prime ministers have described an Iranian adversary armed with nuclear weapons as an existential threat to Israel. As Netanyahu described in a video statement as the attacks were underway, the operation targeted both the Natanz enrichment facility (among others) and leading Iranian nuclear scientists. Targeting both the facilities and the key scientists should degrade and delay Iran’s ability to develop nuclear weapons. Second, Israel also sought to limit Iranian retaliatory capabilities by attacking ballistic missile and drone installations, as well as key individuals in the military command structure, including General Hossein Salami, the chief of the IRGC, and Gholam Ali Rashid, the deputy commander of the Iranian armed forces. There may be a third, larger goal beyond degrading Iran’s nuclear and retaliatory capacity: regime decapitation. Indeed, beyond targeting the nuclear infrastructure, the expansive attacks against the military forces and the IRGC could be suggestive of a larger regime-level goal.

Especially as events continue to unfold, it is difficult to determine operational success. Nevertheless, we can expect Israeli leaders to define success as delaying Iran’s ability to produce weapons-grade uranium or advance to nuclear weapons, which Israel is likely to have achieved through damaging and destroying critical nuclear infrastructure and killing senior scientists. Further, to the extent that an eventual Iranian retaliation is limited because of Israel’s attack on key military sites and personnel or blunted by Israel’s own defenses, such developments may signify another layer of success. Of course, it is difficult to know exactly what an Iranian attack might have looked like had Israel not targeted key military facilities during this strike and earlier attacks on Iranian air defenses in 2024.

Rachel Whitlark is a nonresident senior fellow in the Forward Defense program in the Scowcroft Center for Strategy and Security.


Israel’s strike could unravel the US cease-fire with the Houthis

Israeli strikes on Iran risk provoking a response from Yemen’s Houthi rebels and potentially upending last month’s bilateral cease-fire agreement between the United States and the Houthis. While the Trump administration made it clear that the strike was a unilateral action by Israel, the Houthis could perceive the United States as complicit, as the rebels often conflate Israeli and US actions in their public messaging. Adding to those concerns, earlier this week a Houthi source threatened to retaliate if the United States or Israel struck Iran, following reports that American nonessential personnel and family members were being evacuated throughout the Middle East. 

Moreover, the Houthis have been playing a more prominent role in Iran’s “Axis of Resistance” since the October 7 attacks, particularly as other proxies such as Hamas and Hezbollah faced leadership losses and setbacks. For the group, renewed confrontation could be an opportunity to reinforce its position within Iran’s network of allies and proxies and claim a major propaganda win—even if it means the end of the cease-fire with the United States. 

While the Trump administration’s “Operation Rough Rider” imposed meaningful damage on the group, the Houthis have proven their resilience and ability to adapt in the face of continued strikes. They may also calculate that the Trump administration’s decision to pursue a cease-fire is a sign of limited appetite to re-engage in Yemen, especially given that “Operation Rough Rider” cost more than one billion dollars in a month and failed to degrade the Houthis, who have continued strikes on Israeli territory. 

Emily Milliken is the associate director of media and communications for the N7 Initiative at the Atlantic Council’s Middle East Programs. 


Trump should work with Gulf countries on a diplomatic response 

Gulf States—mainly Saudi Arabia, the United Arab Emirates, and Qatar—have no appetite for a regional war that involves Iran and would rather not be put in a place to choose between Israel and Iran. Their economic visions hinge on regional stability and on striking a balance to protect their interests, both economic and political. While their emerging role as mediators has enhanced their geopolitical role and diplomatic leverage, that role—now at risk—depends on stability for trust-building purposes when dealing with an actor like Iran.  

Under the Trump administration, Gulf states have taken the front seat in driving the new regional order. However, Israel’s strikes, following the IAEA’s strongest rebuke in twenty years and Iran’s announcement of a third uranium site, seem to have temporarily disrupted the Gulf capitals’ preferred approach for diplomacy and placed them now in the crossfire for retaliation.  

The Trump administration must rally its Gulf allies for an emergency meeting to coordinate a response aimed at preserving any diplomatic gains made so far. Oman, as a trusted intermediary, could be in a good place to lower the temperature and lobby Tehran against attacking Gulf capitals and US assets in the region—especially since Washington had no role in the attack. While this escalation carries serious risks, Israel’s attacks seem to have focused on the IRGC, which is responsible for continuously pursuing a destabilizing influence across the Levant and the Gulf and targeting US service members—making the IRGC a legitimate target. However, failure to deescalate would risk a broader regional conflict, the collapse of the Gulf-led peace process, the destabilization of global energy markets, and further disruption of key navigation routes in the Red Sea.  

Joze Pelayo is an associate director at the Atlantic Council’s Scowcroft Middle East Security Initiative. 


Israel is taking a major risk with its Begin Doctrine

Israel’s launch of strikes on Iran demonstrates a continued invocation of its Begin Doctrine—its long-standing policy of pre-emptively striking nuclear facilities and weapons of mass destruction. Named after Israel’s former Prime Minister Menachem Begin, the doctrine was first created in 1981 during Operation Opera when Israel destroyed Iraq’s Osirak nuclear reactor near Baghdad in a targeted attack.

Similar to Netanyahu today, Begin carried out the strike without US approval. Many feared an escalation if former Iraqi leader Saddam Hussein were to retaliate, however, at the time, Saddam was already embroiled in a war with Iran and could not afford to respond.

Israel applied the doctrine again in 2007 when it covertly destroyed Syria’s Al-Kibar reactor in an operation it did not publicly acknowledge until 2018. Responding to the strike, then-President Bashar al-Assad denied the existence of the site entirely to avoid domestic and regional pressure to retaliate.

Now, for the third time, Israel appears to be invoking the doctrine, this time against Iran’s nuclear and ballistic missile infrastructure, again without Washington. But unlike prior episodes, Iran is expected to retaliate, and likely with far greater intensity than previous strikes in April and October 2024—especially if Iran’s regional proxies join its retaliation to overwhelm Israel’s Iron Dome.

All eyes now turn to Muscat, where US Special Envoy Steve Witkoff is still scheduled to meet with Iranian negotiators this weekend in what could be the final round of nuclear talks. The outlook for any deal appears bleak following the strikes. Should negotiations collapse, the region could face an escalation unlike anything seen in decades.

—Yaseen Rashed is the assistant director of media and communications at the Atlantic Council’s Rafik Hariri Center & Middle East Programs and a Libya researcher.

The post Experts react: Israel just attacked Iran’s military and nuclear sites. What’s next? appeared first on Atlantic Council.

]]>
Ukraine’s drone strikes offer four big lessons for US nuclear strategists https://www.atlanticcouncil.org/blogs/new-atlanticist/ukraines-drone-strikes-offer-four-big-lessons-for-us-nuclear-strategists/ Fri, 06 Jun 2025 22:09:40 +0000 https://www.atlanticcouncil.org/?p=852261 Ukraine’s Operation Spiderweb should spur the US government to address strategic vulnerabilities that nuclear strategists have focused on for years.

The post Ukraine’s drone strikes offer four big lessons for US nuclear strategists appeared first on Atlantic Council.

]]>
In the days since Ukraine’s brazen special forces attack inside Russia, analysts have breathlessly argued that the operation, captured in spectacular detail in videos, significantly changed the character of military conflict—or even “rewrote the rules of war.”

Maybe so. There were plenty of novel elements to Ukraine’s “Operation Spiderweb,” which destroyed a dozen or more large Russian military aircraft—including bombers capable of carrying nuclear weapons—across the length and breadth of Russia, using drones launched from containers positioned near Russian airfields.

But in my field of nuclear deterrence, the attack was enlightening in another way: It reinforced principles that have been hiding in plain sight for years. For US nuclear strategists, the attack yielded at least four crucial lessons.  

1. The risk of nuclear escalation over conventional attacks is exaggerated

Ukraine’s drone strikes were a blow to the widely held belief that nonnuclear military attacks on nuclear-relevant facilities or assets will lead automatically to uncontrollable nuclear escalation.

As I have argued previously, too many analysts of nuclear affairs appear to overweight the risk that if a nuclear-armed country is facing attacks on nuclear-relevant locations or assets by conventional weapon systems or dual-capable ones (systems relevant to both nuclear and conventional missions), then that country will feel overwhelming pressure to escalate to the use of nuclear weapons, perhaps even before assessing the extent of the attacks. This logic looks convincing. But it is empirically unsupported.

Russia may yet respond to the Ukrainian attack. But Russian nuclear retaliation in Ukraine seems unlikely, even after Russia lowered its stated threshold for nuclear use in September 2024. Ukrainian drone strikes on multiple Russian bomber bases would seem to be exactly the sort of attack that would trigger Russia’s lower threshold for resorting to nuclear weapons. Yet no such use has materialized.

To be clear, nuclear-armed states may well resort to nuclear use to coerce an end to military operations that could lead to unacceptable costs, such as the destruction of a large portion of that state’s nuclear arsenal. But last weekend’s operation is further evidence that attacks falling short of this threshold are not likely to trigger a major nuclear exchange.

2. Nuclear forces are only as dependable as their defenses

Ukraine’s attacks vividly illustrated the vulnerability of the US bomber fleet, which is often sitting on the tarmac. Drone threats are just one of a variety of air and missile threats to the US homeland, though certainly one that has received less attention in the strategic forces community. The 2023 Congressional Strategic Posture Commission Report and a recent Atlantic Council study on missile defense both concluded that the United States must enhance its air and missile defense. In particular, it must pay attention to countering coercive attacks on civilian and military infrastructure, as well as on US nuclear forces.

Reflecting on the Ukrainian attacks, General Thomas Bussiere, the commander of US Air Force Global Strike Command, said at an Atlantic Council event on June 5 that the Air Force already deploys counter-drone systems around strategic air bases. The strikes on Russia this past weekend underscore that these efforts should improve and expand, perhaps under the aegis of the Trump administration’s proposed “Golden Dome.” This active defense must be completed by improved sensing, better coordination among responsible agencies, and the advancement of passive measures, such as the use of hardened shelters in peacetime, as well as air alerts and backup airfields in conflict or crisis.

3. Drones should be factored into nuclear-capabilities planning

There’s another truism in nuclear affairs rendered all the truer by last weekend’s operation: Advanced and emerging technologies can powerfully complement nuclear weapons in holding an adversary’s strategic nuclear forces at risk.

This possibility is especially tantalizing as US nuclear strategists grapple with the fact that China’s nuclear-weapons arsenal is expected to reach near-parity with the US nuclear arsenal in the mid-2030s. Because holding at risk an adversary’s nuclear weapons is an important part of how the United States deters nuclear war, the growth in China’s nuclear arsenal puts pressure on the United States to increase the size of its own nuclear arsenal. Advanced conventional weapons might complement these forces or even reduce the extent to which the United States will need to expand its nuclear forces. Perhaps drones could play a part in that equation.

4. Special forces should be at the center of major power competition

As my Atlantic Council colleagues have argued in recent reports, US special operations forces, which have been occupied with counterterrorism and counterinsurgency in the Middle East for two decades, can play an important role in US competition with major powers such as Russia, marking a return to their Cold War-era roots. Ukraine’s attack on Russian bombers is best understood in the context of a long history of operations behind enemy lines to disrupt airfields.

Ukraine’s Operation Spiderweb was certainly daring and will reduce the capacity of Russia’s long-range aviation for some time. More than marking a new chapter in the history of warfare, however, the strikes should spur the US government to address the vulnerabilities and opportunities that nuclear strategists have focused on for years.


Mark J. Massa is the deputy director for strategic forces policy in the Forward Defense program of the Scowcroft Center for Strategy and Security at the Atlantic Council.

The post Ukraine’s drone strikes offer four big lessons for US nuclear strategists appeared first on Atlantic Council.

]]>
What explains the transatlantic rift? It’s all about threat perception. https://www.atlanticcouncil.org/blogs/new-atlanticist/what-explains-the-transatlantic-rift-its-all-about-threat-perception/ Thu, 05 Jun 2025 15:24:49 +0000 https://www.atlanticcouncil.org/?p=851699 NATO allies’ differing threat perceptions provide the backdrop for what could be a contentious summit in The Hague this month.

The post What explains the transatlantic rift? It’s all about threat perception. appeared first on Atlantic Council.

]]>
NATO allies are preparing for their summit at The Hague this month amid a frenzy of promises about increased defense spending, following US President Donald Trump’s call for allies to spend an unprecedented 5 percent of gross domestic product (GDP) on defense. Since taking office in January, Trump has mused about pulling back US forces from Europe while signaling a willingness to improve relations with Russia and even seize Greenland, a territory of NATO ally Denmark.

European policymakers have reacted to Trump’s moves with shock and doubt about the US commitment to NATO, and some have stepped up their defense pledges accordingly. “We still believe that the ‘N’ in NATO stands for North Atlantic and that our European allies should maximize their comparative advantage on the continent,” US Secretary of Defense Pete Hegseth said last week at the Shangri-la Dialogue in Singapore. “And thanks to President Trump, they are stepping up. An alliance cannot be ironclad if in reality or perception it is seen as one-sided.”

For its part, the European Union (EU) has approved a €150 billion defense funding loan program and allowed its members to exceed normal debt limits for military expenditures. Even before the EU’s moves, allies such as Poland and the Baltic States—who Hegseth called “model allies” in Singapore—were ramping up spending and sounding the alarm over the threat they face from Russia. But too many European allies have not yet increased their defense spending sufficiently.

What explains this contrast? Leading NATO allies (France, Germany, Italy, Poland, the United Kingdom, and the United States) diverge from one another because they face different threats and levels of threat perception. These differences explain each ally’s major defense decisions (defense spending, military structure, and military posture) as well as the ally’s role in and relationship to NATO. I explore this issue more deeply in my forthcoming book on NATO, drawing from ninety-eight interviews with current and former policymakers.

NATO allies’ different threat perceptions can explain much of the current crisis within the Alliance, and they provide the backdrop for what could be a contentious summit.

The United States: China trumps Europe

The Trump administration sees China as the most significant state security threat to US interests. The 2025 Annual Threat Assessment says that “China stands out as the actor most capable of threatening US interests globally.” The administration’s Interim National Defense Strategic Guidance reportedly focuses on the threat of a Chinese invasion of Taiwan as one of two priorities for the Pentagon, along with combating drug cartels.

The Trump administration has cited the threat from China to explain its European security policy. Hegseth said in February that the United States could not remain the primary guarantor of European security, telling allied military leaders in Brussels: “The US is prioritizing deterring war with China in the Pacific, recognizing the reality of scarcity, and making the resourcing tradeoffs to ensure deterrence does not fail.” The Interim National Defense Strategic Guidance reportedly concludes that because of the focus on China, European allies must do more for their own defense.

This view of China can also explain the Trump administration’s policy toward Greenland, an autonomous territory of NATO ally Denmark. Melting sea ice means that Greenland’s location will be critical for those seeking to control Artic sea lanes and it is home to large quantities of rare-earth minerals. US Secretary of State Marco Rubio has stressed that the United States would not use force to seize Greenland but only to protect it from encroachment by China.

This can also explain Trump’s significant, though inconsistent, turn toward Russia. Some have argued that the Trump administration is attempting a “reverse Kissinger,” aligning with Russia to weaken its ties to China. The Trump administration may even be turning toward Russia to pressure NATO allies into taking more responsibility for their own defense, as Victoria Coates, a former deputy national security advisor in Trump’s first term, has argued. Even though Trump has criticized Russian President Vladimir Putin, it is reasonable for European leaders to fear that a grand bargain between Washington and Moscow remains a distinct possibility.

Europe: Divided by diverse levels of threat

Europe is unable to defend itself without the United States. Europe lacks integrated air and missile defense, long-range precision strike, transport aircraft, as well as intelligence, surveillance, and reconnaissance capabilities. European allies are struggling to recruit, train, and equip sufficient troops for NATO’s new force model—doing so in the next decade without the United States would most likely be a bridge too far.

But even faced with these challenges, not every European NATO ally has shown the same level of urgency when it comes to increasing defense spending. The reason is that leading European allies face different threats and levels of threat, limiting the incentives of some allies to act. 

The overwhelming consensus among Italian officials, for example, is that instability in the wider Mediterranean is the most important security threat facing the country. Because addressing this threat does not primarily entail military means, Italy has not felt an urgent need to increase defense spending in response to Trump’s policies. While Italian Prime Minister Giorgia Meloni announced in April that Italy would spend 2 percent of its GDP on defense this year (up from 1.5 percent in 2024), no new funding has been allocated for this yet. What’s more, reporting suggests that the government could reach the 2 percent benchmark largely through accounting changes, such as including its Coast Guard in defense spending.

Meanwhile, from strategy documents and official statements, it is clear that Poland, Germany, France, and Britain all view Russia as their greatest security threat. However, they each have different levels of threat perception, which informs the differing approaches they have taken toward military spending.

Poland provides the starkest contrast with Italy. Warsaw plans to spend 4.7 percent of GDP on defense this year, up from 4.1 percent last year. Poland’s level of defense spending makes sense given the intensity of the threat it faces from Moscow and its proximity to Russia. Poland’s view is that only a US-led NATO can provide collective defense against the threat from Russia, so it is focused on pushing allies to comply with US demands to keep Washington committed to European security.

Concern that the United States could shift away has also led Germany to spend more on defense. Following Germany’s February election, German Chancellor Friedrich Merz led a successful effort to revise Germany’s constitution to allow borrowing above 1 percent of GDP for defense spending. On April 9, Merz announced a coalition agreement with the Social Democrats, which included a pledge to ramp up defense spending “significantly” to fulfill Germany’s NATO commitments. Germany views any US moves to withdraw from Europe with alarm, and Merz continues to insist that Germany and Europe do more to keep the United States engaged in NATO. Last month, Foreign Minister Johann Wadephul said Germany will “follow” Trump’s demand that allies spend at least 5 percent of GDP on defense.

France’s independent nuclear arsenal gives it an added degree of security against the threat from Russia. While France has used the Trump administration’s statements to push for European defense independence, Paris has not reacted with urgency in terms of its own defense spending. French President Emmanuel Macron has called for a new NATO spending target of 3 percent of GDP on defense but has not proposed a new figure for French defense spending (currently at 2.1 percent of GDP).

While Britain’s nuclear arsenal would normally provide it with an extra measure of security against Russia, the United Kingdom relies on the United States for its nuclear submarines. As such, the British government has doubled down on its relationship with the United States. British officials have embraced Trump’s criticism of allies who underspend on defense, and Foreign Secretary David Lammy has called for a NATO that is “stronger, fairer, and more lethal.” Just prior to Prime Minister Keir Starmer’s visit to the United States in February, the British government announced that Britain will spend 2.6 percent of GDP on defense by 2028, up from 2.3 percent this year.

Preserving a mutually beneficial relationship

The United States’ greater focus on China and push for Europeans to take more responsibility for their defense are likely irreversible trends. But the NATO Summit in The Hague later this month provides an opportunity for the United States and its European allies to reaffirm their commitments to the Alliance amid these shifting dynamics.

First, the Trump administration should use the summit to work with its European allies on a phased and structured exchange of responsibility for European security over the next decade. Under such a plan, the United States would work with European allies to develop defense capabilities they do not currently have while maintaining the commitment of the US nuclear deterrent.

Second, Trump should take the opportunity to reassure European allies. He should affirm that the United States would come to the aid of any NATO ally that is attacked. Trump should also state plainly that his administration will work with Denmark to bolster the defense of Greenland and that it does not intend to acquire the island by force.

Third, European countries should use the summit to announce further commitments on defense spending. Following through on such commitments will entail costly domestic tradeoffs. The present moment requires courage: European leaders must make the case that significantly more defense spending is necessary because of the threat Russia poses and the United States’ turn toward the Indo-Pacific. Italy’s government in particular will have a challenging task. Because Italians are focused on threats from the Mediterranean, officials in Rome will have to make the case that Russia’s threat to European security matters for Italy. European governments like Italy’s can also make a compelling case that spending more on defense may boost overall economic growth.

If NATO allies take these steps at this year’s summit, they can help build a future Europe more capable of defending itself and an Alliance that better serves both US and European interests.


Jason Davidson is a nonresident senior fellow at the Atlantic Council’s Transatlantic Security Initiative in the Scowcroft Center for Strategy and Security. He is also a professor of political science and international affairs and director of the Security and Conflict Studies Program at the University of Mary Washington in Fredericksburg, Virginia.

The post What explains the transatlantic rift? It’s all about threat perception. appeared first on Atlantic Council.

]]>
The frontier is the front line: On climate resilience for infrastructure and supplies in Canada’s Arctic https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/the-frontier-is-the-front-line-on-climate-resilience-for-infrastructure-and-supplies-in-canadas-arctic/ Fri, 30 May 2025 14:49:31 +0000 https://www.atlanticcouncil.org/?p=850322 The front lines of strategic competition now run through the Arctic. Ottawa must do more to enhance its military readiness and infrastructure preparedness in the region.

The post The frontier is the front line: On climate resilience for infrastructure and supplies in Canada’s Arctic appeared first on Atlantic Council.

]]>
Prime Minister Mark Carney’s victory in the May 2025 elections provides a clearer picture of Canada’s political future and strategic priorities. During the election campaign, Carney emphasized bolstering defense spending and increasing Canada’s presence, awareness, and infrastructure footprint in the Arctic. As Carney seeks to achieve these stated ends, he will contend with a strategic environment that looks more dangerous for Ottawa than at any time since the end of the Cold War. And he will likely struggle to reconcile the strategic importance of the Arctic with the cost of developing the infrastructure required to secure it. But as the ice retreats, so too do the barriers that once insulated Canada’s Arctic.

The frontier has become the front line.

Canada’s choice is binary: secure its portion of the Arctic or suffer the consequences of foreign powers acting with impunity in and around Canada’s Arctic. Ottawa’s central challenge, therefore, is to harden its Arctic presence with dual-use infrastructure and supply chain resilience while hostile powers increase their influence around the pole.

This task gets more difficult the longer Ottawa dithers because change manifests across many vectors concurrently. The infrastructure and supply chains critical to the region are underdeveloped and ill-suited for the future—and they do not improve with age. Climate change continues to alter the contours of the region, often to Canada’s strategic disadvantage. An ascendant generation of US strategists proclaim that the Canadian Arctic is the “new soft underbelly” of North America. And it is no longer fantasy to suggest that the Arctic is ground zero for the new ‘Great Game’ between the United States, Russia, and China.

The region has been one of strategic contest since 1921, when Joseph Stalin claimed the North Pole for the Soviet Union, a claim re-animated by Moscow in 2015. It may lack the trenches and dragon’s teeth in Europe, or the clashes between fishing vessels and coast guard ships in southeast Asia. But the Arctic is no longer a low-threat, low-force posture environment that can be defended by a couple Coast Guard icebreakers and some Canadian Rangers on snowmobiles.

It is a region of strategic consequence and likely to be more so in the coming decades, which begs the question—why does Canada lag allies and adversaries alike in both the defense and development of its Arctic territory?

The simplistic answer is that Ottawa is torn among competing interests and an inability, or an unwillingness, to marshal the domestic resources necessary to protect its Arctic from a growing cast of players keen to exploit perceived vulnerabilities in pursuit of their interests.

The Atlantic Council delved deeper into Canada’s challenge to bolster infrastructure and supply chain resilience in the region. Research included literature reviews, interviews, and off-the-record conversations with a broad range of government and private-sector stakeholders. Interviews yielded constructive, if passionate, views from respondents who expressed repeatedly how much they want Canada to secure its part of the Arctic and enable its full development.

Analysis revealed that Ottawa knows the region well; the Canadian government has few peers in understanding the Arctic and what is required to right supply chains there. Geological surveys and development plans are completed to a gold standard. Stakeholders know the problem and solution space—and have for decades. But domestic policy, not climate change or geopolitical calculus, is the primary factor influencing strategic decisions for Canada’s north.

Key players (and honorable mentions)

Climate change has made the Arctic accessible. Glacier melting has created new sea routes, extended shipping seasons, and unveiled vast natural resources. But it has also created an opening in the region for strategic contest. Three threat vectors shape the region’s security dynamics for Canada.

Russia

More than half of the Arctic Circle’s population and half its economy are Russian. Russia sits at the end of one of the Arctic’s most accessible regions. Russia is opening old bases and building new infrastructure throughout the region. It holds more than 50 percent of Arctic investment (made between 2017 and 2022), and its military doctrine treats the north as central to economic and national defense. Since 2014, the Kremlin has launched Cold War-style investments in Arctic airfields, radar systems, submarine networks, and year-round basing. Russian military planners are considering anti-access/area denial (A2/AD) domes extending over the Northern Sea Route.

Moscow likely observes that Canadian defense planning remains rooted in an outdated peace dividend mindset—one that grossly underestimates the threat of state-on-state conflict in the Arctic. Canada’s lack of comprehensive undersea surveillance renders its Arctic maritime approaches effectively blind, and its military presence in the region—symbolized by a modest footprint of Canadian Rangers—leaves much to be desired in terms of deterrence or rapid response. Equipment remains outdated, modernization plans languish in bureaucratic limbo, and logistics chains are stretched perilously thin. These gaps create space for Russian forces to maneuver below the threshold of war, exploiting ambiguity and Canada’s limited detection capabilities to assert influence or project force unchallenged.

The Kremlin likes to see how Canada’s strategic dependence on the United States substitutes alliance commitments for genuine sovereign deterrence. Ottawa’s whole-of-government approach—while inclusive in theory—has fragmented decision-making in practice, rendering Canada slow and reactive at a time when speed and coherence are strategic advantages. Indigenous consultation, while legally and morally necessary, remains procedurally rigid and politicized, often becoming a brake on critical national security decisions rather than a channel for partnership and empowerment.

While Russia invests heavily in its Arctic capabilities, Canada’s Arctic capability is stuck in the twentieth century. Surveillance assets are aging, space-based platforms are insufficient, and investment in modern ISR (intelligence, surveillance, reconnaissance) technology remains anemic. Communications remain unreliable across vast regions, exposing both civilian and military systems to disruption. Cyber defenses—especially around critical infrastructure—are poorly funded and unevenly deployed, inviting adversaries to strike via code rather than missile.

China

China considers itself a “near-Arctic power” and its Polar Silk Road links Arctic shipping to its global Belt and Road ambitions. China’s white papers frame the region as a commons to be commercially and scientifically accessed. Icebreaker construction in Chinese shipyards matches the tempo of a nation preparing for permanent presence.

Beijing understands that Canada’s economic infrastructure in the Arctic is brittle. Melting permafrost, seasonal reliance on ice roads, and a near-total absence of deepwater ports make northern logistics vulnerable to both climate and conflict. These choke points offer asymmetric opportunities to disrupt supply chains or sabotage dual-use facilities. China could exploit these vulnerabilities by embedding itself through ostensibly civilian investments in Arctic mining, telecommunications, or transportation infrastructure—investments that are strategic positioning by other means. In such a fragile environment, any hybrid attack or technological failure could sever vital arteries with catastrophic effects.

From China’s vantage point, Canada’s Arctic declarations are noble but hollow—bold in language but weak in execution. For Beijing, which has increased defense spending every year for three decades, Canada’s plan to reach two percent of gross domestic product (GDP) on defense spending by 2030 is symbolic. Procurement remains tangled in inefficiency and overregulation, hampering modernization and undermining operational readiness. Economic pressures, shifting political winds, and lukewarm support for military spending are likely to derail Canada’s commitments before they mature. Moreover, China likely sees Canada’s overreliance on its NATO allies as a strategic liability. The Arctic can be probed or pressured just below NATO’s collective defense thresholds—ensuring ambiguity, diffusing Western resolve, and highlighting Canada’s limited unilateral options.

Manpower shortages, insufficient Arctic basing, and the long-delayed Nanisivik port all point to structural underinvestment in hard infrastructure. These gaps offer Beijing a rich menu of asymmetric opportunities to: subvert Arctic economies through proxy investments; cultivate cultural ties through scholarships, research partnerships, and diplomatic outreach; sabotage digital and physical infrastructure through cyberattacks or dependency entrapments; and sow political dissent by financing Indigenous, environmental, or anti-militarization movements within Canada’s own democratic fabric.

The United States (and others)

For Washington, Canada’s failure to defend its Arctic territory is not merely a function of limited resources, but of deliberate strategic neglect. The refusal to acquire nuclear-powered submarines—essential for year-round under-ice patrols and true sovereignty enforcement—reveals a deeper aversion to the burdens of great power responsibility. While adversaries invest in undersea dominance and dual-use Arctic infrastructure, Ottawa opts for half-measures: diesel patrol submarines that can’t operate under the polar ice, minimal surveillance capabilities, and no permanent military basing north of 60.

The US view is shifting from a posture of “monitor and respond” to one of “prepare and deter.” Pentagon reports no longer downplay the Arctic as a region of strategic importance. Even smaller powers have taken notice. India published its Arctic strategy in 2021, emphasizing scientific diplomacy. Turkey signed the Svalbard Treaty to gain access rights to the Arctic in 2023. France and Germany are also exploring greater footprints in the region.

While the Icebreaker Collaboration Effort (ICE) Pact with Canada and Finland represents a trilateral effort to rebuild icebreaker capacity and harden the Arctic industrial base, it is not enough. Canada remains trapped in a peacetime posture and mentality—symbolic patrols and seasonal exercises—while the region becomes increasingly contested by powers that are, at best, are neutral to Canada’s concerns and, at worst, openly hostile to them.

This inertia is rooted in a political culture that prioritizes accommodation over assertiveness. Successive governments have deferred to progressive special interest groups whose influence blunts hard security policies. Environmentalist and Indigenous consultations, while important, are often weaponized procedurally to paralyze decisive action. The result is a government debilitated by process, one that speaks of sovereignty but shrinks from the instruments necessary to enforce it. Even modest defense initiatives face resistance if they challenge entrenched activist orthodoxies or require confronting Canada’s internal contradictions. This includes the legal quagmire of provincial and territorial jurisdiction in the North, which Ottawa remains unwilling to override or reform.

Perhaps most damning for Washington is Canada’s lack of strategic coherence. Ottawa provides a strategic framework for the Arctic but fails to dedicate the resources to achieve the objectives contained therein. Policy and strategy without resource commitments are unseriousness ideas. Moreover, Canada’s policies do not form a doctrine of Arctic deterrence, convey no idea on how to mobilize federal will, and fail to weave a unifying narrative that connects Arctic defense to the survival of Canada as a sovereign nation in an increasingly anarchic world.

America cannot—and will not—permit a soft underbelly to fester in a domain as critical as the Arctic. It is not inconceivable for US forces unilaterally securing parts of the Canadian Arctic in the event of a crisis. Such actions, while diplomatically uncomfortable, would be strategically necessary if Canadian gaps remain unaddressed. To be blunt: if pressed and in a fight with Russia or China in the Arctic, the US will almost certainly be “Elbows Up” in defense of North America, even if it offends Canadian sensitivities.

Five “cold kills”

Our research unearthed five factors that contribute to Canada’s Arctic inertia. Each of these “cold kills” continues to impede progress on increasing supply chain and defense resilience.

1. Lacking multipartisan consensus on the region as “ground zero” for a new “Great Game.”

Canada cannot do much in the Arctic if it lacks enduring political will to support and fund dual-use infrastructure over decades. The growing importance of the Arctic for great-power competition underscores the need for politicians, defense planners, local communities, industry partners, and other relevant stakeholders to walk in the same general direction, if not in lockstep. Despite the urgency of this task, no sustained, cross-partisan strategy for Arctic defense exists. Without it, investments, infrastructure development, and operational planning will almost certainly come up short. In 2025, Natural Resources Canada is projected to invest $12.1 million toward climate adaptation projects in the North—which is necessary, but insufficient when compared to similar efforts by other Arctic powers.

Yet, allies offer a contrast. Norway’s Arktis 2030 fund and its defense pledge of 3 percent of GDP underscore a whole-of-society approach. Finland’s NATO entry boosted its participation in Arctic exercises. Sweden utilizes Arctic data to create a stronger and better informed national defense policy. Denmark leverages Greenland’s geostrategic importance in its Arctic defense. While Canada’s Arctic is inaccessible by comparison, it can look at what NATO allies do right in the region and their whole-of-society approaches.

2. Placing too much of the strategic burden on local communities.

The Canadian government continues to place disproportionate responsibility for Arctic security on local communities, revealing a dangerous strategic asymmetry between rhetoric and capability. The Canadian Rangers, though a symbol of national resolve and cultural integration, are not a substitute for a modern, standing military presence. They are lightly armed, part-time volunteers—valuable in their knowledge of the land but structurally unfit to deter or respond to the increasing threats posed by adversarial state actors operating just beyond the line of sight. This over-reliance has created a strategic mirage: Ottawa appears engaged in Arctic defence, but the burden is unfairly borne by those with the fewest resources and the highest exposure.

In effect, Canada’s Arctic is not treated as an equal part of Confederation, but as a frontier outpost whose primary function is surveillance and symbolic sovereignty. The political imagination to raise Arctic communities to the standard of living of rural southern Canada is absent. There is no serious nation-building project underway—no long-term vision to tie infrastructure, broadband, energy, healthcare, and education in the North to the national grid of opportunity.

The region is home to significant deposits of iron ore, gold, diamonds, and rare earth elements. The Mary River Mine on Baffin Island is one of the world’s richest reserves of high-grade iron ore, producing millions of tons annually. Similarly, the Hope Bay and Meliadine gold mines contribute substantially to Canada’s mineral output. These resources are critical for economic development and for national security, given their importance in defense manufacturing and technology. Yet, the extraction and transportation of these resources are hampered by limited infrastructure that eludes further development due to lack of coordination and investment at all levels of government. While the Yukon Security Advisory Council can be a model for shared governance federal, territorial, and Indigenous jurisdictions overlap without coherent authority. The result is a bureaucratic bottleneck that limits response agility and accountability, especially in scenarios involving mass casualty events or foreign incursions below the threshold of war.

3. Misunderstanding the Arctic as a land- or maritime-centric domain, instead of a multidomain one.

Canada’s Arctic strategy remains anchored in a legacy mindset—fixated on land and maritime domains—while the battlespace has already expanded far beyond the ice and tundra. The Canadian Arctic is a multi-domain operating environment in the most rigorous sense: a crucible where air, sea, land, space, and cyberspace domains converge. Focusing primarily on ground mobility or maritime choke points is antiquated.

In an era defined by precision-guided conflict, gray zone incursions, and orbital competition, the North requires integrated deterrence across all domains. The space domain is already decisive; Russia and China have launched dual-use satellites optimized for polar reconnaissance, while Canada’s surveillance constellation remains limited and aging. Cyberspace, too, is an active front. Persistent foreign probing of Canada’s critical Arctic infrastructure—from power grids to fiber lines—underscores the need for zero-trust architectures and sovereign cyber capacity hardened against both disinformation and sabotage. The air domain, often overshadowed, remains underutilized despite offering cost-effective ISR opportunities via high-altitude, long-endurance drones and balloon-based sensors that can supplement space assets in degraded environments.

Canada must approach the Arctic as a multi-domain region. Infrastructure nodes at Iqaluit, Yellowknife, and Inuvik must be conceived not as mere logistics hubs, but as permanent and staffed bases in a broader multi-domain lattice of deterrence. Airfields should be hardened, satellites shielded, networks encrypted, and data fused in real time. The resilience and infrastructure footprint must be multi-domain: ISR in orbit, radar on ice, seaborne logistics hubs, and hardened cyber networks. It might even be cheaper to establish and easier to maintain air-based sensors to augment space-based sensors, such as high-altitude, long-endurance drones and high-altitude balloons.

4. Missing the point that infrastructure spending enables both military and local resilience.

Canada’s policy frameworks fail to grasp a foundational truth: infrastructure is not ancillary to defence; it is defence. Roads, railways, hospitals, and power stations in the Arctic are bulwarks of resilience and lifelines to national unity. The harsh environment demands more than token outposts; it demands permanence that begins with infrastructure designed for both civilian and military pursuits.

Canada’s persistent underinvestment in Arctic infrastructure can be attributed largely to sticker shock. Building in the north is expensive at the outset, but those initial costs conceal long-term value. Roads, railways, and ports that facilitate the movement of Canadian forces and provide necessary infrastructure for local communities also enhance NATO mobility and resilience.

The Grays Bay Road and Port Project is unlikely to open before 2035. Until then, the Port of Churchill remains Canada’s only Arctic deepwater port for more than 106,000 miles of coastline—and even it is more than 800 kilometres south of the Arctic Circle. The overland situation is equally stark. The long-considered Mackenzie Valley Highway remains unbuilt. Meant to replace unreliable winter roads and connect remote Arctic communities, the highway should be considered as a defense artery.

Moreover, the North needs cyber towers as much as radar domes; fibre optic cables as much as sonar arrays. Schools and post-secondary institutions—anchored by Arctic research centres—should be erected alongside hardened military installations to attract families, not just forces. In Alaska, the dual-use success of the University of Alaska Fairbanks and the Ted Stevens Anchorage International Airport provides a model: educational and aerospace ecosystems aligned with the broader security posture of the United States.

Still, there are signs of acceleration. The Department of National Defence has committed $230 million to extend the main runway at Inuvik Airport. The upgrades include modern lighting and arrestor systems—investments tailored for sustained military operations and a rare example of a concrete commitment in a domain often shaped by abstraction. Canada should build Arctic spaceports and drone launch facilities for persistent surveillance and communications dominance—assets that would likely qualify as defence expenditures under a broadened NATO definition. And that definition is evolving. With calls to raise the alliance-wide benchmark to five percent of GDP, the line between civil and military investment will blur. Forward-thinking allies are already redefining defence to include national resilience, critical infrastructure, and technological redundancy.

5. Failing to call out the need to achieve A2/AD capability.

Canada’s current Arctic strategy is more performative than purposeful. It remains anchored in rituals of presence rather than a doctrine of deterrence. The reasons are structural and cultural: A2/AD sounds too aggressive for a nation wedded to peacekeeping identity and constrained by intergovernmental jurisdictional frictions. But if Canada is to hold the Arctic, it must defend it—not merely inhabit it. That demands something Canada has never attempted: a comprehensive anti-access/area denial (A2/AD) strategy adapted for the circumpolar battlespace.

A2/AD refers to the deployment of integrated capabilities that prevent an adversary from operating freely within a region. This includes long-range fires, persistent surveillance, advanced radar, cyber denial tools, hardened command-and-control infrastructure, and air and maritime denial platforms. Canada does not mention A2/AD in its Arctic lexicon because it fears what it implies: that the North is no longer a sanctuary but a frontier. Building an Arctic A2/AD network would require political will, sustained investment, and a strategic mindset that accepts confrontation as a precondition for sovereignty. It would also provoke diplomatic risk—Russia would label such a move provocative, and China would test the perimeter with gray-zone maneuvers masked as scientific exploration or commercial navigation. Yet the absence of such a posture risks far greater cost: a hollow sovereignty, subject to erosion by increments.

Investments in some areas do not amount to A2/AD. True, Canada’s $38.6-billion commitment over twenty years to modernize NORAD is substantial. If fully implemented, this would be the largest reinvestment in continental defense since the early Cold War. Arctic over-the-horizon radar systems will track threats from the US-Canada border to the Arctic Circle. A more powerful polar variant will extend coverage into the Arctic archipelago and beyond. Crossbow—a classified network of advanced sensors—will supplement these systems with real-time precision. And the Defence Enhanced Surveillance for Space (DESSP) project will allow space-based tracking of adversary launch and maneuver capabilities. Canada has partnered with Australia on a next-generation Arctic early-warning detection system. But even these investments are insufficient; they do not achieve A2/AD in the Arctic. Canada has ISR blind spots, insufficient logistical depth, and infrastructure degraded by thawing permafrost. RADARSAT’s capabilities are aging; the Northwest Passage is functionally unmonitored. There is no cruise missile defense layer.

A Canadian A2/AD architecture would extend ISR reach from geostationary orbit to the ocean floor. At its core: Over-the-Horizon Radar (AOTHR), high-altitude drones, and advanced satellite constellations fused via a hardened C4ISR backbone. Any credible A2/AD structure must project deterrence not only northward but outward via NORAD, integrating seamlessly with allied efforts across the Greenland-Iceland-UK gap and the European High North.

Challenge and opportunity

We recommend the following six steps to shape decision-making vis-à-vis Canada’s Arctic. Addressing each of them is necessary for more resilient supply chains and robust infrastructure for defense of the Canadian Arctic.

1. Achieve enduring domestic political consensus.

Without sustained, bipartisan consensus on the strategic value of the Arctic, Canada’s northern policy will remain fragmented, underfunded, and vulnerable to reversal.

Canada should establish a nonpartisan Arctic Strategy Council, drawing on members from federal, provincial, territorial, and Indigenous governments, as well as the private sector. This council could be modeled loosely on the United Kingdom’s National Security Council, with a standing mandate to oversee and report on Arctic development milestones.

To correct course, Parliament should adopt a minimum percentage of GDP for Arctic infrastructure and defense investments—similar to how NATO’s 2-percent defense spending benchmark frames national priorities. A 0.5-percent GDP floor specifically earmarked for Arctic readiness would send a powerful signal to allies, adversaries, and Canadians alike.

2. Build permanent bases and infrastructure.

Sovereignty requires presence. Canada cannot assert command over its northern territory while maintaining a transient, seasonal military posture.

Canada must develop at least two permanent Arctic bases by 2035 and reinforce the air infrastructures in Yellowknife. These installations should support multi-domain enablers: ground forces, drone squadrons, ISR satellites, and cyber defense detachments. One proposed location is Resolute Bay in Nunavut—a strategic logistics point halfway through the Northwest Passage. Another is Tuktoyaktuk in the Northwest Territories, where the Inuvik-Tuktoyaktuk Highway provides ground access to the Beaufort Sea.

Canada need not sacrifice environmental stewardship to bolster its dual-use infrastructure in the region. On the contrary, the development of small modular reactors (SMRs) offers a way to meet energy needs in a sustainable and flexible manner. These compact, deployable energy systems would enable off-grid installations to power radar stations, bases, and airstrips—allowing the Canadian Armed Forces to operate autonomously across a vast and power-starved frontier.

Canada can and should discover best practices in other nations and adopt to the fullest extent possible. The Arctic Remote Energy Networks Academy is training a new generation in clean energy implementation, building the intellectual and technical foundation for sustainable Arctic energy systems. It is one example of innovation that can help make strides in the Arctic.

3. Reorient superclusters toward strategic innovation.

Canada’s innovation ecosystem is misaligned with its strategic realities.

To adapt, Canada must integrate Arctic operational challenges into supercluster mandates. The focus of these superclusters has strayed too far from core security imperatives, and redirecting their mandate toward the defense and security sector could allow Canada to reanimate its atrophied defense industrial base, stimulate Indigenous research and development, and provide a platform for strategic innovation drawn from academic and private-sector talent.

The Global Innovation Cluster for Advanced Manufacturing could sponsor development of modular Arctic housing for deployed forces. The Digital Technology Cluster could support remote communications networks hardened against magnetic interference. And the Protein Industries Cluster could help devise shelf-stable, high-calorie rations adapted to extreme environments.

Canada should establish a national challenge prize—modeled on the US Defense Advanced Research Projects Agency (DARPA) Grand Challenge—to spur innovation in climate-resilient infrastructure, Arctic mobility, and remote power generation. Such efforts should be coordinated by a Defence Innovation Agency akin to the United Kingdom’s Defence and Security Accelerator (DASA), ensuring alignment between technological output and operational need.

4Integrate civil-military infrastructure.

Canada must adopt a whole-of-society approach to Arctic logistics—one that erases the line between civilian and military use.

Every kilometer of highway, every meter of runway, and every watt of power grid must serve dual purposes. Similarly, the Grays Bay Road and Port Project, which aims to connect the rich mineral fields of western Nunavut with the Northwest Passage, must be prioritized for its economic benefits and geopolitical value. Its completion would give Canada a second deepwater Arctic port—an essential node for resupply, power projection, and emergency response.

Meanwhile, the feasibility of Arctic spaceports must be considered thoughtfully. With global competition accelerating in polar orbit surveillance, Canada’s geography is a latent advantage. Nunavut and the Northwest Territories are prime candidates for launching satellites into sun-synchronous and polar orbits, a domain critical for ISR.

5. Accelerate NORAD modernization and ISR integration.

Canada must modernize its Arctic surveillance and early-warning capabilities through the renewal of NORAD and deep integration of orbital, aerial, and terrestrial ISR platforms.

Canada must move decisively to modernize its contributions to NORAD and integrate a layered, multi-domain ISR architecture that meets the threats of the 21st century. The existing North Warning System (NWS)—a relic of the Cold War—is functionally obsolete. It is increasingly vulnerable to kinetic destruction, electronic warfare, and deception by adversaries leveraging hypersonic, low-flying, and space-enabled strike platforms. While Canada has acknowledged this through its stated commitment to over-the-horizon radar (OTHR) and new space-based capabilities, progress has been halting, piecemeal, and under-resourced.

Canada should fast-track its involvement in key pillars of NORAD modernization alongside the United States by:

  1. Over-the-Horizon Radar (OTHR): Advance procurement and installation of Arctic-facing OTHR systems based in Labrador and Nunavut to create a persistent early-warning envelope stretching across the polar approaches. These systems must be hardened against electromagnetic disruption and integrated into NORAD’s command-and-control nodes in real time.
  2. Ballistic Missile Defence and the Golden Dome: Canada must shed outdated policy inhibitions and join the continental Ballistic Missile Defence (BMD) architecture. A Canadian contribution to a “Golden Dome” over North America—built on Aegis Ashore components, ship-based interceptors, and ground-based midcourse defence systems—would reinforce deterrence and mitigate the strategic vacuum currently inviting adversary escalation. Participation in the US Missile Defense Review and integration into layered BMD command structures should begin immediately.
  3. Space and High-Altitude ISR: The integration of RADARSAT Constellation Mission (RCM) assets with Gray Jay microsatellites must be complemented by investment in high-altitude, long-endurance (HALE) UAVs, stratospheric balloons, and commercial space partnerships. Persistent polar orbit surveillance is not a luxury—it is the sinew of a sovereign Canadian deterrent.

A modern NORAD without a full Canadian partner is a NORAD weakened in scope, credibility, and political cohesion. In an age of hypersonics, space militarization, and AI-driven surveillance, Canada’s northern shield must be not just symbolic but steel-wrought—an active, intelligent barrier underpinned by the best minds and machines the alliance can field. The window to shape this future is closing fast. Canada must step forward now, not as a follower, but as a co-architect of North America’s defence.

6. Integrate the Arctic with broader national and allied defense postures.

Canada’s Arctic strategy must not be treated in isolation.

Canada must integrate its Arctic strategy into a broader, assertive national defence posture—one that acknowledges the indivisibility of Canadian sovereignty and its responsibilities as a G7 power. The Arctic is not a separate theatre, but the forward glacis of the North American fortress. What begins as radar coverage over Baffin Bay ends in deterrence posture from Vilnius to the Taiwan Strait. Canadian defence policy must therefore harmonize Arctic readiness with strategic power projection abroad, ensuring the nation can respond decisively to threats—whether they emerge from the Beaufort Sea, the Black Sea, or the South China Sea.

The Arctic remains critical—but it is not Canada’s only defence priority. A myopic focus on the North risks undermining broader global responsibilities. Canada must project credible force across multiple domains and theatres. That means integrating Arctic surveillance—through over-the-horizon radar, low Earth orbit satellite constellations, and AI-driven ISR—directly into NORAD’s early warning lattice. These capabilities must be interoperable with US Northern Command, NATO’s Arctic flank, and allied sensors in the Indo-Pacific. Surveillance is not enough; it must be paired with striking power and forward basing.

Strategic mobility and offensive reach are essential. Arctic airbases must be upgraded to sustain F-35 squadrons year-round, with rapid deployment capabilities for long-range precision fires and mobile expeditionary forces. Arctic-class naval platforms should anchor presence and power projection into contested waters, with the logistical depth to pivot between the Arctic archipelago and Pacific choke points. Canadian-built UAVs and high-altitude drones should patrol both the Northwest Passage and Western Pacific, forming a twin-hemisphere presence. Above all, Canada must act as a sovereign Arctic nation capable of defending its territory, while remaining a credible contributor to the rules-based international order. The Arctic is the crucible, but Canada’s responsibilities—and its enemies—do not stop at the pole.

Canada’s Arctic infrastructure and supply chain resilience are foundational components to its basic expression of sovereignty. But the future of the Arctic belongs to those who show up first and endure longest. The question is not whether Canada can afford Arctic sovereignty, but whether it can afford its absence.

About the authors

Jeff Reynolds is a nonresident senior fellow with the Transatlantic Security Initiative in the Atlantic Council’s Scowcroft Center for Strategy and Security.

Kristen Taylor is an assistant director with the Transatlantic Security Initiative in the Atlantic Council’s Scowcroft Center for Strategy and Security.

Acknowledgements

This research was made possible by the generous support of the Canada Mobilizing Insights in Defense and Security (MINDS) program.

Related content

Explore the program

The Transatlantic Security Initiative aims to reinforce the strong and resilient transatlantic relationship that is prepared to deter and defend, succeed in strategic competition, and harness emerging capabilities to address future threats and opportunities.

The post The frontier is the front line: On climate resilience for infrastructure and supplies in Canada’s Arctic appeared first on Atlantic Council.

]]>
Hammes quoted in The Economist article on US shipment of ship-killer missiles to the Philippines https://www.atlanticcouncil.org/insight-impact/in-the-news/hammes-quoted-in-the-economist-article-on-us-shipment-of-ship-killer-missiles-to-the-philippines/ Wed, 28 May 2025 14:52:38 +0000 https://www.atlanticcouncil.org/?p=849028 On May 22, Forward Defense nonresident senior fellow T.X. Hammes was quoted in The Economist in an article titled “America’s new ship-killer missiles come to the Philippines.” Hammes believes that the deployment of the short-range missile system will create uncertainty for China’s military leaders, enhancing US deterrence efforts in the region.

The post Hammes quoted in The Economist article on US shipment of ship-killer missiles to the Philippines appeared first on Atlantic Council.

]]>

On May 22, Forward Defense nonresident senior fellow T.X. Hammes was quoted in The Economist in an article titled “America’s new ship-killer missiles come to the Philippines.” Hammes believes that the deployment of the short-range missile system will create uncertainty for China’s military leaders, enhancing US deterrence efforts in the region.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Hammes quoted in The Economist article on US shipment of ship-killer missiles to the Philippines appeared first on Atlantic Council.

]]>
Eftimiades interviewed by NTD on Chinese espionage https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-interviewed-by-ntd-on-chinese-espionage/ Tue, 27 May 2025 15:06:19 +0000 https://www.atlanticcouncil.org/?p=849256 On May 20, Forward Defense nonresident senior fellow Nicholas Eftimiades was interviewed by NTS News, in a segment entitled, “Former Intelligence Officer: China Leverages Entire Society for Intel.” With Tiffany Meier, Eftimiades discusses the Chinese Communist Party’s espionage strategy, pulling insights from his book, Chinese Intelligence Operations and Tactics.

The post Eftimiades interviewed by NTD on Chinese espionage appeared first on Atlantic Council.

]]>

On May 20, Forward Defense nonresident senior fellow Nicholas Eftimiades was interviewed by NTS News, in a segment entitled, “Former Intelligence Officer: China Leverages Entire Society for Intel.” With Tiffany Meier, Eftimiades discusses the Chinese Communist Party’s espionage strategy, pulling insights from his book, Chinese Intelligence Operations and Tactics.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Eftimiades interviewed by NTD on Chinese espionage appeared first on Atlantic Council.

]]>
Murray in Politico Europe on Defense Finance in Europe https://www.atlanticcouncil.org/insight-impact/in-the-news/murray-in-politico-europe-on-defense-finance-in-europe/ Mon, 26 May 2025 20:00:00 +0000 https://www.atlanticcouncil.org/?p=849569 On May 26, Rob Murray published a piece in Politico Europe on the proposed multilateral Defense, Security, and Resilience (DSR) Bank and the importance of defense financing mechanisms to boost European defense spending.

The post Murray in Politico Europe on Defense Finance in Europe appeared first on Atlantic Council.

]]>

On May 26, Rob Murray, non-resident senior fellow at Forward Defense and the Transatlantic Security Initiative, published a piece in Politico Europe on the proposed multilateral Defense, Security, and Resilience (DSR) Bank and the importance of defense financing mechanisms to boost European defense spending. Murray discussed the importance of the new Safety Action for Europe (SAFE) program and its potential benefits and argued for the creation of the DSR bank to help Europe achieve its security goals.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The Transatlantic Security Initiative aims to reinforce the strong and resilient transatlantic relationship that is prepared to deter and defend, succeed in strategic competition, and harness emerging capabilities to address future threats and opportunities.

The post Murray in Politico Europe on Defense Finance in Europe appeared first on Atlantic Council.

]]>
Cole interviews US Marine Corps Major General Peter D. Huntley on MARSOC podcast https://www.atlanticcouncil.org/insight-impact/in-the-news/cole-interviews-us-marine-corps-major-general-peter-d-huntley-on-marsoc-podcast/ Tue, 13 May 2025 19:20:50 +0000 https://www.atlanticcouncil.org/?p=845468 On April 25, Forward Defense nonresident senior fellow August Cole sat down with US Marine Corps Major General Peter D. Huntley, Commander of the Marine Forces Special Operations Command (MARSOC), to discuss the command’s future pathways and the strategic challenges it faces today.

The post Cole interviews US Marine Corps Major General Peter D. Huntley on MARSOC podcast appeared first on Atlantic Council.

]]>

On April 25, Forward Defense nonresident senior fellow August Cole sat down with US Marine Corps Major General Peter D. Huntley, Commander of the Marine Forces Special Operations Command (MARSOC), to discuss the command’s future pathways and the strategic challenges it faces today.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Cole interviews US Marine Corps Major General Peter D. Huntley on MARSOC podcast appeared first on Atlantic Council.

]]>
Starling-Daniels and Luetkefend quoted in WMAL article titled “In Great Power Competition, Special Ops to Play Key Role” https://www.atlanticcouncil.org/insight-impact/in-the-news/starling-daniels-and-luetkefend-quoted-in-wmal-article-entitled-in-great-power-competition-special-ops-to-play-key-role/ Tue, 13 May 2025 19:04:43 +0000 https://www.atlanticcouncil.org/?p=846632 On May 3, Forward Defense director Clementine Starling-Daniels and assistant director Theresa Luetkefend were quoted in a WMAL article titled “In Great Power Competition, Special Ops to Play Key Role.” The article highlights their argument that, after two decades primarily focused on counterterrorism and direct-action missions during the Global War on Terror, today’s peer and […]

The post Starling-Daniels and Luetkefend quoted in WMAL article titled “In Great Power Competition, Special Ops to Play Key Role” appeared first on Atlantic Council.

]]>

On May 3, Forward Defense director Clementine Starling-Daniels and assistant director Theresa Luetkefend were quoted in a WMAL article titled “In Great Power Competition, Special Ops to Play Key Role.” The article highlights their argument that, after two decades primarily focused on counterterrorism and direct-action missions during the Global War on Terror, today’s peer and near-peer competition demands a broader application of US special operations forces’ core activities.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Starling-Daniels and Luetkefend quoted in WMAL article titled “In Great Power Competition, Special Ops to Play Key Role” appeared first on Atlantic Council.

]]>
The India-Pakistan crisis shows Washington that it must stop Iran’s nuclear rise https://www.atlanticcouncil.org/blogs/new-atlanticist/the-india-pakistan-crisis-shows-washington-that-it-must-stop-irans-nuclear-rise/ Mon, 12 May 2025 19:40:56 +0000 https://www.atlanticcouncil.org/?p=846397 The fighting in South Asia reminded Washington of the global stakes of nuclear crises. Those stakes are why the United States must prevent Iran from developing nuclear weapons.

The post The India-Pakistan crisis shows Washington that it must stop Iran’s nuclear rise appeared first on Atlantic Council.

]]>
The India-Pakistan crisis, which severely escalated last week, serves as a critical lesson for the United States’ nuclear negotiations with Iran.

This showdown between countries that each possess approximately 170 nuclear warheads has been fueled by decades-long disputes over Kashmir and historical enmity. It unfolded following a terrorist attack on April 22 that killed twenty-six, mostly Indian civilians. India attributed the attack to Pakistan-based militants and last week responded with drone strikes, missile exchanges, and a significant airstrike on Pakistan’s Nur Khan air base, raising Pakistani fears that India would launch a decapitation strike on its nuclear command.

On May 8, US Vice President JD Vance asserted that the conflict was “fundamentally none of our business.” But then the United States received an intelligence briefing on Friday, one that likely highlighted grave developments such as, potentially, intercepted communications or troop mobilizations. Within twenty-four hours, Vance and Secretary of State Marco Rubio were compelled by a fear that the crisis could go nuclear to engage directly with Indian Prime Minister Narendra Modi and Pakistani leaders to secure a cease-fire. India and Pakistan agreed to that cease-fire on Saturday, although both sides have since issued accusations that the truce had been violated.

This rapid shift from Vance’s isolationist rhetoric to high-stakes diplomacy demonstrates the global stakes of nuclear crises and the impossibility of dismissing them as regional concerns. A nuclear exchange would devastate any region, disrupt trade routes, spike energy prices, and generate millions of refugees, overwhelming international systems. Radioactive fallout would pose environmental risks far beyond the countries involved, directly impacting US economic and security interests.

Those stakes are why the United States must prevent Iran’s regime from retaining the technological capability to develop nuclear weapons. Allowing Tehran such capabilities risks replicating the perilous dynamics of the South Asian nuclear standoff, with profound global consequences.

Vance’s initial claim that the conflict was “none of our business” ignored these consequences, but the crisis’s rapid escalation forced US action. The Iran nuclear negotiations must internalize this lesson.

Tehran’s regime, with its history of supporting proxy groups such as Hezbollah and the Houthis, has demonstrated a propensity for destabilization, as seen in the 2019 Aramco attack. If Iran retains the technological infrastructure for nuclear weapons, it could leverage the threat of weaponization to escalate regional aggression or actively work clandestinely to develop a weapon, creating a crisis that, like India and Pakistan’s, becomes a global liability.

The South Asian crisis also illustrates how nuclear technology can embolden provocative behavior under the guise of deterrence. India’s retaliation for the April 22 attack, which it blamed on Pakistan, and Pakistan’s counterstrikes reflect a cycle of escalation enabled by mutual nuclear capabilities. Despite Vance’s hope that the conflict would not “spiral into a broader regional war or, God forbid, a nuclear conflict,” the rapid deterioration necessitated US intervention.

Iran poses an even greater risk. With nuclear technology, Tehran could intensify proxy operations—Hezbollah targeting Israel or the Houthis disrupting Red Sea shipping—confident that its potential nuclear arsenal deters retaliation. This could spark a regional arms race, with Saudi Arabia and others pursuing nuclear capabilities, heightening the risk of miscalculation.

The India-Pakistan experience highlights the challenges of managing nuclear-armed states. Decades of diplomacy have failed to resolve their tensions, as mutual distrust and nuclear arsenals perpetuate a fragile stalemate. Iran’s history of evading International Atomic Energy Agency oversight and prolonging negotiations, as seen with the 2015 Joint Comprehensive Plan of Action, suggests similar challenges. The United States must pursue a stringent approach in the negotiations that lie ahead, demanding that Iran dismantle its nuclear weaponization infrastructure, backed by robust verification, sustained sanctions, and a credible military deterrent.

The latest India-Pakistan crisis, triggered by a terrorist attack and propelled to the brink of nuclear conflict, forced Vance to abandon his “none of our business” posture and engage urgently to avert catastrophe. Like it or not, Washington carries a heavy burden in these crises, and that’s why it must ensure Iran cannot develop nuclear weapons—before it’s too late.


Alex Plitsas is a nonresident senior fellow with the Scowcroft Middle East Security Initiative at the Atlantic Council’s Middle East programs. He leads the initiative’s Counterterrorism Project. He is currently a principal and industry director at Providence Consulting Group for aerospace, defense, and high-tech electronics.

The post The India-Pakistan crisis shows Washington that it must stop Iran’s nuclear rise appeared first on Atlantic Council.

]]>
What will Labor’s landslide mean for Australia’s foreign policy? https://www.atlanticcouncil.org/blogs/new-atlanticist/what-will-labors-landslide-mean-for-australias-foreign-policy-albanese/ Wed, 07 May 2025 21:28:02 +0000 https://www.atlanticcouncil.org/?p=845296 While Australian voters clearly rejected the Trump administration, both the country’s leaders and electorate still support close US ties.

The post What will Labor’s landslide mean for Australia’s foreign policy? appeared first on Atlantic Council.

]]>
CANBERRA—It’s been five months since US President Donald Trump was elected to a second term, but it felt at times as if he was a candidate in Australia’s election on May 3, as well. During the campaign, Trump cast a long shadow over both the progressive Labor Party Prime Minister Anthony Albanese and conservative Liberal-National Coalition Opposition leader Peter Dutton.

Labor’s resounding election victory is now being viewed as a mandate for the sensible center of Australian politics and a rejection of Trump-style politics in Australia. One Australian political commentator saw the results as rebuffing “bunyip Trumpism,” a reference to a mythical Aboriginal creature that inhabits waterholes, which is colloquially used to describe something that is seen as an imposter or pretender. But this election was a rejection of not just hard-right policies but also of the hard left. The Australian Greens Party ran a campaign on cost-of-living measures but also identity politics, Gaza, and anti-Israel sentiment. The party lost two of its previous four lower house seats, while Adam Bandt, the party leader, lost his seat. The party made no gains in the Senate, and its hopes of a “Greenslide” were demolished.

Labor now looks set to claim up to ninety of the 150 seats in the House of Representatives, as well as up to three additional senators. The conservative opposition looks set to be reduced to forty seats or less in the House.

But while Australian voters made clear their rejection of Trump, they still are remarkably pro-United States. The Albanese government will have to balance those two notions as it maps out its foreign policy in the months ahead.

How Labor won

Albanese is the first Australian prime minister to be re-elected since John Howard in 2004, and he is the first premier in one hundred years to increase their party’s majority after the first term. Albanese is now set to lead the largest Labor majority in history. The scale of Labor’s election win almost guarantees the party a third term in government in three years’ time. Meanwhile, the conservative coalition was defeated so soundly that even Dutton lost his parliamentary seat, leaving the conservative opposition leaderless and rudderless. 

But this was not a pre-ordained outcome. From late 2024 through early this year, Dutton’s coalition was ahead in the opinion polls. Albanese and his government were seen to be struggling in the face of cost-of-living pressures and global uncertainty. Media outlets were calling the election a tight race, predicting a minority Labor government that would be dependent on a large cross bench of independents and Greens in the House of Representative and the Senate in order to govern.

But Dutton’s coalition made significant missteps in the five-week campaign, including several proposals reminiscent of Trump policies. Dutton failed to develop policies to win back seats lost at the last election to the center-right independents known as the Teals. He proposed unpopular policies on nuclear power, healthcare, and cost-of-living relief. Moreover, Dutton proposed massive cuts to public service jobs, which echoed the Trump administration’s Department of Government Efficiency (DOGE). A key moment for the campaign was when Jacinta Nampijinpa Price, a controversial conservative senator, vowed to “make Australia great again,” and accused the media of being “Trump-obsessed.”

These nods to Trump policies and slogans did the conservative coalition no favors. Since the beginning of Trump’s second term, Lowy Institute polling has recorded that Australians’ trust in the United States to act responsibly in the world fell by 20 percent, with only 36 percent of the public expressing any level of trust. Almost two thirds of the public (64 percent) say they hold “not very much” trust (32 percent) or no trust “at all” (32 percent) in the United States to act responsibly. Australians widely disapprove of several aspects of Trump’s policy agenda, including his proposal for a Ukraine peace deal that would cede territory to Russia (74 percent) and using tariffs to pressure other countries (81 percent). A majority of Australians also oppose the United States withdrawing from the World Health Organization (76 percent) and exiting from international climate change agreements (74 percent). 

What will Labor do with this mandate?

The results leave the Labor Government with a strong mandate domestically and internationally. Albanese will likely continue with his steady, incremental reform agenda at home and abroad, focused on stability and pragmatism. Foreign policy was a carefully crafted balance among deepening the alliance with the United States; engaging in regional minilateralism, focused on Southeast Asia, Pacific Island nations, and India; and deepening security relations with Japan, both bilaterally and trilaterally with the United States.

Albanese’s brand of pragmatism will continue to drive how he engages with Trump and the United States. His government has refused to respond with reciprocal tariffs on the United States and has focused on dealing with the US president on the basis of Australia’s advantages in critical minerals, the US trade surplus with Australia, and a broader commitment to international free trade. Support for the Australia-UK-US (AUKUS) security partnership was bipartisan in the campaign. Defense spending is set to rise, even if modestly, and the alliance remains core to Australian strategy. One of the key features of Labor’s last terms in office were advances in US force posture in Australia and the alignment of strategic posture around denial and deterrence in the Indo-Pacific, which will continue to be a core focus over the next three years.

In addition, key areas such as shipbuilding, nuclear-powered submarine production, defense industrial collaboration, and the manufacture of guided weapons are priorities both of the Labor government and the Trump administration. This provides a strong foundation for defense cooperation. However, Australia and the United States diverge on key issues around international trade and the rules-based international order. This means there will be points of friction, and the Albanese government should be expected to carefully and tactfully point out policy differences on these issues.

Crucially, Australian dislike of the Trump administration should not be mistaken for antipathy toward the United States. The same Lowy Institute poll that showed a rejection of Trump’s policies shows that the Australian public is rock-solid in its support of the United States. Eighty percent of Australians continue to support the alliance with the United States (only a 3 percent drop from 2024) and they are evenly split on Trump’s demand that allies spend more on defense.

Labor will continue to focus on the Indo-Pacific, working closely with the United States and its regional allies and partners. It will keep dealing cautiously with, and balancing against, China and doubling down on ties with Southeast Asia, Pacific Island nations, Japan, India, and South Korea. With Albanese ascendant, expect more of the steady hand of Australia’s center-left government over the next three years rather than any policy radicalism.


Peter J. Dean is a nonresident senior fellow at the Atlantic Council’s Indo-Pacific Security Initiative, within the Scowcroft Center for Strategy and Security, and director of foreign policy and defense at the United States Studies Centre at the University of Sydney.

The post What will Labor’s landslide mean for Australia’s foreign policy? appeared first on Atlantic Council.

]]>
To fund US military modernization, Congress needs to pass on-time annual defense budgets https://www.atlanticcouncil.org/blogs/new-atlanticist/to-fund-us-military-modernization-congress-needs-to-pass-on-time-annual-defense-budgets/ Tue, 29 Apr 2025 20:26:53 +0000 https://www.atlanticcouncil.org/?p=843621 The longer Congress relies on continuing resolutions to fund the military, the further the Pentagon will drift from its defense spending goals.

The post To fund US military modernization, Congress needs to pass on-time annual defense budgets appeared first on Atlantic Council.

]]>
On April 7, US President Donald Trump and US Defense Secretary Pete Hegseth made clear their ambitions: a one-trillion-dollar budget by fiscal year (FY) 2026 to fund a modern, agile, and globally competitive military. This is an ambitious goal, but if current funding trends hold, that future is far from guaranteed. Despite ongoing threats and bold declarations from the White House and the Pentagon, defense modernization is being squeezed by flat budgets, rising personnel costs, and a Congress that for more than a quarter century has failed to deliver predictable, on-time annual appropriations, which are essential for sustained military investment.

Look at what happened as recently as last month. In early March, Congress passed the Full-Year Continuing Appropriations and Extensions Act, 2025, a stopgap measure that locks the Pentagon into last year’s funding levels with only a modest $6.1 billion—or 0.7 percent—increase in defense funding, bringing the total to $892.5 billion. However, after accounting for inflation and rising personnel costs, this amounts to a cut in real terms. The total also falls more than $2.5 billion short of the Biden administration’s earlier $895.2 billion request for FY 2025.

Trump and Hegseth have floated a one-trillion-dollar topline for FY 2026, with congressional Republicans backing projections that hit that mark by 2031. But projections alone won’t modernize the force. The longer Congress relies on continuing resolutions, the further the Pentagon is likely to drift from the trillion-dollar goal.

Talk big, fund small

The biggest casualty of flat budgets is modernization. Of the $6.1 billion increase under the FY 2025 continuing resolution, more than $5.6 billion is consumed by rising personnel costs—including a 4.5 percent military pay raise and a 10 percent bump for junior enlisted. While these expenses are core to sustaining force readiness and quality of life for junior enlisted military personnel, they leave scant room for investment in next-generation weapon systems, shipbuilding, and advanced technology—all of which are needed to counter and deter future global threats.

Moreover, modernization and procurement budgets took hits in the latest continuing resolution—down $7.1 billion and $4.6 billion, respectively, compared to FY 2024. This isn’t a future-proofing strategy. It’s triage. And it reinforces a hard truth: the Pentagon is being forced to choose between readiness now and capabilities tomorrow.

As a result of this approach by Congress, a chasm has emerged between what the Pentagon says it needs and what Congress has been able to fund. Even with increased flexibilities granted under this continuing resolution, including fewer restrictions on program-level spending, the Pentagon cannot modernize on cruise control without deliberate and sustained investment. Without real growth in the defense topline, any flexibility becomes a license to reshuffle limited dollars, not expand capabilities.

Strategic signals, budget headwinds

Additionally, the Trump administration’s early moves—deployments to the southern border and near the Panama Canal, counter-narcotics operations, and a reorientation of posture toward homeland defense and regional security initiatives—highlight a shift in defense priorities. But these actions are being underwritten by a budget that isn’t built for strategic transformation.

This spring, the Trump administration’s FY 2026 request is expected to better reflect the new administration’s priorities, since the current budget was mostly shaped by the previous administration and major changes take time to fully appear. One key area to watch is its proposed $50 billion reallocation plan, redirecting funds from “noncritical” areas toward defense programs such as nuclear modernization, missile defense, drone technology, autonomous weapons, and cybersecurity. The Trump administration likely considers these activities necessary to bolster border security and strengthen US military capabilities in response to perceived threats to the homeland.

Regardless of the merits of using defense dollars and personnel for homeland security efforts, without a significant increase in overall funding, the administration will face tough choices between delivering on these priorities and meeting modernization and readiness goals.

The path forward: Congress holds the key

None of this is sustainable without a timely and predictable appropriations process. Even after making tough trade-offs, the Department of Defense cannot sustain modernization, support military pay raises, and reinvigorate domestic policy initiatives without meaningful real-term growth in its overall budget topline. 

While continuing resolutions offer short-term stability, they erode long-term planning and procurement. They lock in outdated funding priorities, stall new projects and procurement efforts before they begin, and limit the Defense Department’s capacity to invest in multi-year efforts that benefit from future financial predictability. When the Department of Defense has to begin the fiscal year without an annual appropriations bill in place, it can lead to training disruptions due to uncertainty over available resources, as well as deferred equipment and facility maintenance, which can cause backlogs and increase long-term costs. It can also cause delays in awarding new contracts, affecting industrial base stability and workforce planning. Continuing resolutions also lead to cost inefficiencies from operating under constrained funding and require higher costs to “catch up” later. These stopgap measures also risk a gradual degradation of military readiness from the inability to execute planned operations, training, and maintenance. Even omnibus bills, often seen as a compromise, fall short of the predictability and purchasing power that full-year appropriations—enacted before the start of a fiscal year—offer. Relying on omnibus bills creates uncertainty for long-term modernization efforts and reduces the Defense Department’s ability to plan, start contracts, and invest early in the fiscal year.

The Pentagon needs more than authority and increased flexibility—it needs actual dollars. Timely appropriations passed by Congress are essential to making that possible. Yet persistent delays have become the norm rather than the exception. Without consistent, meaningful, and sustained funding, modernization will remain an ambition rather than a battlefield reality. The one-trillion-dollar vision for the defense budget may serve short-term political goals, but absent decisive and urgent action by Congress, the numbers won’t add up.

One important step Congress can take each year is to pass the annual defense appropriations bill on time, fulfilling its constitutional duty to fund essential government programs and defense functions that serve the national interest. A timely and focused appropriations bill would restore predictability to the budget process and enhance the capacity of the defense industrial base. It would also give military leaders the certainty they need to plan, build, and make more effective long-term investments across administrations.

Congress holds the keys. The question is whether it has the political will to turn them.


Jongsun A. Kim is a nonresident senior fellow in the Forward Defense initiative of the Atlantic Council’s Scowcroft Center for Strategy and Security and a former deputy comptroller for budget and appropriations affairs at the Department of Defense.

The post To fund US military modernization, Congress needs to pass on-time annual defense budgets appeared first on Atlantic Council.

]]>
Ullman in the Hill calls for a “fundamental review” of US national security strategy  https://www.atlanticcouncil.org/insight-impact/in-the-news/ullman-in-the-hill-calls-for-a-fundamental-review-of-us-national-security-strategy/ Fri, 25 Apr 2025 17:51:37 +0000 https://www.atlanticcouncil.org/?p=843136 On April 21, Atlantic Council Senior Advisor Harlan Ullman published an op-ed in the Hill on the need to update US strategic documents to reflect the geopolitical moment and ensure the United States can effectively respond to adversaries. He argues that US leadership should “[start] from first principles and [understand] exactly what threat China or […]

The post Ullman in the Hill calls for a “fundamental review” of US national security strategy  appeared first on Atlantic Council.

]]>

On April 21, Atlantic Council Senior Advisor Harlan Ullman published an op-ed in the Hill on the need to update US strategic documents to reflect the geopolitical moment and ensure the United States can effectively respond to adversaries. He argues that US leadership should “[start] from first principles and [understand] exactly what threat China or Russia poses before moving to the strategy for countering it.”  

International Advisory Board member

Harlan Ullman

Senior Advisor

The post Ullman in the Hill calls for a “fundamental review” of US national security strategy  appeared first on Atlantic Council.

]]>
Wieslander in the Wall Street Journal https://www.atlanticcouncil.org/insight-impact/in-the-news/wieslander-in-the-wall-street-journal/ Mon, 21 Apr 2025 03:00:00 +0000 https://www.atlanticcouncil.org/?p=862238 On Sunday, April 20, Anna Wieslander, director for Northern Europe was interviewed by the Wall Street Journal on the new Nordic security responses to the threat of Russia in the region. In light of the increased attention to defense and the steadfast support to Ukraine in the Nordic countries, Wieslander argued for “linking our defense […]

The post Wieslander in the Wall Street Journal appeared first on Atlantic Council.

]]>
On Sunday, April 20, Anna Wieslander, director for Northern Europe was interviewed by the Wall Street Journal on the new Nordic security responses to the threat of Russia in the region.

In light of the increased attention to defense and the steadfast support to Ukraine in the Nordic countries, Wieslander argued for “linking our defense industries together” which she means will send a strong signal to Russia.

The post Wieslander in the Wall Street Journal appeared first on Atlantic Council.

]]>
China is militarizing its coast guard against Taiwan. Here’s how Taipei and its allies can respond. https://www.atlanticcouncil.org/blogs/new-atlanticist/china-is-militarizing-its-coast-guard-against-taiwan-heres-how-taipei-and-its-allies-can-respond/ Wed, 16 Apr 2025 10:00:00 +0000 https://www.atlanticcouncil.org/?p=840897 As new evidence emerges about China's long-suspected practice of using its coast guard for military purposes, Taiwan and the US have the tools to push back.

The post China is militarizing its coast guard against Taiwan. Here’s how Taipei and its allies can respond. appeared first on Atlantic Council.

]]>
On April 1, China launched a two-day military exercise against Taiwan. Taiwanese national security officials suggested it was timed to coincide with US Defense Secretary Pete Hegseth’s first trip to the Indo-Pacific since taking office. While the exercise was accompanied by the usual inflammatory and sometimes crude public messaging against Taiwan, it yielded a critical insight about China’s military operations. In describing the People’s Liberation Army (PLA) movements they observed, Taiwan’s Coast Guard disclosed that the Eastern Theater Command exercised operational control over the China Coast Guard (CCG) along with PLA military forces in theater. 

This is a ground-breaking revelation. Beijing generally aims to portray the CCG as a nonmilitary actor despite its legally mandated dual role as both law enforcement and a component of China’s armed forces. This is also significant considering a previous incident in February 2024 in which Taiwan confronted the CCG when the latter was caught executing war-fighting functions against Taiwan under the guise of law enforcement activities. At the time, it was unclear whether this was merely a one-off experimental arrangement or the act of an overzealous CCG officer. It is now clear that the PLA exercises operational control over the CCG and uses the cover of law enforcement to gain military advantage over the United States, Taiwan, and their allies and partners without drawing much public attention.

China’s use of its coast guard for military purposes under the guise of law enforcement poses a threat to Taiwan that requires a strong response from Taipei, as well as the United States and its allies and partners in the region. Countering the CCG’s gray zone activities will require an active response from Taiwan and public messaging that makes clear that certain CCG law enforcement activity is a cover for military activities. It will also require a coordinated response from the US Coast Guard and Washington’s allies to provide deterrence and impose costs on China for using the CCG’s law enforcement cover to threaten Taiwan’s security.

‘White hulls’ in the gray zone

Taiwanese media reported in February 2024 that CCG vessels were identifying Taiwanese vessels and targets and providing real-time precise locations to the PLA for subsequent missile strikes while acting in a law enforcement capacity. Three CCG cutters entered the Western Pacific through the southern tip of the Miyako Strait and turned south until parallel to Taiwan’s east coast before speeding at eighteen to twenty knots eastward directly toward Taiwan. The cutters maintained radio silence, turned off their automatic identification system, and exercised emission control, an unusual precaution generally taken by military vessels, civilian vessels going through conflict zones, or vessels conducting illegal activities. The CCG cutters entered Taiwan’s twenty-four-nautical-mile contiguous zone, a buffer area internationally recognized for identification and interception of unknown vessels, and streaked past Taiwanese military and coast guard vessels sent to intercept them.

Intelligence provided to Taiwan by an undisclosed allied country indicated that these CCG vessels were validating functionalities of China’s Guo Wang, or “state network,” satellite constellation. Guo Wang designates targets for DF-21/DF-26 ballistic missiles supporting future PLA rocket force strikes against both Taiwan and US allied forces operating in the Western Pacific. The vessels only activated their automatic identification system and identified as belonging to the China Coast Guard after they passed the Taiwan Coast Guard’s TCG Nantou and came perilously close to Taiwan’s territorial waters.

Most countries’ coast guards, including those of the United States, China, and the Philippines, identify as both law enforcement and military, thus sailing in gray waters under international law. However, there is still a widely accepted norm that “white hull” vessels conducting law enforcement activities and promoting stability at sea are treated differently than “gray hull” warships safeguarding individual countries’ national interests. White hull activities near another country’s territorial waters are generally received with more goodwill and elicit less provocative reactions. China understands this and has been actively exploiting this divide since at least 2016.

The type-818 CCG vessels in the 2024 incident were 3,800-ton cutters built on People’s Liberation Army Navy (PLAN) 054A-class frigate hulls, equipped with 76 mm guns and the standard PLAN communication suite—essentially a “gray hull” in all but name. Through operational control over CCG, the PLA can use the cover of a “white hull” law enforcement facade to conduct exclusively “gray hull” military activities that would otherwise receive much stronger pushback.

How China has militarized its coast guard

Beijing reorganized the CCG in 2018, moving it from China’s State Oceanic Administration to the People’s Armed Police. The People’s Armed Police is a paramilitary that reports directly to the Central Military Commission, China’s highest military authority. The CCG’s placement under the Central Military Commission’s authority is an unusual arrangement. In the United States, for example, although the US Coast Guard is a branch of the armed forces, its chain of command runs through the Department of Homeland Security, not the Department of Defense, unless it is otherwise directed by the president or Congress during wartime. Taiwan’s Coast Guard administration also follows a similar logic.

Since the 2018 reorganization, the CCG has used its law enforcement facade to great effect in gray zone operations against Taiwan, the Philippines, and other US regional allies and partners. In the South China Sea, the CCG has been using its vessels, which include the largest coast guard cutters in the world, to “shoulder,”  or attempt to ram, other countries’ coast guard vessels and force them to divert course. All the while, these vessels use their white hull cover to justify these incidents as law enforcement actions.

To protect this useful subterfuge, Beijing has been careful to disaggregate exercises conducted by the PLA and those conducted by the CCG against Taiwan since the Chinese military exercises around Taiwan that came in response to then US House Speaker Nancy Pelosi’s visit to the island in 2022. This means careful messaging from the official Weibo accounts of both the PLA’s Eastern Theater Command and the CCG. While exercises from the two entities seemed to take place within similar and sometimes overlapping timeframes, the Eastern Theater Command and CCG have different names for their respective exercises and take care to deconflict areas of operation.

Observers have long suspected operational coordination between the PLA and the CCG, but to date, only circumstantial evidence has linked the organizations. It is known that the PLA coordinates some of China’s gray zone operations through the Eastern Theater Command’s Joint Operations Command Center (JOCC). Previous concurrent CCG exercises with PLA in the Taiwan Strait have not provided sufficient direct evidence of operational coordination by observing PLAN and CCG movements alone, though international reporting sometimes characterizes the two entities’ actions as a combined exercise.

The revelation came from Taiwan’s Coast Guard administration, which stated on April 1 that the CCG, while ostensibly law enforcement, operates under the control of military theater commands. In the case of exercises against Taiwan, this would mean the Eastern Theater Command’s JOCC. Additionally, for the first time since the exercises in response to Pelosi’s visit in 2022, the CCG conducted joint operations with the PLA east of Taiwan, confirming its role in exercises for a potential joint quarantine/blockade against Taiwan.

Consequently, the April exercise indicates that the CCG is operationally controlled by PLA. And the 2024 incident provided an example of China unilaterally escalating cross-strait tension by conducting military operations with ostensibly law enforcement white hull vessels against Taiwan during peacetime, without even the facade of declaring a military exercise. These developments have far-reaching implications beyond garden-variety gray zone operations. These practices are highly provocative and require strong but measured responses from the United States and Taiwan, as well as their partners and allies in the region.

How the US and Taiwan should respond

To stop Beijing from gaining additional military advantage under the guise of law enforcement activities, Taiwan must combine a proper active response with strong public messaging. Taipei’s active responses must be commensurate with the nature of each incident—dispatching military assets to intercept and guard against the CCG’s military activities against Taiwan while leaving law enforcement issues for Taiwan’s Coast Guard. This will create significant challenges for the Taiwan Navy and Coast Guard’s existing command-and-control, but it is essential to counter China’s use of the CCG as cover to gain military advantage over Taiwan. Taiwan’s public messaging must adequately establish this. Taiwan should present the public with credible evidence, including intercepted signals intelligence, electro-optical recordings, and the exact courses and speeds of offending CCG vessels.

Meanwhile, the United States and its allies and partners must impose additional costs for the CCG’s clandestine activity. Joint patrols led by the US Coast Guard and the coast guards of other allied nations can form a credible deterrent against China’s militarization of law enforcement activities. The US Coast Guard already extensively collaborates with the Taiwan Coast Guard. A joint patrol within Taiwan’s exclusive economic zone or even within the twenty-four nautical mile contiguous zone, modeled after the US Coast Guard’s agreement with Taiwan’s diplomatic ally Palau, can impose significant costs for the CCG should it decide to engage in provocative behaviors like the February 2024 missile targeting incident. Additional support from Japan or even the Philippine Coast Guard, such as joint patrols, could lend further legitimacy to counter the militarization of the CCG. Taken together, these measures can send a strong message to Beijing and mark clear redlines against the CCG’s participation in the PLA’s gray zone activities.


Kitsch Liao is an associate director of the Atlantic Council’s Global China Hub. Previously, he worked in the US Congress, in diplomatic postings, and as a cyber intelligence analyst for the private sector.

The post China is militarizing its coast guard against Taiwan. Here’s how Taipei and its allies can respond. appeared first on Atlantic Council.

]]>
Daryl Press interviewed for ABC News article on B-2 nuclear-capable bombers https://www.atlanticcouncil.org/insight-impact/in-the-news/daryl-press-interviewed-for-abc-news-article-on-b-2-nuclear-capable-bombers/ Thu, 10 Apr 2025 18:06:36 +0000 https://www.atlanticcouncil.org/?p=840064 On April 3, Forward Defense nonresident senior fellow Daryl G. Press was interviewed for an ABC News article entitled, “Satellite images show multiple US B-2 nuclear-capable bombers deployed to Indian Ocean.” In the article, Press was quoted as saying, “The movement of the aircraft to Diego Garcia definitely sends a signal to Iran about the extent […]

The post Daryl Press interviewed for ABC News article on B-2 nuclear-capable bombers appeared first on Atlantic Council.

]]>

On April 3, Forward Defense nonresident senior fellow Daryl G. Press was interviewed for an ABC News article entitled, “Satellite images show multiple US B-2 nuclear-capable bombers deployed to Indian Ocean.” In the article, Press was quoted as saying, “The movement of the aircraft to Diego Garcia definitely sends a signal to Iran about the extent to which they are in jeopardy, and the extent of seriousness the Trump administration feels with regard to its various demands.”

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Daryl Press interviewed for ABC News article on B-2 nuclear-capable bombers appeared first on Atlantic Council.

]]>
Lt Col Edward Brady, USAF, commentary published by War on the Rocks https://www.atlanticcouncil.org/insight-impact/in-the-news/lt-col-edward-brady-usaf-commentary-published-by-war-on-the-rocks/ Tue, 08 Apr 2025 19:02:57 +0000 https://www.atlanticcouncil.org/?p=839686 On April 4, Forward Defense Senior Air Force Fellow Lieutenant Colonel Edward Brady published a commentary on War on the Rocks, entitled, “Greenland’s Military Possibilities for the United States.” The article argues that Greenland is a critical strategic asset for US Arctic defense and global power projection and recommends cost-effective investments in surveillance, infrastructure, and […]

The post Lt Col Edward Brady, USAF, commentary published by War on the Rocks appeared first on Atlantic Council.

]]>

On April 4, Forward Defense Senior Air Force Fellow Lieutenant Colonel Edward Brady published a commentary on War on the Rocks, entitled, “Greenland’s Military Possibilities for the United States.” The article argues that Greenland is a critical strategic asset for US Arctic defense and global power projection and recommends cost-effective investments in surveillance, infrastructure, and force deployment to counter growing threats from Russia and China.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Lt Col Edward Brady, USAF, commentary published by War on the Rocks appeared first on Atlantic Council.

]]>
Ullman in the Hill urging vigilance in national security communication  https://www.atlanticcouncil.org/insight-impact/in-the-news/ullman-in-the-hill-urging-vigilance-in-national-security-communication/ Mon, 31 Mar 2025 20:05:35 +0000 https://www.atlanticcouncil.org/?p=837478 On March 31, 2025, Atlantic Council Senior Advisor Harlan Ullman published an op-ed in the Hill on the potential implications of national security officials using Signal for official communication and planning. He argues that US allies will take the recent Signal breach “very, very seriously,” which could disrupt intelligence sharing.   

The post Ullman in the Hill urging vigilance in national security communication  appeared first on Atlantic Council.

]]>

On March 31, 2025, Atlantic Council Senior Advisor Harlan Ullman published an op-ed in the Hill on the potential implications of national security officials using Signal for official communication and planning. He argues that US allies will take the recent Signal breach “very, very seriously,” which could disrupt intelligence sharing.   

International Advisory Board member

Harlan Ullman

Senior Advisor

The post Ullman in the Hill urging vigilance in national security communication  appeared first on Atlantic Council.

]]>
Chiang, Esper, and Fox published in DefenseNews and C4ISRNET on software-defined warfare https://www.atlanticcouncil.org/insight-impact/in-the-news/chiang-esper-fox-defensenews-c4isrnet-commission-on-software-defined-warfare-report/ Fri, 28 Mar 2025 16:00:00 +0000 https://www.atlanticcouncil.org/?p=837221 On March 28, Mung Chiang, Mark Esper, and Christine Fox published an op-ed highlighting key ideas from the final report of Forward Defense’s Commission on Software-Defined Warfare.

The post Chiang, Esper, and Fox published in DefenseNews and C4ISRNET on software-defined warfare appeared first on Atlantic Council.

]]>

On March 28, Mung Chiang, Mark Esper, and Christine Fox published an op-ed highlighting key ideas from the final report of Forward Defense’s Commission on Software-Defined Warfare. Entitled, “America’s arsenal of democracy needs a software renaissance,” the piece published in DefenseNews and C4ISRNET underscores the critical role of software in future conflicts, “the ability to collect, process and act on data faster than the adversary is critical in prevailing in future conflicts.”

The authors emphasize the Commission’s recommendations, including investing in artificial intelligence enablers, mandating the creation of enterprise data repositories, and shifting toward commercial software acquisition. They argue that by prioritizing data management and commercial software acquisition, the Department of Defense can achieve immediate improvements while laying the groundwork for long-term strategic success.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

Forward Defense’s Commission on Software-Defined Warfare aims to digitally transform the armed forces for success in future battlefields. Comprised of a distinguished group of subject-matter and industry commissioners, the Commission has developed a framework to enhance US and allied forces through emergent digital capabilities.

The post Chiang, Esper, and Fox published in DefenseNews and C4ISRNET on software-defined warfare appeared first on Atlantic Council.

]]>
Peru’s crime wave: A populist opening or a chance for reform? https://www.atlanticcouncil.org/blogs/new-atlanticist/perus-crime-wave-a-populist-opening-or-a-chance-for-reform/ Thu, 27 Mar 2025 20:20:34 +0000 https://www.atlanticcouncil.org/?p=836647 Solving Peru’s security crisis will require institutional reforms that combat political corruption and address the root causes of crime.

The post Peru’s crime wave: A populist opening or a chance for reform? appeared first on Atlantic Council.

]]>
On March 21, Peruvians took to the streets to protest government inaction against a surging crime wave. The recent assassination of Paul Flores, a famous cumbia singer, in the capital underscored the deepening security crisis afflicting Peru and its Andean neighbors. News of extortion rackets and contract killings have become routine headlines, and with the 2026 general election approaching, public safety now tops voters’ concerns. Early political campaign ads are already flocking the streets of Lima with candidates proudly presenting themselves as the “Peruvian Bukele” in reference to the Salvadorian president and his heavy approach to crime.

In response to the crime wave, the government on March 17 declared its third state of emergency in less than a year, suspending basic liberties to allow police to make arrests without judicial orders. Yet, while authorities focus on crackdowns against violent crime, they risk ignoring the deeper cause of the crisis: a decade of institutional decay marked by jailed presidents and pervasive corruption.

In the absence of broad-based political reforms and a sincere effort to address corruption as a root cause, Peru might soon fall into the same trap it did in 2021. Amid the devastating COVID-19 pandemic, voters elected populist Pedro Castillo as president. Castillo fed off the discontent against the state and sought to break Peru’s democratic order with an unsuccessful “self-coup,” for which he was later impeached and imprisoned. As Peru enters a new electoral cycle amid a crime wave, candidates must prioritize meaningful institutional reforms over hollow tough-on-crime rhetoric. Otherwise, the country will remain trapped in a cycle in which corruption breeds crime and democracy hangs by a thread.

As in neighboring Ecuador and Chile, the current crime wave has ground Peru to a halt. Between 2019 and 2024, reported extortions increased sixfold, and in 2025 every third Peruvian reports knowing a victim of extortion, many of whom are small business owners. Homicides, too, have doubled since 2019. And in January of this year alone, there were 203 percent more homicides than in January of 2017.

Behind these alarming figures hide strengthened transnational criminal organizations, such as the Tren de Aragua, as well as a myriad of other drug trafficking organizations, mafia syndicates, and gangs that alternately cooperate, collude, and compete for the control of illegal activities. While drug trafficking, homicides, and extortions are terrorizing Peru’s populous coastal cities, Peru’s Amazon has been ravaged by illegal gold mining, where illegal miners have made record profits as the value of gold has soared in international markets. In 2025, over 75 percent of Peruvians report being scared when leaving their homes.

While transnational criminal organizations are the actors behind the current crime wave, it is weak state capacity that has allowed the crime to permeate. The Peruvian sate’s capacity to respond has been impaired by political corruption, often influenced by criminal actors themselves. By 2024, 67 of 130 Congress members (a simple majority of Peru’s legislature) were under criminal investigation. When prosecutors charged Congress members of allegedly being part of criminal organizations, Congress passed a law narrowing the definition of “organized crime,” hindering investigations into corruption and extortion. President Dina Boluarte did not veto this bill, and it became law in August 2024. (Congress later reinstated extortion under the definition of organized crime but left many corruption offenses excluded.) Congress also passed a law in in September 2024 that placed a larger role of the police in criminal investigations, taking functions away from the Attorney General’s Office, which legal experts warned would weaken investigative efficiency. And Boluarte has weakened the Attorney General’s Office as she herself is being investigated for corruption. As a result, the state’s ability to prosecute crimes has been stymied by public officials seeking to blunt investigations against themselves.

Peruvians will vote next year amid a crisis that the state is incapable of protecting its citizens from. The parallels between the 2021 and 2026 elections are clear. In 2021, voters were enraged by Peru’s world-highest per capita COVID-19 death rate and a scandal in which political elites received vaccines before the public. Peruvians’ frustration propelled Castillo—then a little-known populist with no governing plan—to victory. After leading a government ridden with corruption, Castillo and his advisors sought to break the constitutional order with a “self-coup.” Peruvian democratic institutions held up and their attempt remained short-lived.

Now, heading into 2026, voters face a new crisis: a crime wave and a state failing to ensure public safety. This climate is fertile ground for populist promises of a mano dura, or “iron fist,” approach to combating crime. But any real solution must also tackle crime’s institutional roots. Candidates should promote a comprehensive political reform that reduces organized crime’s influence in the country’s political bodies. This reform should include steps that make running for office more difficult for those charged with corruption. In addition, the Attorney General’s Office should be depoliticized and promote a new cohort of competent, apolitical prosecutors and judges.

At the same time, the United States and other partner nations must recognize the risk that corruption poses to the survival of Peruvian democracy. The US State Department should designate Peruvian public officials engaged in corruption and prevent them from entering the United States, an action it took this month against former Argentine President Cristina Fernandez de Kirchner, who was convicted of corruption charges in Argentina. Equally critical is addressing other root causes of crime—poverty, inequality, and lack of education—which have made Peru’s youth vulnerable to recruitment by criminal gangs in the first place.

Politicians promising to be the “Peruvian Bukele” may garner attention. But leaving the institutional causes of crime unaddressed will only deepen Peru’s democratic crisis while doing little to curb crime.


Martin Cassinelli, a Peruvian native, is an assistant director at the Adrienne Arsht Latin America Center of the Atlantic Council.

The post Peru’s crime wave: A populist opening or a chance for reform? appeared first on Atlantic Council.

]]>
Inside Defense reports on the Commission on Software-Defined Warfare final report https://www.atlanticcouncil.org/insight-impact/in-the-news/maher-inside-defense-reports-on-the-commission-on-software-defined-warfare/ Wed, 26 Mar 2025 20:30:00 +0000 https://www.atlanticcouncil.org/?p=836503 On March 26, Theresa Maher of Inside Defense published an article highlighting the key recommendations from Forward Defense’s Commission on Software-Defined Warfare report.

The post Inside Defense reports on the Commission on Software-Defined Warfare final report appeared first on Atlantic Council.

]]>

On March 26, Theresa Maher of Inside Defense published an article highlighting the key recommendations from the final report of Forward Defense’s Commission on Software-Defined Warfare. Entitled Think tankers urge DOD to keep software procurement simple,” the article underscores the Commission’s call for a commercial-first mindset, improved data collection and sharing, and stronger collaboration between the Department of Defense (DoD) and congressional appropriation staffers.

With China outproducing the United States in military hardware, software has become essential to maintaining a competitive edge. Maher highlights the “Davidson Window,” the prediction that China may take military action against Taiwan by 2027, underscoring the urgency behind the Commission’s near-term recommendations. The report outlines how the Pentagon can leverage software practices to enhance and strengthen US defense strategies.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

Forward Defense’s Commission on Software-Defined Warfare aims to digitally transform the armed forces for success in future battlefields. Comprised of a distinguished group of subject-matter and industry commissioners, the Commission has developed a framework to enhance US and allied forces through emergent digital capabilities.

The post Inside Defense reports on the Commission on Software-Defined Warfare final report appeared first on Atlantic Council.

]]>
Ukraine’s growing military strength is an underrated factor in peace talks https://www.atlanticcouncil.org/blogs/ukrainealert/ukraines-growing-military-strength-is-an-underrated-factor-in-peace-talks/ Tue, 25 Mar 2025 21:06:03 +0000 https://www.atlanticcouncil.org/?p=836050 Any discussion on the future course of the war against Russia and the terms of any peace deal must take into account the fact that Ukraine is a now major military power in its own right, writes Serhii Kuzan.

The post Ukraine’s growing military strength is an underrated factor in peace talks appeared first on Atlantic Council.

]]>
Can Ukraine survive without US military aid? Could Kyiv’s European partners potentially fill the gap in weapons deliveries? Policymakers, analysts, and commentators around the world have been wrestling with these questions in recent weeks as they come to terms with US President Donald Trump’s foreign policy pivot away from Europe and his administration’s overtures toward Russia.

While the urgency and importance of this debate cannot be overstated, there has been a tendency to overlook Ukraine’s own agency and the country’s ability to defend itself. It is true that the Ukrainian war effort since 2022 has relied heavily on Western support, but Ukraine’s military has also evolved dramatically over the past three years to become by far Europe’s biggest and most effective fighting force.

Ukraine currently has approximately one million people in arms defending the country against Russia’s invasion. This makes the Ukrainian Armed Forces more than four times larger than Europe’s next biggest military. Ukraine’s troops are also battle-hardened and have unmatched knowledge of the twenty-first century battlefield. Indeed, in many areas, they are now setting the standards for others to follow.

Crucially, Ukraine’s army is backed by a highly innovative and rapidly expanding domestic military-industrial complex that is harnessing the excellence of Ukraine’s prewar tech sector and reviving long neglected Soviet era capabilities. Any discussion on the likely future course of the war against Russia and the terms of any peace deal must therefore take into account the fact that Ukraine is a now major military power in its own right.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

For the past year, international media coverage of Russia’s invasion has tended to create the impression that Putin’s army is slowly but surely grinding forward toward a costly but inevitable victory. The reality is less straightforward.

Russian troops reclaimed the battlefield initiative in early 2024 and have been advancing fairly steadily ever since, but they have only achieved relatively modest territorial gains while suffering record casualties. Analysts estimate that at the current pace, it would take Russia almost a century to complete the conquest of Ukraine.

Viewed from a broader perspective encompassing the entire full-scale invasion, Ukraine’s military performance becomes even more impressive. Since spring 2022, The Ukrainian Armed Forces have succeeded in liberating around half of all the territory seized by the Russian army, and have won a series of key battles in the Kyiv, Kharkiv, and Kherson regions. Russia has been unable to capture and hold a single Ukrainian regional capital, and is still struggling to force Ukrainian troops out of Russia itself following Kyiv’s bold August 2024 cross-border incursion into the Kursk region.

Far beyond the battlefield, Ukraine has also overachieved. In the Black Sea, Ukrainian marine drones have revolutionized naval warfare and forced Putin to withdraw his fleet from Russian-occupied Crimea to the relative safety of Russian ports. Deep inside Russia, long-range Ukrainian drones strike at military assets, logistical hubs, and energy infrastructure with growing frequency.

Ukraine’s resilience owes much to the international military assistance the country has received. However, this support has often been subject to delays and has frequently fallen victim to political considerations that have cost Ukraine dearly. In order to minimize these vulnerabilities, the Ukrainian authorities have prioritized the development of the country’s domestic defense industry.

The results have been striking. In 2025, the overall capacity of Ukraine’s defense industry is expected to reach a new high of $35 billion, up from just $1 billion at the onset of Russia’s full-scale invasion. While this capacity is not yet being fully utilized due to defense budget limitations, Ukraine now produces around one-third of all weapons, ammunition, and equipment used by the country’s armed forces. In critical areas such as drone production, the figure is now close to one hundred percent.

Meanwhile, Kyiv is encouraging international partners to invest in Ukrainian defense sector companies and finance weapons production in Ukraine. A number of countries have already responded by committing large sums and promoting joint projects within the Ukrainian defense industry. This trend is expected to gain pace during 2025 as the US pivot away from Europe fuels increased defense spending across the continent.

Ukraine’s biggest defense industry success has been the development of the domestic drone manufacturing sector. On the eve of the full-scale invasion, the country boasted only a handful of drone producers. The sector has now mushroomed to include over 200 businesses producing millions of drones annually, with output expected to treble during the current year. In order to harness this rapidly growing strike potential and maximize battlefield impact, Ukraine last year established a special branch of the armed forces dedicated to drone warfare.

Ukraine’s emergence as a drone warfare superpower owes much to the country’s strong tech traditions and entrepreneurial spirit. Since 2022, Ukrainian drone developers have proved highly innovative and are now recognized internationally as world leaders in military drone technologies. “Foreign models are like Toyotas now, while Ukrainian drones are Mercedes. Ours are just leagues ahead,” one Ukrainian commander told Ukrainska Pravda recently.

Ukraine now has a formidable arsenal of drones for use on the battlefield, at sea, and for long-range attacks against targets across Russia. The country also has a growing collection of hybrid missile-drones and missiles. President Zelenskyy recently confirmed that Ukraine had carried out an attack with the domestically produced Long Neptune cruise missile for the first time, underlining the country’s growing potential to strike back at Russia. Further innovations are in the pipeline, with domestic missile production expected to increase in the coming months if Kyiv is able to secure the necessary additional funding.

The Ukrainian military still faces a range of major challenges. The biggest issue remains manpower shortages. So far, Kyiv has sought to address mobilization problems by updating training and offering recruits the opportunity to choose the unit they will serve in, but shortfalls persist. A new initiative aimed at potential recruits between the ages of eighteen and twenty-five was launched in February 2025, featuring attractive enlistment packages and one-year service contracts.

There is also no escaping the fact that Ukraine remains dependent on Western support in order to maintain the country’s war effort. While officials in Kyiv have spoken of increasing the share of domestically produced war materials to fifty percent, Ukraine cannot realistically expect to match Russia’s overwhelming advantages in manpower, firepower, industrial capacity, and financing without continued assistance from the West.

Despite these limitations, Ukraine’s growing military strength must be taken into consideration during coming negotiations over a potential compromise peace deal with Russia. While nobody in Kyiv would relish the grim prospect of fighting on without Western assistance, the country is far from defenseless and will not accept a bad peace that places Ukrainian statehood in jeopardy.

Russia made the mistake of underestimating Ukraine in 2022, and has since paid a terrible price. Three years on, there can be little doubt that the Ukrainian army is now the most powerful fighting force in Europe. This military reality will help shape the contours of any future peace deal. It should also guarantee Ukraine’s place at the heart of Europe’s changing security system as the continent adjusts to the new geopolitical realities of an isolationist United States and an expansionist Russia.

Serhii Kuzan is Chairman of the Ukrainian Security and Cooperation Center (USCC). He formerly served as an adviser to the Ukrainian Ministry of Defense (2022-2023) and advisor to the Secretary of Ukraine’s National Security and Defense Council (2014).

Further reading

The post Ukraine’s growing military strength is an underrated factor in peace talks appeared first on Atlantic Council.

]]>
Clarity is power: The Trump administration needs a new US Navy Navigation Plan https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/clarity-is-power-the-trump-administration-needs-a-new-us-navy-navigation-plan/ Fri, 21 Mar 2025 19:39:12 +0000 https://www.atlanticcouncil.org/?p=827924 The US Navy’s current Navigation Plan (NAVPLAN) is an insufficient document. Bruce Stubbs writes that the Navy must embrace the red and identify course corrections and promote greater clarity, specificity, and transparency in its guidance.

The post Clarity is power: The Trump administration needs a new US Navy Navigation Plan appeared first on Atlantic Council.

]]>

We are operationalizing our
 “Get Real, Get Better” mindset.


—Vice Admiral Brendan McLane, US Navy, as quoted in Seapower Magazine, January 16, 2025

During his Naval Postgraduate School speech in May 2022, Admiral William K. Lescher, vice chief of naval operations, explained the Navy’s new “Get Real, Get Better” initiative, which had been announced in the July 2022 Navigation Plan (NAVPLAN). He stated: “We have to self-assess and be our own toughest critics. We need to be honest about our abilities and be fully transparent about our performance. Once we ‘embrace the red,’ we will be able to identify solutions and more realistically predict our mission readiness.”1

The “Get Real, Get Better” mandate must apply to all levels of the Navy including at the strategic level. This Atlantic Council Issue Brief does exactly what Lescher called the Navy to do by critically assessing the Navy’s 2024 overarching strategic planning document: the 2024 Navigation Plan.2 This evaluation embraces the red by identifying course corrections and the need for greater clarity, specificity, and transparency in its guidance.

The short life of the Navy’s 2024 NAVPLAN

Tactical mistakes may kill you today, while operational error may prove fatal in days or perhaps weeks. A[n] error in … strategy may take years to reveal itself in its full horror.


—Colin S. Gray, “Why Is Strategy Different,” Infinity Journal

Admiral Lisa M. Franchetti, the thirty-third chief of naval operations (CNO), published the Navigation Plan for America’s Warfighting Navy 2024 (NAVPLAN) on September 18, 2024.3 This NAVPLAN is already outdated, no longer applicable, and requires replacement.

The inauguration of President Donald J. Trump on January 20, 2025, voided the 2024 NAVPLAN. Trump wants a bigger Navy by building more ships and has congressional majorities to back-up his policies, while the Navy in its NAVPLAN ranks a bigger Navy—what the Navy calls capacity—as its lowest priority. Indeed, the 2024 NAVPLAN clearly states the Navy “will continue to prioritize readiness, capability, and capacity in that order.”4 The twenty-eight-page NAVPLAN devotes a few sentences to express the need for a larger Navy, indicating, however, that it will not happen for over a generation because of insufficient funding and an inadequate industrial base.

During an interview on the January 6, 2025, “Hugh Hewitt Show,” Trump announced his policy to build more ships for the US Navy. He noted that the United States is “sitting back watching” as China rapidly expands its navy, opining that the United States has “suffered tremendously.”5 (Figure 1 displays the trend lines for the size of these two navies.) He said his administration will announce “some things that are going to be very good having to do with the Navy. We need ships. We have to get ships.”6 At his January 14, 2025, Senate confirmation hearing, Peter Hegseth, now secretary of defense, echoed that guidance: “President Trump has said definitively to me and publicly that shipbuilding will be one of his absolute top priorities of this administration. We need to reinvigorate our defense industrial base in this country to include our shipbuilding capacity.7 In addition, Hegseth (in a response to a policy question in this confirmation process) penned that, “Shipbuilding is an urgent national security priority. If confirmed, I will immediately direct the Secretary of the Navy and the Under Secretary of Defense for Acquisition and Sustainment to create a shipbuilding roadmap to increase our capacity.”8 

In his March 4th joint address to Congress, Trump followed through on his January comments made on the “Hugh Hewitt Show.” He announced his plan to revive US naval and commercial shipbuilding by establishing a White House Office of Shipbuilding. With the exception of its purpose—“To boost our defense industrial base” in order to “make [ships] very fast, very soon”—details on how this office would function remain scarce. Regardless, Trump signaled that shipbuilding is a key theme of his administration and a component of his plan to build “the most powerful military of the future.”9

Figure 1: US and Chinese naval force levels: Actual and projected (2000 to 2030)

Source: China Naval Modernization: Implications for U.S. Navy Capabilities, Congressional Research Service, Updated August 16, 2024.

Overview of the Navy’s NAVPLAN

Politicians bear the heaviest blame for a fleet that is 50 ships too small, but the CNO should be explaining the strategic risks and lighting a fire for the funding to arrest the trend.


Wall Street Journal, February 23, 2025.10

NAVPLANs are a series of planning documents that convey the Navy’s most important policies for implementation above all other Navy guidance documents, including the tri-service, unclassified strategies, such as the 2007 A Cooperative Strategy for 21st Century Seapower,11 the 2015 revision of A Cooperative Strategy for 21st Century Seapower,12 and the 2020 Advantage at Sea.13 Each CNO personally authors an unclassified strategic plan—a NAVPLAN—to outline a path for the Navy’s forward progress during their four-year tenure. Modern NAVPLANs have four purposes: explain how the Navy, as part of the Joint Force, intends to deter and defeat threats to US national security; guide prioritizing and rationalizing Navy plans and programs; provide a persuasive framework for Navy funding requests; and source strategic communications to deter threats and reassure allies and partners.14

Crafted ostensibly for an internal Navy audience, these NAVPLANs identify the “biggest challenges to [the Navy’s] forward progress” and provide a “coherent approach to overcoming them.”15 NAVPLANs also have three other audiences: allies and partners, as well as potential adversaries; key decision-makers in the executive and legislative branches of the US government; and national security thought leaders in the public domain (e.g., think tanks, academia, news media, and industry). As discussed below, the latter two audiences are critically important to the Navy. The American public, however, is not a primary audience because its interests typically lag behind emerging security issues.

The 2024 NAVPLAN: Recognize the good

The 2024 NAVPLAN is a remarkable document with three instances of notable clarity. First, the NAVPLAN unequivocally declares a strategic end to achieve “readiness for the possibility of war with the People’s Republic of China by 2027.”16 By specifying China as a primary threat and with a select year for potential conflict, the NAVPLAN provides focus and clarity of purpose. The NAVPLAN zeroes in on China and describes seven priority areas to improve Navy readiness. This is a positive, clear expression of the ranking that past documents lacked. Second, the 2024 NAVPLAN cites and supports former CNO Michael Gilday’s 2022 guidance by calling for 3 percent to 5 percent “sustained budget growth above actual inflation [to] simultaneously modernize and grow the capacity of our Fleet.”17 The NAVPLAN warns, “Without substantial growth in Navy resourcing now, we will eventually face deep strategic constraints on our ability to simultaneously address day-to-day crises while also modernizing the Fleet to enhance readiness for war both today and in the future.”18 Last, this document devotes an entire page correctly highlighting how unmanned ships and aircraft technologies are the “changing character of war,”19 by “pushing asymmetric capability, at lower cost, to state and non-state actors alike.”20 In response, the NAVPLAN focuses the Navy to operationalize “robotic and autonomous systems,” 21commonly known as drones. 22 This clarity of expression is admirable.

The 2024 NAVPLAN: Embrace the red

In a world deluged by irrelevant information, clarity is power.


—Yuval Noah Harari, 21 Lessons for the 21st Century

As mentioned, this issue brief is a critical assessment in the spirit of “Get Real, Get Better.” The 2024 NAVPLAN has major deficiencies that require correction in the next NAVPLAN. Overall, the current NAVPLAN projects an aspirational tone, with its lack of explicit strategic assumptions, risk assessments, and descriptions of the “why” and “how” of achieving its objectives. Specifically, it lacks:

  1. Focus on the Navy’s two most important audiences
  2. Clarity and specificity
  3. Guidance on consequential issues
  4. Frankness
  5. A serious format for a serious document

1. Lack of focus on the Navy’s two most important audiences

The NAVPLAN’s two most critically important audiences have a learned membership, making them substantially different from the American public. They are the key decision-makers in the executive and legislative branches of the US government, and national security thought leaders in the public domain (e.g., think tanks, academia, news media, and industry). The NAVPLAN is the Navy’s only unclassified document to inform these two influential audiences, whose decisions and activities control in large part the funding for the Navy’s force structure, capabilities, and personnel requirements. Indeed, this is why Navy senior leaders make the rounds to Washington think tanks, security forums, and the war colleges and interact with news media to explain the NAVPLAN’s guidance. For this reason—garnering support and advocacy for the Navy’s budget—the information requirements of these two principal audiences eclipse the needs of the other audiences.

In contrast, the American public is a secondary audience because it is a reactive rather than a proactive audience. Most Americans are not reading and reflecting on the nation’s current global security challenges and the need to rearm. Instead, the American public responds to events usually after seeing graphic, tangible evidence. For example, viewing disturbing images of dead American military personnel and destroyed US aircraft during the April 1980 Operation Eagle Claw, a flawed mission that helped to elect Ronald Reagan and generated enormous public support for his defense buildup.

2. Lack of clarity and specificity

We must communicate with precision and consistency, based on a common focus and a unified message.


—General David H. Berger, US Marine Corps, Commandant’s Planning Guidance

The 2024 NAVPLAN has numerous instances of inadequate clarity and specificity. For example, the NAVPLAN directs the Navy to increase its readiness for a possible conflict with China by 2027. The Navy, however, must convey more than readiness for a global war with China. It must also unequivocally transmit that the Navy will deny China their preferred kind of war, destroy23 the Chinese navy, and terminate the war on terms favorable to the United States.24Beijing must feel the force of President Reagan’s famous words: “You lose; we win.”25 The US Navy needs to signal the unquestionable destruction and defeat of Chinese maritime forces. This unabashed expression of lethality was a great strength of the 1980s Maritime Strategy. Moreover, the Navy’s allies and partners must comprehend that the Navy is fully committed and prepared for a potential war with China.

The NAVPLAN omits explanations about why and how the Navy achieves its objectives. Without this explanation and context, the NAVPLAN’s statements are no more than assertions. For example, the document states, “We establish deterrence and prevail in war when we work as part of a Joint and Combined force.”26 There are no further particulars about how the Navy intends to deter and win in a war. This guidance—or rather this assertion—implies that the Navy uses the same approach regardless of who is the enemy. Obviously, the differences between a war with China or Russia are profound, and the Navy’s approaches to deter and win are different. For starters, each adversary has entirely different strategic objectives. Moreover, a war with China occurs in a predominantly maritime theater with few US allies, whereas as a war with Russia occurs in a predominantly continental theater with an effective NATO security alliance. The differences continue, demanding greater specificity than the NAVPLAN’s abstract and broad statements that provide little useful guidance, especially given the ominous, if not dire, warnings by the Commission on the National Defense Strategy.27 This lack of specificity becomes more disturbing in light of the NAVPLAN’s clarion call to prepare for a possible conflict with China in 2027. It is a confounding disconnect.

To paraphrase Dr. Samuel P. Huntington, the eminent American political scientist and author of The Soldier and the State and Clash of Civilizations,28 the Navy’s two principal audiences cannot support the Navy’s requests for funding without pertinent information. As Huntington expounded, they need to know how, when, and where the Navy expects to protect the nation against military threats, such as those now posed by China, Russia, Iran, and North Korea. 

Furthermore, the 2024 NAVPLAN misses another opportunity to communicate the Navy’s relevance to a war with China by not expounding on the implications of a war in a predominantly maritime theater with few US allies. George Friedman, an internationally recognized geopolitical forecaster and strategist on international affairs, recently commented on the Navy’s vital role in this theater. He explained that the “balance of power in the Pacific between U.S. and Chinese naval forces remains key to American hegemony and the alliance that upholds it. In the event of war, more extreme and technological threats remain secondary to the conventional naval threat the U.S. poses to China and China poses to the U.S.”29 The thinking behind his observation is a significant strategic factor that the Navy should have recognized independently and included in its NAVPLAN.

A time-tested military maxim says to tell your boss what you need to get the job done; second, tell your boss the consequences of not receiving what’s needed; and finally, make the best of what you have to accomplish the mission. The NAVPLAN studiously avoids specifying the consequences and the risks. For instance, it states, “Without substantial growth in Navy resourcing now, we will eventually face deep strategic constraints on our ability to simultaneously address day-to-day crises while also modernizing the fleet to enhance readiness for war both today and in the future.”30

What are these “deep strategic constraints” and what are the consequences and the risks caused by these constraints? The NAVPLAN provides no answers. These are critically important omissions and striking deficiencies. The NAVPLAN also states that the Navy is “continuing to advocate for the resources needed to expand all aspects of the Navy’s force structure necessary to preserve the peace, respond in crisis, and win decisively in war.”31 This is a confusing and alarming statement. It appears to indicate that the Navy currently does not have a force structure that can “win decisively in war.”32 If this is what the Navy is communicating, it is not done with transparency.

The 2024 NAVPLAN does explain the effects of an important planning factor that limits the Navy’s options for developing its readiness efforts for a possible war with China in 2027. The Navy has only one more budget cycle—the development of the fiscal year (FY) 2027 budget—to make any meaningful changes to its capabilities in preparation for a 2027 potential conflict. Consequently, the Navy’s existing fleet of ships, in terms of mix and numbers in 2024, is largely the fleet the Navy will have in 2027. This is a significant planning factor as the Navy addresses its readiness for 2027. As Donald Rumsfeld, a former secretary of defense, once famously stated, “As you know, you go to war with the army you have, not the army you might want or wish to have at a later time.”33

The 2024 NAVPLAN has a confusing relationship with a separate, but embedded, Navy initiative called Project 33. The NAVPLAN described this project as an effort to “get more ready players on the field by 2027,”34 and identified seven high-priority mitigations that the Navy needs to accelerate.35 By default, these seven actions became the NAVPLAN’s primary objectives, yet the Navy referred to these objectives as Project 33 and not NAVPLAN objectives, thereby muddying the waters about whether the NAVPLAN or Project 33 is the Navy’s overarching strategic guidance. In fact, Admiral Samuel Paparo, commander of the US Indo-Pacific Command, penned a January 2025 essay titled “Project 33 Is Enabling Joint All-Domain Operations in the Indo-Pacific”—and not “NAVPLAN Is Enabling Joint All-Domain Operations in the Indo-Pacific.” He wrote numerous sentences beginning with Project 33 such as “Project 33’s vision to provide more munitions will. . . ”36 The lack of clarity between these documents only confuses the Navy’s two principal audiences.

The harmful effects of the NAVLAN’s lack of clarity and specificity are compounded by a similar set of deficiencies in higher-order national guidance. The Commission on Planning, Programming, Budgeting, and Execution (PPBE) Reform reported in March 2024 that the National Defense Strategy (NDS) was “not designed to be sufficiently specific enough to guide the programming phase of PPBE.” The commission’s report also stated that the Defense Planning Guidance was a “consensus-driven document that does not make hard choices, is overly broad, and lacks explicit linkages to prioritized goals, timeframes, risk assessments, and resource allocations.” The PPBE Reform report further stated these deficiencies did not provide “top-down guidance needed during the programming phase of PPBE.”37 Inadequate and incomplete guidance, by the Defense Department and the Navy, undermines effective strategic and force-planning decision-making.

3. Lack of guidance on consequential issues

The 2024 NAVPLAN falls short of addressing critical high-level issues, leaving its two principal external audiences with an insufficient understanding of the Navy’s resource requirements. Given that the NAVPLAN is a prime tool for strategic communications and is the sole document to express the Navy’s way ahead to its external audiences, the scant commentary on key issues represents a missed opportunity for the Navy.

Key issue: A larger navy

While the 2024 NAVPLAN acknowledges the need for an on-the-record requirement for 381 crewed ships,38 it did not explain why or when the Navy needs these ships. In 2025, the Navy has 297 battle force ships,39 with a shortfall of eighty-four ships. The document makes no attempt to communicate the strategic risk to the nation from the lack of warships, and it offers no plan B to offset the gap in assets. Furthermore, the Navy’s thirty-year shipbuilding plan for FY 202540 indicated that the Navy will “reach a low of 280 ships in fiscal year 2027,”41 the very year that the NAVPLAN directed the Navy to be ready for a possible war with China.

The lack of discussion on this significant matter is inexplicable. The unease is further increased with the realization that a global war with China in 2027 or even in 2030 will place impossible demands on the Navy to address multiple critical missions far exceeding its capacity. The Navy, as part of the joint force, will need to conduct, at a minimum, this sample of unprioritized missions:42

  1. Destroy Chinese naval and air forces invading Taiwan.
  2. Defend Japan, South Korea, and Australia from naval and air attacks.
  3. Isolate China from war-making resources—conduct economic warfare with blockade.
  4. Conduct horizontal escalation, i.e., destroy Chinese forces at Djibouti.
  5. Protect small amphibious ships inserting and extracting US Marine Corps stand-in forces inside Chinese weapons envelope.
  6. Protect sustainment of US Marine Corps stand-in forces inside Chinese weapons envelope.
  7. Protect US Marine Corps forces embarked in Navy large amphibious ships.
  8. Protect in transit Navy combat logistics forces sustaining Navy forces conducting distributed operations.
  9. Protect in transit Military Sealift Command forces sustaining Joint Force.
  10. Conduct homeland defense—continental United States, i.e., integrated air missile defense of critical seaports and Navy bases.
  11. Deter Russia as opportunistic adversary.
  12. Deter Iran as opportunistic adversary.
  13. Maintain surveillance of Chinese ballistic missile submarines.
  14. Maintain surveillance of Russian ballistic missile submarines.
  15. Maintain Navy strategic reserve to ensure combat credibility throughout war’s duration.

The Navy will be in a protracted war in a global conflict with China. While conducting those fifteen missions and the myriad other things required of the Navy, ships will incur far greater sustainment, maintenance, and repair requirements—further reducing the available numbers. In short, the Navy is likely to face a strategy-force mismatch. Ship numbers matter, and the US Navy does not have enough ships. As former Senator Sam Nunn (D-GA) once quipped, “At some point, numbers do count. At some point, technology fails to offset mass. At some point, Kipling’s ‘thin red line of heroes’ gives way.”43

Admiral Chas Richard, then-commander of the US Strategic Command, in a November 2022 speech made it very clear that the Navy lacked sufficient ships. He warned, “As I assess our level of deterrence against China, the ship is slowly sinking . . . it isn’t going to matter how good our [operating plan] is or how good our commanders are, or how good our forces are—we’re not going to have enough of them. And that is a very near-term problem.”44 Over the last two decades, however, no Congress and no administration, regardless of party, has attempted to fund a larger Navy. The nation cannot afford the number of ships the Navy says it needs to deter and defeat America’s potential enemies. The election of President Trump appears to have changed this calculus.

Key issue: Domain transparency

Another significant issue the 2024 NAVPLAN fails to address is the impact of surveillance technology on the changing character of war. This technology has increasingly made it easier to detect and target combatants on the oceans’ surface and aircraft in air space above it, calling into question the continued viability of manned ships and aircraft operating in such an environment. In a December 2022 essay, former Deputy Secretary of Defense Robert Work and former Google chief executive officer Eric Schmidt noted:

  • One key change is that militaries will have great difficulty hiding from or surprising one another. Sensors will be ubiquitous, and once-impenetrable intelligence will be vulnerable to quantum advances in decryption. Highly adaptable and mobile weapons systems, including drones, loitering munitions, and hypersonic missiles will largely inhibit militaries from amassing forces to invade.45

In the 1930s, the US Navy experienced a similar change in the character of warfare as technological improvements increased the operational performance of aircraft carriers and the lethality of aircraft the carriers launched in terms of reliability, operating distance, and weight of bomb load. Eventually, this increased lethality (or relative combat effectiveness) surpassed the battleship’s lethality, and the Navy experienced a fundamental inflection point in its warfighting capabilities. The Navy observed this evolution of the aircraft’s increasing lethality but did not fully comprehend that the aircraft carrier and its aircraft’s steady progress would replace the battleship as the Navy’s capital weapon system. Not until actual combat—such as the Royal Navy’s November 1940 attack on the Italian Navy at its Taranto base,46 and the Imperial Japanese Navy’s December 1941 attack on the US Navy in Pearl Harbor—did complete comprehension “sink in” about the carrier and its aircraft’s more lethal effectiveness. 

Similarly, given the comments by Work, Grady, and others in this decade, the Navy faces another seminal inflection point if Chinese surveillance capabilities advance to make the oceans’ surface and the air space above it transparent. The implications for the continued viability of surface ships in such an environment are staggering. The Navy, however, appears to have bet its surface ships will still be viable in this enhanced surveillance environment and remains committed to its planned acquisition of replacement surface ships to include the Constellation-class frigates, Columbia-class ballistic missile submarines, Ford-class aircraft carriers, and the continuation of building Burke-class destroyers along with its acquisition plans to buy large numbers of unmanned surface platforms.

4. Lack of frankness

And so, today we find ourselves in an environment increasingly reminiscent of the late 1930s, where the overarching balance of power is becoming ever-less stable, and where the difference between peace and a multi-theater system-transforming war will likely hinge on whether the United States and its allies can sustain the ever-more tenuous regional balances.


—Andrew A. Michta, “The United States Must Revisit the Basics of Geostrategy,” 19FortyFive.

Today is like 1938. Indeed, Franchetti has said so, but omitted her prescient comments from the 2024 NAVPLAN. As the vice CNO, she commented that the 1930s was a decisive decade that “rhymes in some key ways” with today’s security environment: She noted that both eras reflect periods of constrained defense spending, reduced construction of Navy ships, and a growing disparity in the capability and capacity between the US Navy and its principal adversaries—Imperial Japan in the 1930s and the authoritarian People’s Republic of China in the 2020s—resulting in a US fleet that was “too small and insufficiently resourced for total war,”47 and ineffective for deterrence. She is in excellent company. Kaja Kallas, then-prime minister of Estonia and now the European foreign policy chief, has reasoned that the current global security environment reflects 1938, “when a wider war was imminent, but the West had not yet joined the dots.”48 Dr. Hal Brands, a senior fellow at the American Enterprise Institute,49 has also commented on the striking parallels between today’s geostrategic events and those of the 1930s. Ominously, the Commission on the National Defense Strategy concluded in July 2024 that the “US military lacks both the capabilities, and the capacity required to be confident it can deter and prevail in combat.50The Wall Street Journal wrote a sober editorial saying, “The world today is more like the late 1930s, as dictators build their militaries and form a new axis of animosity, while the American political class sleeps.”51

This security environment demands frankness of expression about the threats, risks, and defense requirements by US senior military leaders. There isn’t much public evidence of US senior military leaders providing candid expression. In May 2024, US Senator Roger Wicker (R-MS) cautioned in a New York Times commentary, titled “America’s Military Is Not Prepared for War or Peace,” that:

  • When America’s senior military leaders testify before my colleagues and me on the US Senate Armed Services Committee behind closed doors, they have said that we face some of the most dangerous global threat environments since World War II. Then, they darken that already unsettling picture by explaining that our armed forces are at risk of being underequipped and outgunned.52

The notable exception is General D. W. Allvin, US Air Force and the current chief of staff, who stated in January 2025 that, “As the arc of the threat increases daily, it is my assessment this risk is unacceptable and will continue to rise without substantially increased investment.”53 Perhaps all current service chiefs share the same opinion about their individual service, but if they do, they are not speaking up and out.

Lack of frankness is a Navy practice

In its public congressional testimony, the Navy’s posture statements submitted in April and May 2024 to the House and Senate Armed Services Committees and to the House and Senate Appropriations Subcommittees on Defense do not reflect any discussion of “at risk of being underequipped and outgunned.” In the two instances that the word “risk” is used in these statements, it is associated with “sealift investments” and “installation investments.”54 

Indeed, the Navy’s 2024 posture statements to Congress are very upbeat documents with statements such as: “In every ocean, we uphold and protect the post-World War II rules-based international order that we fought to establish and have continued to defend for nearly three-quarters of a century.” This is clearly not true for the Red Sea. Well before the publication of the posture statements, the Houthis waged an effective sea denial campaign that the US Navy was unable to prevent. These posture statements do add that the Houthis have disrupted “the free flow of maritime commerce in the Red Sea.” As reported by General Christopher Mahoney, the assistant commandant of the Marine Corps, “The Houthi’s sea-denial campaign has altered global trade routes, imposed global economic costs, enhanced its international profile, and perhaps most importantly tied up a significant portion of American naval power at a time when demand for our naval ships outstrips supply.”55 There is, however, no discussion in the Navy’s 2024 posture statements of the implications of this Houthi warfare campaign on the Navy’s force structure, weapons, operational concepts, readiness, etc. Nor is there a mention of the high cost of fighting the Houthis and defending Israel.56 Likewise, there is no treatment of the implications of naval warfare by the Ukrainian Navy’s use of unmanned surface vessels (i.e., drones) to its highly effective sea denial campaign against the Russian Navy in the Black Sea.

Despite affirming that the Navy needs more ships to meet its mission in this decade, the Navy’s posture statements profess that the president’s FY 2025 budget submission for the Navy “funds a strong, global Navy that is postured and ready to deter potential adversaries . . . [and] win decisively in war.”57 The documents conclude that the Navy “continues to meet its Title 10 mission to be organized, trained, and equipped . . . for prompt and sustained combat incident to operations at sea.”58

These statements are disconcerting. If the Navy is funded and postured to deter and win per the April and May 2024 posture statements, it is ambiguous if these statements contradict or support the Navy’s formal requirements for 381 crewed ships. Furthermore, it is worrisome that the Navy plainly states that it can deter and win, while the July 2024 report by the Commission on the National Defense Strategy states: “The Joint Force is at the breaking point of maintaining readiness today. Adding more burden without adding resources to rebuild readiness will cause it to break.”59 Moreover, the report adds, “The nation was last prepared for such a [global] fight during the Cold War, which ended 35 years ago. It is not prepared today.”60

Communicating frankness with integrity and without offense

Two 1970s exemplars are instructive. In their back-to-back tenures as the Navy’s service chiefs, CNO Elmo Zumwalt and CNO James L. Holloway III confronted declining budgets, shrinking numbers of ships, plummeting readiness levels, and growing Soviet military capabilities. Moreover, things went from bad to worse during President Jimmy Carter’s administration. While President Gerald Ford proposed to Congress in 1977 the construction of 157 new ships, his successor, Jimmy Carter, in 1978 proposed only 70.“61 The collective time Zumwalt and Holloway held office has “become known to American history as the post-Vietnam ‘hollow force.‘”62 The two CNOs knew what had to be done. They had to lead and communicate frankly the issues confronting the Navy—issues no different from those challenging the Navy in 2025.

Zumwalt, in 1971, calculated the Navy had a 45 percent chance of defeating the Soviet Navy in a conventional war at sea. One year later, as he drafted the Navy’s FY 1973 budget, he reevaluated the chances at 35 percent.63, Holloway, and the Soviet Navy Threat Zumwalt stated in a 1971 US News & World Report interview, “If the US continues to reduce and the Soviet Union continues to increase, it’s got to be inevitable that the day will come when the result will go against the US.”64 In June 1975, Holloway on the pages of the US Naval Institute Proceedings wrote:

  • We have been decommissioning ships faster than we have been building new ones. And although today we can accomplish the naval tasks of our national strategy, in some areas it is only with the barest margin of success. As Soviet maritime capabilities continue to increase, it is clear to me, as it must be apparent to you, that it is essential to reverse the declining trend of our naval force levels.65

These two CNOs, “did not shy away from noticeably outlining the threats, challenges, and shortcomings of the fleet;” they unhesitatingly alerted the nation to the “security and technological dangers of a seemingly new age.”66 In short, Zumwalt and Holloway provided leadership underwritten with intellectual and moral courage to sound a clarion call about the Navy’s declining readiness posture. For their integrity and forthrightness, their civilian bosses did not censure them. 

The American public saw similar CNO leadership in January 2015 when Jonathan Greenert testified before Congress about the effects of sequestration on the Navy’s readiness to execute the Defense Strategic Guidance. He concluded that the Navy could not “confidently execute the current defense strategy within dictated budget constraints.”67 Greenert accompanied his testimony with a table displaying the ten missions the Defense Strategic Guidance required and the associated risk for each mission caused by sequestration. See figure 2, which depicts the key portion of Greenert’s table. His table showed two missions in red highlighting that the Navy could not execute and five missions in yellow highlighting that were “high risk” for the Navy.68 Greenert declared that naval forces “will not be able to carry out the Nation’s defense strategy as written.” His assessment finished with a dire warning that when facing major contingencies, the Navy’s “ability to fight and win will neither be quick nor decisive.”69

Figure 2: Excerpt of CNO Greenert’s assessment of 2015 mission impacts to a sequestered US Navy

Quadrennial defense review objectives Defense strategic guidance missions Navy ability to execute
Project power and win decisively Project power against a technologically capable adversary Major challenges to achieve warfighting objectives in denied areas:

• Inadequate power projection capacity
• Too few strike fighter, command/control, electronic warfare assets
• Limited advanced radar and missile capacity
• Insufficient munitions
Execute large-scale ops in one region, deter another adversary’s aggression elsewhere Limited ready capacity to execute two simultaneous large-scale ops:

• 2/3 of required contingency response force (2 of 3 Carrier Strike Groups and 2 of 3 Amphibious Readiness Groups) not ready to deploy within 30 days
Conduct limited counterinsurgency and other stability operations Increased risk due to:

• Reduced funding to Navy Expeditionary Combat Command
• Reduced ISR capacity (especially tactical rotary wing drones)
Operate effectively in space and cyberspace This mission is fully executable in a sequestered environment:

• Navy continues to prioritize cyber capabilities
Source: Navy Force Structure and Shipbuilding Plan (Washington, DC: Congressional Research Service, 2016).

5. Lack of a serious format for a serious document

With no maps of maritime terrain or tables of hard net assessment data and the inclusion of too many “eye candy” glossy images of kit, the 2024 NAVPLAN has the look and feel of a coffee table publication, meant for casual and light reading with limited analysis and a superficial approach to naval strategic planning. Serious people produce serious documents. The NAVPLAN’s format signals an indifferent document, unlike the formats used for the National Security Strategy. The lack of hard data on net assessment is a significant weakness, especially the lack of maps, which help make the relationship between sea power and physical space evident. Indeed, understanding maritime geography “facilitates communication and strategic thinking and can help construct a compelling public narrative in support of [Navy] policy.”70 The below figures illustrate the type of maps to include in a serious strategic planning document. Figure 3 depicts the “tyranny of distance”71 in the Indo-Pacific theater, and figure 4 shows the strategic importance of the “first island chain” in effectively “containing” China.

Figure 3: Western Pacific maritime geography: Tyranny of distance, lack of US strategic depth

Source: Guam: Defense Infrastructure and Readiness (Washington, DC: Congressional Research Service, 2023).

Figure 4: The first island chain’s strategic importance in preventing the Chinese navy from entering the Pacific and Indian oceans

Source: Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China (Washington, DC: Department of Defense, 2012).

Conclusion: Course corrections for a 2025 NAVPLAN

The biggest things that happen in the Navy are winning the battles in the [Joint Chiefs of Staff], the Secretary of Defense’s office, the White House, and Congress. We have to convince all these people; otherwise, we lose. What we need is a lawyer [as CNO], preferably a New York lawyer . . . He doesn’t have to know a lot about the Navy; he has to know how to win arguments.


Admiral William J. Crowe Jr., quoted in History of the Office of the Chief of Naval Operations, 1915-2015 by Thomas C. Hone and Curtis, A. Utz.

As the Navy’s senior strategic leader,72 the CNO must: “(1) get the big ideas right; (2) communicate those ideas effectively; (3) oversee the implementation of the ideas, and (4) determine how to refine the big ideas and then repeat the cycle.”73 The Navy’s “big ideas” address its national defense role and the requisite force structure to support that role.

When first published in September 2024, the NAVPLAN correctly got the Navy’s big ideas right. The arrival of a new commander in chief in January 2025 changed the nation’s defense priorities, and now the Navy must replace its NAVPLAN with a version aligned with President Trump’s priority to build ships for the Navy. The president superseded the Navy’s priorities in the order of readiness, capability, and capacity. Far from being an onerous burden for the Navy to craft a new 2025 NAVPLAN, the nation’s other armed services should be so fortunate.

In addition to embracing the president’s direction, the new 2025 NAVPLAN should address the deficiencies outlined in this paper. While retaining its commendable attributes, especially its strategic objective to concentrate on “readiness for the possibility of war with the People’s Republic of China by 2027,” the 2025 NAVPLAN should incorporate the following course corrections:

  • Increase its focus on the Navy’s two most important and influential audiences by addressing their information needs. They require a description of a possible war with China and Russia and how the Navy, as part of the Joint Force, would prevail. Such a sobering, informative description is not a multivolume addition but an executive summary with sufficient detail for these audiences to grasp the broad outlines and scope of a conflict and the implications for the Navy. The description must contain Chinese and Russian capabilities and numbers, logistic challenges, key military problems to overcome, and the role of allies and partners illustrated with maps and net assessment tables.
  • Improve clarity and specificity by providing the context of “why” and “how” the Navy intends to achieve its strategic objectives. Such context provides substance to the NAVPLAN and eliminates the use of assertions, which are a form of self-serving rhetoric, often informally called “happy talk.” In addition, the NAVPLAN must list the strategic assumptions the Navy used to craft the documents and address the implications of risk.
  • Address the Navy’s approach to resolving its other consequential issues—besides the need for a larger Navy and domain transparency—such as the ongoing depletion of ordnance war stocks for kinetic operations in the Middle East,74 the slow and painful development of directed energy weapons,75 and the yearslong debate over the acquisition of the medium landing ship.76 The 2025 NAVPLAN must forthrightly treat these issues head-on, lucidly conveying the implications, risk, assumptions, and mitigations.
  • Advance frankness by fully reflecting the Navy’s leadership philosophy of “Get Real, Get Better,” which requires Navy leaders to “be honest about our abilities and be fully transparent about our performance.”77 The Navy must speak frankly about how US adversaries, especially China, are harming US national interests and set forth a well-crafted message to explain how the Navy—properly resourced to be lethal and ready—will preserve the nation’s security in an increasingly dangerous world. The Wall Street Journal Editorial Board maintains that the United States “is slouching ahead in blind complacency until China invades Taiwan or takes some other action that damages US interests or allies because Beijing thinks the United States can do nothing about it.”78 The Navy should not partake in “blind complacency.” The threats to the United States are all too real.
  • Turn the NAVPLAN into a serious strategic planning document, produced by serious people, shedding the look of a coffee-table book or public-affairs handout. Eliminate all “glossy” images of ships and airplanes in the document and replace them with graphics that are relevant to and useful for the Navy’s two principal audiences as well as force planners and strategists of all ilk: maps depicting maritime terrain and net assessment tables regarding China and Russia in particular.

Collectively these Navy course corrections to the NAVPLAN will enable all Navy audiences to better grasp the severity of the security threats confronting America and comprehend the Navy’s funding requirements. With greater candor, explicitness, and detail—and amply illustrated with maps and tables depicting hard-threat data—the 2025 NAVPLAN can, indeed, demonstrate that clarity is power.

About the author

Bruce Stubbs

Bruce Stubbs had assignments on the staffs of the secretary of the Navy and the chief of naval operations from 2009 to 2022 as a member of the US senior executive service. He was a former director of Strategy and Strategic Concepts in the N3N5 and N7 directorates. As a career US Coast Guard officer, he had a posting as the Assistant Commandant for Capability in Headquarters, served on the staff of the National Security Council, taught at the Naval War College, commanded a major cutter, and served a combat tour with the US Navy in Vietnam during the 1972 Easter Offensive. The author drew upon his forthcoming publication, Cold Iron: The Demise of Navy Strategy Development and Force Planning, to compose portions of this commentary.

The views expressed are the author’s and do not represent those of any organization or affiliation.

Related content

Explore the program

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

1    “Vice Chief of Naval Operations Talks ‘Get Real, Get Better’ During Latest SGL at NPS,” News Stories, US Navy Press Office, May 24, 2022, https://www.navy.mil/Press-Office/News-Stories/Article/3041666/vice-chief-of-naval-operations-talks-get-real-get-better-during-latest-sgl-at-n/.
2    Lisa Marie Franchetti, Admiral, US Navy, Chief of Naval Operations Navigation Plan for America’s Warfighting Navy 2024, US Navy, September 2024; Admiral Franchetti was chief of naval operations until February 21, 2025.
3    “Chief of Naval Operations Releases Navigation Plan for America’s Warfighting Navy,” Public Affairs, US Navy, September 18, 2024.
4    Franchetti, CNO Navigation Plan, 12.
5    Hugh Hewitt, “President-elect Donald Trump on ‘One, Big, Beautiful Bill,’ ” Transcript, The Hugh Hewitt Show, January 6, 2025.
6    Hewitt, “President-elect Donald Trump on ‘One, Big, Beautiful Bill.’ ”
7    To Conduct a Confirmation Hearing on the Expected Nomination of Mr. Peter B. Hegseth to Be Secretary of Defense.” Hearing before the Committee on Armed Services, United States Senate, 118th Congress, January 14, 2025. https://www.armed-services.senate.gov/hearings/to-conduct-a-confirmation-hearing-on-the-expected-nomination-of-mr-peter-b-hegseth-to-be-secretary-of-defense.
8    Senate Armed Services Committee, “Advance Policy Questions for Peter “Pete” B. Hegseth Nominee to Serve as Secretary of Defense,” January 6, 2025; see also Ashley Roque and Valerie Insinna, “What Pete Hegseth’s Hearing Tells Us About Trump’s Plans for the Pentagon,” Breaking Defense, January 14, 2025.
9    Valerie Insinna, “Trump Announces New White House Shipbuilding Office,” Breaking Defense, March 04, 2025.
10    Editorial Board, “Trump Sweeps Out Biden’s Officers,” Wall Street Journal, February 23, 2025
11    James T. Conway, Gary Roughead, and Thad W. Allen, “A Cooperative Strategy for 21st Century Seapower,” Naval War College Review, October 2007.
12    Joseph F. Dunford, Jr., Jonathan W. Greenert, and Paul F. Zukunft, A Cooperative Strategy for 21st Century Seapower: Forward, Engaged, Ready, March 2015, https://news.usni.org/2015/03/13/document-u-s-cooperative-strategy-for-21st-century-seapower-2015-revision.
13    David H. Berger, Michael M. Gilday, and Karl L. Schultz, “Advantage at Sea Prevailing with Integrated All-Domain Naval Power, December 2020.
14    Derived from Ronald O’Rourke, “The Maritime Strategy and the Next Decade,” US Naval Institute Proceedings 114/4/1,022 (April 1988).
15    Richard P. Rumelt, Good Strategy/Bad Strategy: The Difference and Why It Matters (New York: Crown Publishing Group, Random House, 2011), 2.
16    Franchetti, CNO Navigation Plan, III.
17    Franchetti, CNO Navigation Plan, 12.
18    Franchetti, CNO Navigation Plan, 12.
19    Carl von Clausewitz, On War, eds. and trans. Michael Howard and Peter Paret (Princeton, NJ: Princeton University Press, 1984), 85. According to Clausewitz, the character of war refers to “the means by which war has to be fought.” These means are constantly changing as technology has a significant influence, as do doctrine and military organization. Changes in the character of warfare may occur slowly over generations—evolutionary—or quite rapidly—revolutionary. These changes affect the tactics of employing capabilities and influence the development of strategy.
20    Franchetti, CNO Navigation Plan, 9.
21    Franchetti, CNO Navigation Plan, 12.
22    The 2024 NAVPLAN has seven high-priority “targets” or subobjectives, personally approved by the CNO. The second target listed on page III is to “scale robotic and autonomous systems to integrate more platforms at speed.”
23    The NAVPLAN should follow the example of General Colin Powell, US Army, Chairman of the Joint Chiefs of Staff, with unambiguous clarity. He famously stated at a Pentagon press briefing on January 23, 1991, announcing the US Gulf War plan against Saddam Hussein’s army, saying: “Our strategy in going after this army is very simple. First, we are going to cut it off, and then we are going to kill it.” See Eliot Brenner, “Powell: ‘We’re Going to Cut It Off . . . Kill It,’ ” UPI, January 23, 1991.
24    The author based these three objectives on the Navy’s famous 1980s Maritime Strategy. James D. Watkins, “The Maritime Strategy,” US Naval Institute Proceedings 112/1/995 Supplement, The Maritime Strategy, January 1986.
25    Henry R. Nau, “We Win, They Lose—Ronald Reagan Armed with the Intent to Negotiate,” Claremont Review of Books, Book Reviews, Winter 2022/23.
26    Franchetti, CNO Navigation Plan, 13.
27    Rep. Jane Harman and Amb Eric Edelman, Chair and Vice Chair, Commission on the National Defense Strategy Report, July 2024, v. The commission report said: “The threats the United States faces are the most serious and most challenging the nation has encountered since 1945 and include the potential for near-term major war. The United States last fought a global conflict during World War II, which ended nearly 80 years ago.”
28    Samuel P. Huntington, “National Policy and the Transoceanic Navy,” US Naval Institute Proceedings 80, no. 5, May 1954.
29    George Friedman, “American Naval Policy and China,” Geopolitico Futures, January 22, 2025.
30    Franchetti, CNO Navigation Plan, 12.
31    Franchetti, CNO Navigation Plan, 12.
32    Franchetti, CNO Navigation Plan, 12.
33    Spencer Ackerman, “Donald Rumsfeld Wants to Give You the Most Ironic Life Lessons Ever,” Danger Room blog, Wired, May 14, 2013; and Ray Suarez, “Troops Question Secretary of Defense Donald Rumsfeld about Armor,” PBS, December 9, 2004.
34    Franchetti, CNO Navigation Plan, III.
35    Franchetti, CNO Navigation Plan, II.
36    Admiral Sam Paparo, “Project 33 Is Enabling Joint All-Domain Operations in the Indo-Pacific,” US Naval Institute Proceedings 151/1/1,463 (January 2025).
37    Robert Hale and Ellen Lord, Chair and Vice Chair, “Defense Resourcing for the Future, Commission on Planning, Programming, Budgeting, and Execution (PPBE) Reform,” Final Report, March 2024, 26.
38    Sam LaGrone, “Navy Raises Battle Force Goal to 381 Ships in Classified Report to Congress,” US Naval Institute, July 18, 2023. This classified report was titled Battle Force Ship Assessment and Requirement.
39    Ronald O’Rourke, “Navy Force Structure and Shipbuilding Plans: Background and Issues for Congress,” Report 32665, Congressional Research Service, September 24, 2024, 2, 56 (see Table G-1).
40    This is the document’s informal but widely used title. Its formal title is Report to Congress on the Annual Long-Range Plan for Construction of Naval Vessels for Fiscal Year 2025. The Office of the Chief of Naval Operations, Deputy Chief of Naval Operations for Warfighting Requirements and Capabilities (OPNAV N9) prepared this document, and the Office of the Secretary of the Navy approved its release in March 2024.
41    Michael Marrow, “Navy’s New 30-Year Shipbuilding Plan Sketches 2 Paths for Future Manned Ship Fleet,” Breaking Defense, March 19, 2024.
42    This list builds on and updates the author’s “Ten Challenges to Implementing Force Design 2030,” which the Atlantic Council published in November 2023.
43    Charles L. Fox and Dino A. Lorenzini, “How Much Is Not Enough? The Non-Nuclear Air Battle in NATO’s Central Region,” Naval War College Review 33, no. 2 (1980).
44    Caleb Larson, “‘Sinking Slowly’: Admiral Warns Deterrence Weakening against China,” National Interest, November 7, 2022. Note: Admiral Richard has since retired; he is the James R. Schlesinger Distinguished Professor at the University of Virginia’s Miller Center.
45    Eric Schmidt and Robert O. Work, “How to Stop the Next World War: A Strategy to Restore America’s Military Deterrence,” Atlantic, December 5, 2022. Note: Schmidt served as Google’s chief executive officer from 2001 to 2011.
46    The Royal Navy’s Fleet Air Arm’s 1940 attack on the Italian Navy in its Taranto Harbor was the first completely all-aircraft naval attack in history. Admiral Andrew Browne Cunningham, RN, the commander in chief, Mediterranean Fleet, stated: “Taranto should be remembered forever as having shown once and for all that in the Fleet Air Arm the Navy has its most devastating weapon.”
47    Lisa Franchetti, Remarks of the then-Vice Chief of Naval Operations, SENEDIA’s Defense Innovation Days, Newport, Rhode Island, August 29, 2023.
48    Patrick Wintour, “‘We’re in 1938 Now’: Putin’s War in Ukraine and Lessons from History,” June 8, 2024.
49    Dr. Brands is the Henry A. Kissinger Distinguished Professor of Global Affairs at the Johns Hopkins School of Advanced International Studies. He is also a columnist for Bloomberg Opinion. Dr. Brands has previously worked as special assistant to the secretary of defense for strategic planning and lead writer for the National Defense Strategy Commission.
50    Harman and Edelman, Commission on the National Defense Strategy Report, VII.
51    Editorial Board, “A Clarion Call for Rearmament,” Wall Street Journal, June 3, 2024.
52    Roger Wicker, “America’s Military Is Not Prepared for War—or Peace,” New York Times, May 29, 2024.
53    David W. Allvin, “Allvin: It’s Make or Break Time. America Needs More Air Force,” Breaking Defense, January 17, 2025.
54    Lisa Marie Franchetti, “Statement on the Posture of the United States Navy,” Senate Committee on Appropriations, April 16, 2024; and Lisa Marie Franchetti, “Statement on the Posture of the United States Navy in Review of the Defense Authorization Request for Fiscal Year 2025 and the Future Years Defense Program,” Senate Armed Services Committee, May 16, 2024. On page six of both statements, under Sealift Investments, is the following: “The Buy-Used program provides a stable acquisition profile with forecasted maintenance and repair costs to meet strategic mobility requirements at a moderate level of risk.” On page twelve of both statements, under Installation Investments, is the following: “We are investing in our critical utility systems, upgrading water, wastewater, and electrical generation, distribution, and treatment capabilities to improve resiliency, quality, and reliability and minimize risk to mission.”
55    Christopher Mahoney, “Four Lessons on Sea Denial from the Black and Red Seas,” Defense News, June 18, 2024.
56    In October 2024, Jake Epstein reported, “Navy warships and aircraft on station in and around the Middle East expended $1.85 billion in munitions on fights in the region between October 7, 2023, to October 1, 2024, a Navy spokesperson confirmed to Business Insider on Thursday. The $1.85 billion accounts for hundreds of munitions launched from US warships and aircraft attached to them, including surface-to-air interceptor missiles, land-attack missiles, air-to-air missiles, and air-to-surface bombs. Some of these weapons cost several million dollars apiece. The substantial figure covers the Navy’s campaign against the Houthis in the Red Sea, which is ongoing, and its efforts to defend Israel from attacks by Iran and its proxies.” See Jake Epstein, “The US Navy Fired Nearly $2 Billion in Weapons Over a Year of Fighting in the Middle East,” Business Insider, October 31, 2024.
57    Franchetti, “Statement on the Posture of the United States Navy,” and “Statement on the Posture of the United States Navy in Review of the Defense Authorization Request for Fiscal Year 2025 and the Future Years Defense Program,” 4: “The Navy’s budget request for FY25 funds a strong, global Navy that is postured and ready to deter potential adversaries, protect our homeland, respond in crisis, and, if called, win decisively in war.”
58    Franchetti, “Statement on the Posture of the United States Navy,” and “Statement on the Posture of the United States Navy in Review of the Defense Authorization Request,” 14: “The Navy continues to meet its Title 10 mission to be organized, trained, and equipped for the peacetime promotion of the national security interests and prosperity of the United States and for prompt and sustained combat incident to operations at sea.”
59    Harman and Edelman, Commission on the National Defense Strategy Report, 64.
60    Harman and Edelman, Commission on the National Defense Strategy Report, V
61    Francis J. West, Jr., “Planning for the Navy’s Future,” US Naval Institute Proceedings 105/10/920 (October 1979). From 1981 to 1983, West was assistant secretary of defense for international security affairs, US Department of Defense.
62    John T. Kuehn, PhD, “Zumwalt, Holloway, and the Soviet Navy Threat: Leadership in a Time of Strategic, Social, and Cultural Change,” Marine Corps University Press, Journal of Advanced Military Studies 13, no. 2 (Fall 2022).
63    John T. Kuehn, Zumwalt
64    Elmo Zumwalt, “Where the Russian Threat Keeps Growing,” Interview, US News & World Report, September 13, 1971, 72.
65    James L. Holloway III, “The President’s Page,” US Naval Institute Proceedings 101, no. 6 (June 1975): 3.
66    Holloway III, “The President’s Page.”
67    Hearing on National Defense Before the Senate Armed Services Committee, 114th Cong. (2015) (statement of Jonathan Greenert, Admiral, US Navy, Chief of Naval Operations, 4-5). The full quote is: “There are many ways to balance between force structure, readiness, capability, and manpower, but none that [the] Navy has calculated that enable us to confidently execute the current defense strategy within dictated budget constraints.”
68    Hearing (Greenert, 4, 5, and 9).
69    Hearing (Greenert, 4, 5, and 9).
70    Andrew J. Rhodes, “The Geographic President: How Franklin D. Roosevelt Used Maps to Make and Communicate Strategy,” Washington Map Society’s Portolan, Spring 2020. This essay won the 2019 Ristow Prize for Academic Achievement in the History of Cartography. Rhodes is a career civil servant who has served as an expert in Asia-Pacific affairs in a variety of analytic, advisory, and staff positions in the US government. He is an affiliated scholar of the China Maritime Studies Institute at the US Naval War College. Rhodes also commented that geography provides “leaders with a broader set of tools for analyzing complex problems, developing options within a team, and presenting a public vision for a decision.”
71    Rhodes, “The Geographic President”: “In 1942, FDR ordered Secretary of War Henry Stimson to come to the Map Room on a Sunday afternoon for what FDR called a ‘geography lesson.’ FDR asked him to move his wheelchair to the map of the Pacific where he criticized a recent memorandum from Stimson that failed to consider the tyranny of distance in the Pacific.”
72    Peter M. Swartz and Michael C. Markowitz defined CNO responsibilities as follows: “Prepare the way for developing a Program Objective Memorandum for the Future Year Defense Program; develop and submit an annual Program Objective Memorandum and budget to the Office of the Secretary of Defense and Congress; man, train, equip and support the existing fleet and shore establishment, and maintain its readiness; conduct long-range planning beyond the Future Year Defense Program; provide national security policy, strategy and operational advice to the President and Defense Secretary, and Chairman JCS; articulate the Navy story; organize (and re-organize) the fleet and shore establishment; represent the Navy in joint, bilateral, and multilateral fora; and take good care of Navy men and women.” See Peter M. Swartz and Michael C. Markowitz, Organizing OPNAV (1970 – 2009), Strategic Studies Division, Prepared by CNA for the US Navy Naval History and Heritage Command, CAB D0020997.A5/2Rev, January 2010, Slide no. 11.
73    Bill Snyder, “Gen. David Petraeus: Four Tasks of a Strategic Leader,” Insights, Stanford Graduate School of Business, May 14, 2018.
74    Justin Katz, “INDOPACOM’s Paparo Acknowledges Stockpile Shortages May Impact His Readiness,” Breaking Defense, November 20, 2024; see also Epstein, “The U.S. Navy Fired Nearly $2 Billion in Weapons.”
75    Cal Biesecker, “Still Unhappy with Progress on Directed Energy Weapons, SWO Boss Wants More Land Based Testing to Speed Use on Ships,” Defense Daily, January 14, 2025.
76    Geoff Ziezulewicz, “Navy Now Seeking Commercial Ship Design to Propel Its Long-Delayed Medium Landing Ship Program Forward,” War Zone, January 15, 2025. Note: The medium landing ship (designated as the LSM) is a new class of Navy amphibious ships to support the Marine Corps conducting its operational concept to set up ad hoc bases on islands, fire anti-ship missiles in a potential conflict, and quickly move to new locations. The Navy envisions a ship length of 200 to 400 feet; a draft of 12 feet; a crew of about seventy sailors; and a capacity for carrying fifty Marines and 648 short tons of equipment. This ship would have a transit speed of 14 knots and a cruising range of 3,500 nautical miles, as well as a roll-on/roll-off beaching capability and a helicopter landing pad.
77    As mentioned in the introduction, Admiral Lescher, then-vice chief of naval operations, explained the crux of the Navy’s new “Get Real, Get Better” initiative during a May 2022 speech, saying: “We have to self-assess and be our own toughest critics. We need to be honest about our abilities and be fully transparent about our performance. Once we ‘embrace the red,’ we will be able to identify solutions and more realistically predict our mission readiness.” See “Vice Chief of Naval Operations Talks,” US Navy Press Office.
78    Editorial Board, “‘The Big One Is Coming’ and the US Military Isn’t Ready,” Wall Street Journal, November 4, 2022.

The post Clarity is power: The Trump administration needs a new US Navy Navigation Plan appeared first on Atlantic Council.

]]>
China’s exploitation of overseas ports and bases https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/chinas-exploitation-of-overseas-ports-and-bases/ Fri, 21 Mar 2025 18:47:12 +0000 https://www.atlanticcouncil.org/?p=824422 The control and administration of overseas ports and bases by China poses a serious risk to the United States in the event of a potential conflict. The Chinese People’s Liberation Army could exploit these ports and bases to challenge control of the sea.

The post China’s exploitation of overseas ports and bases appeared first on Atlantic Council.

]]>
Introduction

This paper examines the potential for the Chinese People’s Liberation Army (PLA) to exploit its growing network of overseas ports and bases to challenge control of the seas in a conventional war with the United States. Security concerns with Chinese ownership of overseas ports fall into three main categories. First, China collects vast amounts of intelligence via its port network. Second, it could use that intelligence and its control of key ports and piers to disrupt US shipments during wartime. Finally, China could leverage these ports to pre-position weapons, ammunition, and equipment to resupply its warships and armed merchants or rapidly establish anti-access/area denial (A2/AD) nodes near major maritime choke points. In short, China could exploit this network to challenge the sea control essential to US success in an armed conflict.

This paper does not speculate on why the United States and China might enter a global conflict. In fact, current Chinese writings indicate China does not seek a global confrontation. Rather, Chinese strategic literature reflects a preference for winning without fighting and, if forced to fight, fighting one local enemy at a time after politically isolating that enemy.

As with all future papers, this one starts with assumptions. It then examines China’s current network of overseas ports and its expansion of that network. The rationale behind China’s pursuit of overseas ports is explored through an analysis of Chinese strategic vulnerabilities. This paper considers three potential applications for these bases, including an improbable worst-case scenario, to assess how China may exploit this advantage.

After evaluating China’s potential actions, the paper examines possible US responses and concludes with recommendations for the capabilities, training, organization, and equipment necessary to execute those missions effectively.

Assumptions

Assumptions are critical to planning. They provide guidance concerning essential but inherently unknowable factors required to initiate planning.1 The following assumptions are key to assessing China’s potential use of overseas bases and ports in a conflict with the United States.

Assumption 1: The war will be long.

By the time the modern state and its military institutions fully emerged at the end of the seventeenth century, wars were won or lost on the ability of financial and economic systems to sustain and support armies in the field and navies at sea.2

Since 1750, conflicts between healthy, major powers lasted years to decades, even though national leaders often assumed they would be short. The Seven Years’ War, the French Revolutionary and Napoleonic Wars, the US Civil War, the First and Second World Wars, and the Russo-Ukrainian War lasted between three to twenty-three years.

War games have repeatedly shown that the United States would run out of critical munitions just eight days into a high-intensity conflict with China over Taiwan.”3 However, this does not mean a war with China would be short. In both the US Civil War and the First World War, ammunition shortages reduced the intensity of fighting for up to a year. Yet, both sides mobilized their industries and replenished ammunition stocks even as they raised massive armies. These wars continued for years after the combatants overcame their initial shortages. The current Russo-Ukrainian War follows this pattern.

These long wars have ended in one of two ways: a negotiated treaty or the destruction of the enemy’s forces and subsequent occupation of its homeland. Economic exhaustion of one or both parties was a key factor in these conflicts.

However, nuclear weapons introduced a new factor that makes occupying a nuclear-armed power a highly dangerous proposition. Andrew Krepinevich, Jr., president and chief operating officer of Solarium LLC, a defense consulting firm, notes:

  • [W]ith the advent of nuclear weapons, wars between great powers can be protracted only if political constraints are imposed on vertical escalation.4

The presence of nuclear weapons appears to rule out a strategy of annihilation or large-scale attacks on either combatant’s homeland. Instead of seeking a decisive victory, the United States and China would likely pursue a strategy of exhaustion, pitting their economic and fiscal systems against each other. In this conflict, sea control would be critical.

Assumption 2: China is establishing a mix of overseas military bases, ownership of overseas commercial ports, and access to other nations’ commercial ports.

Chinese entanglement in foreign bases and ports is not an assumption but a reality. The only uncertainty is which facilities China could access in a conflict. In 2018, Ely Ratner, at the time the Maurice R. Greenberg senior fellow for China studies at the Council on Foreign Relations, noted, “China’s government is actively searching for overseas bases.”5 Since then, China has continued to invest heavily in overseas facilities.6

Assumption 3: China is developing fully autonomous uncrewed aerial vehicles (UAVs), uncrewed surface vessels (USVs), and uncrewed underwater vessels (UUVs).

Currently, several nations deploy weapons capable of autonomously hunting targets post-launch.7 China, already a leader in drones and autonomy technologies, will undoubtedly operate post-launch autonomous drones across air, land, and sea domains within a few years. As the Houthis have demonstrated, even a small number of inexpensive drones can challenge current US Navy capabilities. China has the potential to produce these in the millions.8

Assumption 4: China could execute a plan using its Chinese-owned overseas ports and bases with its current capabilities.

The PLA already possesses the capabilities required to exploit Chinese bases and Chinese-owned overseas ports. The key will be China’s willingness to think differently and commit forces to missions with a slight chance of those forces returning.

Assumption 5: The United States cannot predict which nations will allow US forces to operate from their territories during a war. Therefore, the United States must plan for various permissions and structure future forces accordingly.

International relations in the Indo-Pacific are in flux. While many analysts believe Australia and Japan will allow US forces to use their territory in a conflict with China, there is much less confidence regarding the positions other nations in the region will take. In the last few years, China has pulled back from its “wolf-warrior” approach to diplomacy and refocused its Belt and Road Initiative. This may lead Pacific nations toward neutrality or even alignment with China.

Chinese overseas port posture

Numerous studies have examined China’s rapid and ongoing expansion of ownership or management of ports globally. Most provide detailed analyses of why China is seeking a global footprint, and several papers also analyze China’s reasoning for selecting specific ports.9

However, there is no consensus on precisely which facilities China will own or have access to. All studies note China’s naval base in Djibouti. More recently, Newsweek reported that China continues to expand naval facilities in Ream, Cambodia.10 The Washington Post reported China continued its efforts to establish “military facilities at the United Arab Emirates port of Kalifa.”11 RAND rated four countries—Cambodia, Myanmar, Bangladesh, and Pakistan—as highly desirable and feasible candidates for subsequent naval bases.12

Isaac B. Kardon and Wendy Leutert note that “the [People’s Liberation Army Navy] enjoys privileged access to dual-use facilities that Chinese firms own and operate.”13 This means Chinese personnel could oversee the day-to-day operations at these terminals. Chinese firms “hold an equity stake in the lease or concession on at least one terminal in ninety-six foreign ports.”14 Forty-five of the ninety-six ports lie along significant sea lines of communications (SLOCs) critical to Chinese imports and exports. Fifty-five percent of the ports are within 480 nautical miles (one steaming day) of critical choke points on these SLOCs. While China may focus on protecting its SLOCs, these routes are essential to the global economy. Chinese ownership or management of these ports allows China to build military capabilities at overseas bases covertly.

Chinese strategic vulnerabilities

China has key strategic vulnerabilities that can be exploited in a long war. Chinese leaders have identified two vulnerabilities of great strategic concern: the “Malacca Dilemma” and internal instability that could threaten the Chinese Communist Party’s (CCP’s) rule.15 While Chinese officials no longer use the phrase “Malacca Dilemma,” it still captures China’s fundamental vulnerability to a blockade. If exploited, this vulnerability would contribute significantly to China’s economic exhaustion.

Malacca dilemma

China’s greatest geostrategic vulnerability is its isolation from the Pacific and Indian Oceans by the First Island Chain. This makes Chinese seaborne trade highly vulnerable to interdiction. Further, since most of the major exits to the South China and East China Seas are at significant distances from the Chinese mainland, China would have to project its military forces over longer ranges to disrupt any US or allied blockade operations. Even if China can penetrate a blockade of the First Island Chain, it faces additional maritime choke points en route to European and Middle Eastern markets. Most notable are the Strait of Hormuz and Bab al-Mandab Strait.

The Chinese leadership’s concern over the Malacca Dilemma is based on genuine economic vulnerabilities. China’s energy, food, and productive capacity heavily rely on seaborne trade. To reduce its vulnerability to interruption of its seaborne commerce, China has invested significant resources in pipelines and overland rail routes.

China has made serious investments to reduce its vulnerability to blockade operations. It is essential to examine those steps and the reasons they remain vulnerable.

Rail–an effort to overcome the Malacca Dilemma?

China has invested heavily in improving its ability to ship to Europe by rail. According to the China State Railway Group Company, it moved 1,460,000 twenty-foot equivalent units (TEUs) by rail in 2021.16 This peak throughput occurred prior to Russia’s full-scale invasion of Ukraine on February 24, 2022, which has restricted rail traffic. For comparison, China’s ports handled 262 million TEUs in 2021.17 Thus, rail routes accounted for only 0.6 percent of its global seaborne trade.

Expanding capacity to handle more than a minor fraction of seaborne trade will be extremely difficult. Russian Railways projects that it will be able to transit 4 million containers by 2027. However, its spokesman admits that shortages of container platforms, skilled workers, throughput capacity, and marshaling yards restrict its current operations.18 Kazakh railways, the only other route, do not offer prospects for increased trade. The Kazakh-China border crossings are regularly overwhelmed by traffic. At the beginning of September 2024, fifty-five trains were backed up at the border. To reduce the congestion, Kazakhstan banned further containers until it could clear the backlog.19 Further complicating any efforts to increase overland transportation throughput is the fact both rail and road connections pass through thousands of miles of the most hostile terrain in the world—mountains, jungles, and deserts. These conditions magnify both the expense of transport and the cost of maintaining rail and road networks. Additionally, most of the rail infrastructure is not operated or maintained by China, but instead by Russia and Kazakhstan. Finally, the very nature of rail lines makes them subject to wartime interdiction.

China has also proposed rail projects to Thailand, Myanmar, and Pakistan, but these projects continue to face delays.20 The cargo that will eventually feed these rail connections must come primarily from maritime shipping. Thus, these proposed rail lines will not dramatically reduce China’s dependence on the sea but will only allow it to avoid key choke points created by the First Island Chain. However, even if these lines triple rail throughput, they will still provide less than 2 percent of China’s current seaborne trade. The fact remains that rail simply cannot provide China with a significant substitute for seaborne trade.

This calls into question whether China designed these rail lines not as alternate trade routes but as inland routes to support distant overseas ports and bases. China and Pakistan are planning a rail line to link Kashgar, China, to Gwadar, a Pakistani port city on the Arabian Sea.21 In late 2023, China and Myanmar announced the resumption of work on the China-Myanmar Economic Corridor, which will link Kunming, China, to Kyaukpyu and Yangon, Myanmar—both located on the Bay of Bengal.22

Energy

Not surprisingly, China uses a full range of energy sources. At 55.6 percent of the total, coal is by far China’s largest energy source. The next largest source is oil, at 17.7 percent. Then, in descending order, are natural gas (8.4 percent), renewables (8.4 percent), hydro (7.7 percent), and nuclear power (2.3 percent).23

China has massive coal production capacity and reserves. Yet, in 2022, it imported 375 million metric tons of coal, or 8 percent of its coal needs.24 The imports, primarily from Indonesia and Australia, consisted of higher-quality coal unavailable in China but needed for certain industrial processes.

Analysis often cites the fact that China imports 72 percent of the oil it consumes as a primary strategic vulnerability.25 But too often, analysts do not note that oil represented less than 18 percent of China’s primary energy consumption in 2022. Recognizing a potential vulnerability, China began building a strategic petroleum oil reserve in 2007. Today,

  • China’s inventory [is] near 1.3bn barrels, enough to cover 115 days of imports (America holds 800m barrels). On top of this, China has told oil firms to add 60m to stockpiles by the end of March [2025]. Rapidan [Energy] thinks reserves will grow even faster, with China adding as many as 700m barrels by the end of 2025.26

In the past, China has also delivered oil by rail. With full mobilization, China might be able to import five hundred thousand barrels per day from Russia and Kazakhstan.27 However, this would displace other potential traffic. That said, most of China’s liquid energy imports are used in the transportation and petrochemical industries.

Natural gas does not represent a significant vulnerability either. As of spring 2024, China had only about twenty-three days’ natural gas supply in storage. However, in 2022, natural gas imported by sea represented only 2 percent of China’s total energy.28 The reductions in liquid energy consumption seen during the COVID-19 pandemic indicate the impact that wartime restrictions on civilian movement could have on China’s energy demands.29

Any major conflict between the United States and China would cause significant economic disruption globally, thus strongly reducing the demand for Chinese products. This would further reduce China’s liquid energy requirements and extend the life of its energy reserves. In sum, interruptions of imported liquid energy would strain China’s economy but would not be decisive.

Food

China faces insoluble food security issues. With only 10 percent of the world’s arable land, it must feed 20 percent of the world’s population.30 In 2014, China’s government reported that 20 percent of its arable land suffered from heavy metal pollution. Compounding these problems is the carbon content of Chinese soil, which is 30 percent lower than the world average. To compensate, Chinese farmers use 33 percent of all fertilizer produced worldwide. This overuse of fertilizer causes acidification and hardens the soil.31 In addition, over 40 percent of China’s land area is affected by erosion—perhaps the most severe damage in the world.32

The net result is that China:

  • [I]mports more of these [food] products—including soybeans, corn, wheat, rice, and dairy products—than any other country. Between 2000 and 2020, the country’s food self-sufficiency ratio decreased from 93.6 percent to 65.8 percent. Changing diet patterns have also driven up China’s imports of edible oils, sugar, meat, and processed foods. In 2021, the country’s edible oil import-dependency ratio reached nearly 70 percent…33

Chinese leaders are acutely aware that food shortages have historically led to instability and have, therefore, stockpiled a year’s worth of wheat and maize.34 The chart below demonstrates the massive increase in grain purchases since 2010. This trend partly reflects China’s growing wealth and the need to feed more livestock as the Chinese diet increasingly includes meat.35

China also faces severe water shortages, particularly in the north, where much of its agricultural production is concentrated. That region holds just 4 percent of the country’s water. As a result, Chinese agriculture relies heavily on groundwater, but half of its aquifers are too polluted for irrigation. Nationwide, up to 25 percent of river water is also unsuitable for agricultural use.36 To address its water distribution problem, China is building massive water transportation systems, but it is unlikely to significantly increase grain production in a crisis.

Productive capacity

In 2022, China imported more than $325 million in non-food raw materials per month.37 This included 70 percent of total global seaborne iron ore imports—about 1.2 billion tons per year.38 Chinese domestic production that year was 380 million tons, covering only 24 percent of its annual needs.39 While China is the world’s fourth-largest producer of copper,40 it is also the world’s largest importer, accounting for 58 percent of global copper ore imports.41

Although China has the world’s largest shipbuilding industry, accounting for 48.4 percent of the global shipbuilding tonnage, the industry is heavily dependent on imports.42 If US allies can maintain sea control in a prolonged conflict, China will struggle to obtain the raw materials needed to sustain its economy and war production. Nations that have been blockaded in the past have made significant cuts to civilian production to support their war efforts. Doing so allowed the Confederacy, Germany, and Japan to extend their military efforts for years; however, in the end, blockades caused substantial reductions in their industrial outputs.

Trade

China has made significant efforts to shift from an export-based economy to a domestic demand-driven one. It has reduced its dependence on trade from over 60 percent of its GDP in 2006 to 38 percent in 2022.43 However, 90 percent of this trade remains seaborne.44 To illustrate the potential impact of interruptions to seaborne trade, the Great Depression reduced the US GDP by 29 percent from 1929 to 1933.45 A RAND study noted that China’s economy may contract by 25 to 35 percent in a prolonged war.46 A contraction of this magnitude would not only severely hinder China’s military-industrial production but could also contribute to internal instability—Chinese President Xi Jinping’s primary concern.

Internal instability

The CCP’s leadership views internal instability as the primary threat to its continued rule. Since the 1989 Tiananmen Square protests and massacre, China has dramatically increased its focus on internal security. It reorganized the People’s Armed Police, and by 2017, its internal security budget was 118 percent of its national defense budget.

China no longer publishes its internal security budget. However, its massive efforts to suppress Uighurs in Xinjiang, its coordinated nationwide surveillance of nearly every aspect of its citizens’ lives, and its extensive control over information all underscore the CCP leadership’s belief that internal instability is a major strategic threat.

Joel Wuthnow, a senior research fellow at the Center for the Study of Chinese Military Affairs within the Institute for National Strategic Studies at the National Defense University, noted:

  • The ultimate irony of the regime presiding over the ‘people’s republic’ is that its greatest fear is that one day, it will have to confront the wrath of the Chinese people directly. Worrying about internal challenges is ‘what keeps Chinese leaders awake at night.’47

The People’s Liberation Army

The Office of the US Secretary of Defense provides an unclassified Annual Report to Congress, and the Congressional Research Service regularly produces reports on the PLA. This article does not attempt to duplicate these efforts. Instead, it focuses on how China can use existing and projected PLA capabilities to disrupt international shipping during a conflict with the United States.

Chinese potential use of overseas ports and bases

Security concerns regarding Chinese ownership of overseas ports fall into three general categories. First is the massive amount of intelligence China collects. Second is the potential to use this intelligence and control of key ports and piers to disrupt US shipments in times of war. Finally, there is the possibility that China could leverage its control of these ports to pre-position weapons, ammunition, and equipment—either to replenish its warships and armed merchants or to rapidly establish A2/AD nodes near major maritime choke points. In short, it can disrupt global maritime trade.

Simply by running international ports, China acquires and collects enormous amounts of information on maritime trade flows. It also developed its National Transportation and Logistics Public Information Platform, known as LOGINK, a software system designed to manage global shipping. As John Konrad writes:

  • Initially marketed outside of China in 2010, LOGINK has since expanded its footprint, securing cooperation agreements with at least 24 global ports. Its capacity to amass sensitive business and foreign government data, such as corporate registries, vessel details, and cargo data, has raised significant security concerns.

Quoting a U.S.-China Economic and Security Commission report,48 Konrad adds:

  • COSCO [China COSCO Shipping Corporation] currently operates terminals at Long Beach, Los Angeles, and Seattle, potentially granting LOGINK a window into vessel, container, and other data at those ports.49

This information could provide China with global intelligence on the movement of US forces, materiel, and equipment during a crisis. China could use this intelligence to disrupt the movement of US and allied materiel in the event of conflict. It did so in 2016 when it seized eight Singaporean Terrex infantry carriers as they transited the port of Hong Kong while returning from exercises in Taiwan.50

Due to the United States’ heavy reliance on commercial shipping, some of this maritime traffic will pass through Chinese-controlled ports. Much more will be visible in LOGINK. Both possibilities create opportunities to corrupt logistics databases and even reroute critical items. There is a also concern that the widespread use of Chinese-produced cranes could allow China to disrupt trade in ports it neither owns nor operates.51

The third threat is the potential to use these ports—or even individual piers—to pre-position equipment that could transform each into an intelligence collection node, a rearming point to replenish containerized missiles on Chinese warships or merchant ships, an A2/AD node to disrupt international shipping, or any combination of the three.

In the least aggressive approach, China could employ these ports for intelligence gathering and soft-kill operations. PLA personnel could use pre-positioned electronic warfare (EW) and cyber equipment for offensive operations or as a basis for intelligence collection beyond what is obtained through LOGINK. The PLA could also deploy long-endurance drones or balloons as platforms for multi-spectral, synthetic-aperture radar (SAR), radar, and EW sensors. While permitting the use of these ports in a conflict could legally render the host nation a belligerent, it is not difficult to envision host nations turning a blind eye to drones collecting “weather” or “environmental” information. Nor would it be surprising if the host nations simply pretended not to know about any Chinese intelligence personnel conducting cyber or EW operations from their soil. Every port could become an intelligence collection node along key maritime routes.

The next step would be to use these ports to replenish containerized weapons deployed on Chinese-owned commercial ships. Since these vessels would routinely load and unload containers at the piers, the activity would not appear unusual and would be subtle enough for the host nation to ignore. The PLA has displayed these systems at trade shows since 2022.52 Its systems appear very similar to the Club-K family of containerized missiles that Russia has offered for sale since 2010.53 In recent years, Israel, Iran, the United States, and the Netherlands have also tested containerized missiles. These ports could also be used to rearm People’s Liberation Army Navy (PLAN) ships.

The final—and least likely, but most aggressive—course of action would be to use these ports to establish effective counter-intervention nodes. These nodes would require effective command, control, communications, computers, intelligence, surveillance, and reconnaissance capabilities, as well as anti-ship defenses, anti-air defenses, and EW units. Depending on the location and the potential for US or allied response, they may also require limited ground defenses to protect against attempts to destroy the Chinese weapons systems stationed there.

Prior to a conflict, China could pre-position weapons, ammunition, and equipment without the host nations’ knowledge. The PLA could build significant stockpiles of command and control (C2), EW, cyber, anti-air, anti-ship, and anti-armor equipment and munitions by transporting them in commercial containers via Chinese shipping companies. Upon arrival, they could be unloaded and stored in warehouses or container lots controlled by Chinese companies. Similar to US pre-positioning programs, China would only need to fly in personnel and limited equipment to rapidly establish fully equipped intelligence centers or combat formations. If flights were impossible, smugglers have demonstrated that large numbers of people can be moved in containers on merchant ships.

Weapons and vehicles too large to be containerized could be shipped aboard one of China’s numerous commercial vessels, which could be specifically modified to carry military equipment. Personnel could be flown in or travel with their equipment on these ships.

Given that Chinese forces would likely be focused on air and sea interdiction, these forces would not require large, personnel-intensive infantry, logistics, and aircraft maintenance units. Thus, deployment and employment could be executed rapidly in peacetime. These factors could provide China with robust forces capable of shutting down shipping at maritime choke points across the South China Sea, Indian Ocean, Middle East, and potentially parts of the Atlantic Ocean and Mediterranean Sea.

If these ports are configured to be effective A2/AD nodes, they could be used in two ways. First, China could assert that these forces would not be used unless the United States or its allies attempted to cut off maritime trade to China. Alternatively, China could threaten the maritime trade of individual nations that choose to support the United States. If these threats fail and the United States imposed a distant naval blockade, China could use these nodes to cause massive disruption to global trade.

Meia Nouwens of the International Institute for Strategic Studies says that Chinese leaders understand that an Indo-Pacific war will not be “a short, quick, swift victory after a surprise attack, but [acknowledge] that potential conflict might be protracted, and a war of attrition.”54 China is aware that a prolonged war will be won or lost on economic and industrial resilience. Cutting global trade would significantly and negatively impact US economic and industrial capacity. Chinese leaders are likely aware this step would alienate the international community and perhaps convince some nations to align with the United States. While this is a significant risk, the CCP would have already taken an existential risk (for the party, not the country) by choosing conventional warfare with the United States.

By the same standards, US efforts to disrupt these sites risk alienating host nations. This will be particularly true if the Chinese are merely conducting intelligence-gathering operations without kinetic actions or interference with the host nation’s trade.

US intelligence has tracked China’s development of mainland counter-intervention (A2/AD) capabilities for over a decade. China has spent decades developing the systems and weapons necessary to create overlapping, integrated observation and fire zones at ever-greater distances from its mainland. Today, China is emphasizing the integration of air, land, sea, space, cyber, EW, and information capabilities to maximize the effectiveness of its counter-intervention capability. It is also increasing its inventory of mobile systems and showcasing containerized systems at international trade shows.55

Combined with its ownership and control of overseas ports, this capability gives China the potential to create “pop-up” counter-intervention nodes near critical maritime choke points. The capabilities discussed below can all be deployed to overseas ports using standard shipping containers or roll-on/roll-off (RO/RO) shipping. With the C2 systems, weapons, and munitions pre-positioned in these ports, personnel can be flown in and establish effective units in a matter of days.

Systems China could covertly deploy to overseas ports/bases

Command-and-control systems

The critical asset that will enable China to integrate its wide-ranging locations and coordinate the employment of the systems is an effective global C2 system. The theater commands the PLA established in 2016 are still working toward achieving full joint capability, and none have been designated to conduct the type of operations described in this paper. Therefore, how China would command such an operation remains an open question. To date, the naval headquarters has commanded the PLAN deployments to the Middle East. However, given the PLA’s determined efforts to master joint operations, China is likely developing some form of joint command for overseas deployments.56

The PLA will require a robust C2 with integrated global communications; long-range intelligence, surveillance, and reconnaissance (ISR); EW; and cyber defense. The technical components necessary for such a command structure either already exist or are currently under development.

China is a near-peer or peer in military remote sensing, creating new and enhanced dilemmas for US and allied military planners: The United States will face a PLA with improved intelligence, tracking, and targeting capabilities, complicating efforts to deter or carry out military operations within the second island chain in the Indo-Pacific.57

China has plans to launch twenty-six thousand communication satellites into low-earth orbit (LEO) to provide Starlink-like global broadband capabilities.58 To augment its existing BeiDou Global Navigation Satellite System and ChinaSat communications satellites, China launched Weixing Hulianwan Gaogui-01, its first “high orbit internet satellite.”59 BeiDou, ChinaSat, and Gaogui-01 operate in geosynchronous orbit (GEO).

In December 2023, China launched Yaogan-41, a remote-sensing satellite, into GEO. It added to China’s constellation of 144 Yaogan satellites, providing “an unprecedented ability to identify and track car-sized objects throughout the entire Indo-Pacific.”60 As a GEO orbiting satellite, it provides a constant observation of the same region, unlike LEO satellites, which make intermittent passes. China also operates three Gaofen electro-optical equipped satellites in GEO, with resolutions as precise as 15 meters. In 2023, China launched the world’s only SAR satellite in GEO orbit, enabling the satellite to see through clouds and in darkness.61

These systems will provide a local commander access to Chinese satellite intelligence and can be augmented by long-range drones and balloons. China could deploy its vertically launched Sunflower drones, which have a 1,200-mile range and an 88-pound payload, allowing them to carry various sensors and communications systems. China has already demonstrated its ability to use high-altitude balloons as collection platforms.

The Russo-Ukrainian War has highlighted the importance of effective EW and electronic intelligence systems. It has also demonstrated the growing effectiveness of relatively small EW systems that could easily fit in a TEU. Even before the war in Ukraine, China took steps to strengthen its EW capabilities. In 2015, China established the Strategic Support Force (SSF) to develop and coordinate space, cyber, electronic, and psychological warfare capabilities. In April 2024, China announced that it had split the SSF into three branches: the Information Support Force, Network Space Force, and Military Aerospace Support Force.62 While analysts still do not fully understand how responsibilities will be divided among these new forces, it is clear that China remains committed to enhancing its capabilities in these domains.

A key advantage of these C2 capabilities is that the equipment—and even personnel—can be covertly transported and deployed.

Anti-ship systems

Anti-ship systems, ranging from low-cost weapons to high-end cruise missiles, will be central to any Chinese attempt to use overseas bases and ports to disrupt trade.

Sea mines

Sea mines are among the cheapest and most effective anti-ship systems. Given the widely recognized deficiencies in the US Navy’s modern counter-mine warfare, China is well aware of their effectiveness.63 In 2023, the China Maritime Studies Institute at the US Naval War College’s Center for Naval Warfare Studies noted:

  • China has begun to prioritize mine warfare and the PLAN has a comprehensive, sophisticated sea mine program …. [A] large, diverse inventory of sea mines including advanced variants and trains extensively in minelaying.64

While many studies have focused on China’s use of mines to isolate Taiwan, sea mines are easy to transport and can be covertly deployed by almost any ship. China has designated mine-laying a mission for commercial vessels in its naval reserve. Given the challenges of mine sweeping and the limited capabilities among Western nations, even a small number of mines in maritime choke points could cause long-term trade disruptions. Following the Gulf War, it took Australians almost five months to search “two square kilometres and [deal] with [just] 60 mines.”65 Those mines employed decades-old technology. The modern mines in China’s arsenal will be exponentially more difficult to neutralize. Even if an area can be cleared, it can easily be reseeded by false-flagged commercial or fishing vessels during routine passages through maritime choke points.

Uncrewed aerial vehicles

In Ukraine, UAVs have destroyed targets ranging from individual soldiers to armored vehicles to major industrial facilities and even warships—at distances of up to 1,800 kilometers.66

China is well known for manufacturing most of the world’s quadcopters, but it also produces a family of military drones. China’s FH-901, for example, bears a remarkable resemblance to the US Switchblade.67 These munitions have limited range but carry more powerful warheads than the hobby quadcopters widely used in Ukraine. They would be particularly effective in very restricted waterways such as the Bab al-Mandab Strait.

China’s Sunflower 200 represents a significant leap in capability. Online videos show China developing a launching system similar to Iran’s commercial truck-mounted launcher.68 These relatively inexpensive, mass-produced drones pose a clear threat to merchant shipping as well as commercial and military base facilities.

China is also developing high-performance, long-range drones. The Feihong FH-97A is “capable of ‘all-day, all-weather’ operations in support of reconnaissance and attack missions.”69 The FH-97A bears a striking resemblance to the US XQ-58A Valkyrie, which has a range of 3,500 miles, can carry up to 1,000 pounds, and cruises at Mach 0.7.70 If the FH-97A’s capabilities match those of the Valkyrie, it could provide a globally deployable long-range strike. Given China’s investment in artificial intelligence, it is likely that these aircraft will soon be autonomous—if they are not already.

If concealed in standard shipping containers, these weapons could be quickly shipped into any port controlled by a Chinese company. The FH-97’s estimated 3,000-mile range means it could strike shipping throughout the Indian Ocean, most of the Atlantic, and much of the Pacific from a Chinese-controlled port. Even more concerning, these systems could target fixed air bases or ports supporting US operations.

Uncrewed surface vessels/uncrewed underwater vessels

Over the last two years, Ukraine’s USVs have sunk or damaged Russian naval vessels both in the open sea and in port.71 The China Maritime Studies Institute at the US Naval War College’s Center for Naval Warfare Studies recently reported:

  • “The PLAN either has or is poised to integrate USVs and UUVs into its operational force. It seeks to build larger USVs and UUVs to carry more capable payloads and perform a broader range of operations. Combat USVs are currently undergoing sea trials and AI integration.”72

Potential employment of uncrewed systems

Since most of these systems are small enough to fit in a standard TEU, they are an obvious choice for supporting sea denial operations from overseas ports. Of particular concern is the potential for these drones to hunt autonomously. The map below illustrates the vast areas these drones could cover when launched from Chinese-owned ports. Of course, range rings do not prevent opposing forces from maneuvering within them, but the imminent threat of damage may lead commercial shipping to avoid the area. Illustrative of this point, major shipping firms have largely abandoned the use of the Suez Canal due to the threat of drones and missiles from the Houthis in Yemen.

Multiple rocket launchers

China fields battalions of PCH191 multiple rocket launchers equipped with satellite or inertial navigation systems, capable of firing the TL-7B missile. This missile can conduct sea-skimming flights to deliver a 700-pound warhead at a range of 120 miles.73 While most multiple rocket launchers are too large to fit in a shipping container, the rocket pods themselves fit easily in standard forty-foot-equivalent-unit containers. Over time, China could discreetly transport and stockpile rocket ammunition in Chinese-owned containers within the port. The launchers could then be loaded onto various Chinese-owned RO/RO ships and offloaded just before a campaign begins. The primary disadvantage is that their function would be difficult to conceal if the launchers were observed during loading or unloading.

Cruise missiles

Cruise missiles are proven ship-killers, and several of these systems have capabilities that would enable Chinese-held ports to provide mutual support. China currently fields six major anti-ship cruise missile systems (ASCMs): YJ-12, YJ-18, YJ-21, YJ-62, YJ-83, and CJ-100. These systems carry ship-killing warheads with ranges ranging from 130 to 1,000 miles. All can be embarked on modified RO/RO vessels, while the YJ-18 and YJ-83 can be containerized.

Maximum range of Chinese missiles

Source: Office of the Secretary of Defense 2023. “Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China in 2023.” Washington, DC: Department of Defense.

Anti-ship ballistic missiles

The DF-21D is a road-mobile ballistic missile system with a range of 1,500 kilometers. From mainland China, it can reach most of the South China Sea and significant parts of the Bay of Bengal. The longer-range DF-26 (4,000 kilometers) can cover the entire South China Sea, much of the Indian Ocean, the Red Sea, and the eastern one-third of the Mediterranean Sea.74 The DF-27 has a range between 5,000 and 8,000 kilometers, it is also road-mobile, carries a hypersonic glide vehicle, and, like the DF-26, comes in land-attack and anti-ship variants.75 It can target the Persian Gulf, the Red Sea, and most of the Mediterranean Sea. In short, the PLA can leverage its China-based ballistic missiles to reinforce sea denial operations across most of Asia, the Middle East, and the Mediterranean Sea.

Ground-based anti-air systems

This past year, the challenge of locating and destroying mobile missile systems from the air has been widely demonstrated in both Ukraine and Yemen. This suggests that an effective counter-intervention system composed of mobile missile systems can operate without air defense.76 However, the inclusion of mobile air defense systems would significantly complicate US or allied efforts to regain control of the ports. Unfortunately, China has developed a family of air defense systems that can be easily transported via RO/RO ships or shipped in containers.

In 2022, PLA air defense units focused on enhancing their tactical air defense against low- and slow-moving threats like UAS and loitering munitions to meet evolving air defense requirements.77 Although these systems are primarily designed to counter UAVs, Ukrainian forces have achieved remarkable success using them to destroy Russian helicopters and jets. Larger Ukrainian air defense systems have forced Russian aviation to operate at lower altitudes, bringing with them the engagement range of these lighter systems.

While the anti-UAS systems will be easiest to place in overseas ports, the People’s Liberation Army Air Force also operates a large force of medium and advanced long-range SAM systems. These include Russian-sourced SA-20 (S-300) and SA-21 (S-400) batteries.78 It also fields the domestically produced HQ-9 and HQ-22. The HQ-9 has a range of 120 miles and a maximum altitude of 30,000 meters. Designed to target aircraft, it is typically deployed as a battalion, though even a single battery includes eight transporter erector launchers.79 The HQ-22 has a range of 110 miles and a maximum altitude of 27,000 meters. Often compared to the US Patriot system, it can engage cruise missiles, short-range ballistic missiles, aircraft, and drones.80

These larger systems would require a RO/RO or ferry for deployment. Once operational, they would create an obvious signature but would significantly expand the air defense envelope for hastily established anti-access sites in Chinese-controlled ports. In short, China could rapidly establish an integrated air defense system by unloading large vehicles from Chinese-owned RO/ROs or ferries and integrating them with smaller vehicles and missile stores that had been pre-positioned in the designated port.

Surface warships

China, which already operates the world’s largest navy, plans to continue expanding both the size and capabilities of its surface fleet. By 2035, China will likely be more confident in deploying naval task forces much farther afield. Given its rapid progress in carrier aviation, China will likely possess the capability to launch limited carrier-based aviation in support of surface forces.

The United States must also consider the impact of China placing containerized FH-97A high-performance UAVs—or their successors—on a wide variety of warships and even merchant ships. These UAVs could provide limited air support that outranges projected US naval aircraft. Of particular concern is the potential to arm massive numbers of ships. China currently possesses 3,600 long-range fishing ships and 5,500 large merchant vessels.81 With the addition of containerized weapons, C2 suites, and ISR systems, these ships have the potential to sink most merchant vessels and engage many warships. Furthermore, surface ships could both be reinforced and reinforced by any counter-intervention umbrellas provided by Chinese overseas ports and bases.

Transportation

Chinese firms control either entire ports or individual piers in dozens of locations globally.82 These ports handle tens of thousands of containers daily. Even if the host nation attempted to monitor the contents, it would be virtually impossible—especially since many ports rely on Chinese information systems to track cargo. Thus, China could covertly deliver and store large numbers of containerized C2 systems, weapons, munitions, and supplies without the knowledge of the United States, its allies, or the host nation.

In 2022, China employed thirty RO/ROs in large-scale sealift exercises and further increased production rates, ordering an additional seventy-six for Chinese companies.83 These ships are primarily used to export Chinese cars globally, making their presence a routine part of international shipping.

While a large RO/RO ferry or vehicle carrier could transport more vehicles or troops, a single armored unit—consisting of approximately one hundred and fifty vehicles and one thousand personnel—is a reasonable estimate of what these civilian ships would likely carry in practice.84 If a host nation is friendly to China, the PLA could also use its growing inventory of amphibious shipping, long-range military aircraft, and commercial planes to rapidly position its forces.

Potential force for the overseas mission

The PLA possesses all the necessary equipment to exploit its overseas bases and ports. But which Chinese unit could execute such a mission? In October 2021, the China Maritime Studies Institute at the US Naval War College reported:

  • Since 2017, the PLAN Marine Corps increased from two to eight brigades – six Marine Brigades, one Maritime Aviation Brigade, and one Special Operations Brigade. The Special Operations Brigade are fashioning themselves after US Navy SEALs.85

In a January 2024 article, Task & Purpose paraphrased Timothy Heath, a senior international defense researcher at the RAND Corporation, as saying:

  • Chinese leaders have said they plan to [further] expand the size of the People’s Liberation Army Navy Marine Corps because they anticipate facing a higher demand for ground forces that can carry out a wide range of missions abroad.86

Since the People’s Liberation Army Navy Marine Corps already maintains a battalion-sized force in Djibouti, it is well-positioned to adapt to the fundamentally new mission of establishing covert forces at overseas stations.

Missions of US forces

The potential for China to employ its overseas ports and facilities in a significant conflict presents a serious challenge for US forces. Yet, the challenge lies well within the US Navy’s traditional missions. The 2020 Naval Doctrine Publication 1: Naval Warfare features this quote from Admiral Raymond A. Spruance as a clear statement that the most critical wartime mission for the navy/Marine Corps team is sea control:

  • I can see plenty of changes in weapons, methods, and procedures in naval warfare brought about by technical developments, but I can see no change in the future role of our Navy from what it has been for ages past for the Navy of a dominant sea power to gain and exercise the control of the sea… 87

In a long war with China, a foundational mission of US naval forces will be to reestablish and maintain sea control to sustain allied wartime production while severely restricting China’s access to the raw materials essential to its wartime economy.

The emergence of persistent surveillance technologies, along with long-range, mobile, land-based anti-ship missiles, rockets, and drones means that land-based systems can, at times, deny China access to key maritime choke points.

Unfortunately, the PLA arrived at this conclusion much earlier than the United States and has systematically developed a land-based A2/AD capability with deep magazines and redundant coverage extending to increasing ranges from the shore. The Chinese have worked hard to ensure these systems are mobile and, therefore, much more difficult to defeat. While China’s focus to date has been on protecting the Chinese mainland and its near seas, the growing global trend of containerizing effective anti-air, anti-ship, and long-range strike weapons creates new options for the global deployment and employment of these systems.

Pre-conflict, the Joint Force cannot prevent China from leveraging its overseas ports and control of shipping data to disrupt the movement of allied material or to conceal its own material shipments.

Upon the commencement of hostilities, the Joint Force will require an operational approach suited to a war of exhaustion. National command authority will need to establish priorities among competing global demands. While it is impossible to predict how senior officials will prioritize, the Joint Force must be prepared to execute the following tasks in support of sea control:

  1. Locate and neutralize Chinese efforts to interrupt global trade.
  2. Establish effective blockades to severely degrade Chinese international trade.

Fortunately, these two missions will draw on different elements of the Joint Force. Unfortunately, the current US Navy thirty-year shipbuilding plan suggests the fleet will be too small to execute a worldwide campaign against Chinese forces and facilities. The US Navy’s combat forces will be insufficient to confront the world’s largest navy and maintain global sea control. To succeed, they will require support from elements of the Joint Force that are not fully engaged. Most analysts predict that the opening campaigns of a US-China conflict will be primarily air and sea battles. If this holds true, the US Army and US Marine Corps will likely not be fully committed.

Potential roles for land-based forces in establishing global sea control

Locate and neutralize Chinese efforts to disrupt military logistics and global trade.

Given the enormous distances involved and the reliance of the United States and its allies on maritime logistics, the first mission must neutralize Chinese efforts to disrupt military logistics. As part of this effort, major fleet and air combat elements must focus on preventing the PLAN from breaking out of the First Island Chain. If granted permission to operate ashore, the Marine Littoral Regiments and Army Multi-Domain Task Forces can provide direct support to this mission. If not, these units have the potential to operate from amphibious or merchant ships. Both services have demonstrated the ability to launch anti-ship cruise missiles from containers, and both could provide helicopter-borne boarding teams to seize ships at sea.

While containing the PLAN is the priority mission, neutralizing Chinese efforts to disrupt trade will also require removing Chinese forces from ports and bases overseas. If equipped as described above, these ports and bases would be capable of interdicting shipping at key maritime choke points. Eliminating this threat will require significant, capable combat forces. However, until these Chinese forces can be reduced, the United States and its allies could establish alternative routes that bypass the South and East China Seas, allowing shipping to reach key allied states such as Japan, South Korea, and the Philippines. These alternative routes would enable US and allied forces to focus first on clearing the key choke points in the Middle East.

A primary challenge to US and allied forces will be determining the strength and disposition of PLA forces in targeted locations. Each plan of action will require a unique approach based on the PLA forces in place, their activities, the host nation’s stance toward both Chinese and US actions, and the availability of joint or combined forces. The same tactics currently planned for degrading China’s mainland A2/AD network will apply to mini A2/AD locations but will require modification based on these conditions.

Given the extended range of Chinese aerial drones, basing aircraft such as the F-35 within range of the weapons systems deployed to Chinese ports would pose a major risk of destruction on the ground or aboard a ship. This risk is particularly high if the base or port has stockpiles of Sunflower drones. The additional presence of FH-97A drones would dramatically extend the range of the threat and pose a significant danger to any aerial tankers used to extend the range of US aircraft.

While US long-range bombers are an obvious first choice to destroy identified targets in these ports, there is a high probability these assets will be tasked with other missions. In any case, the missile batteries assigned to US ground units could provide the initial firepower needed to degrade the port or base’s defenses. As US and allied ground forces continue to field batteries capable of firing Tomahawk Land Attack Missiles, SM-6s, and Precision Strike Missiles, they will be able to match the range of potential Chinese A2/AD systems forward-deployed to ports and bases. Both services need to train to operate these batteries from both naval and commercial ships.

A second, significantly cheaper option would be for naval forces to develop long-range, containerized loitering munitions similar to the Sunflower and deploy them from the proposed Marine Landing Ships Medium (LSM) or small merchant ships. The predicted collapse of global trade at the onset of a US-China war suggests that many merchant ships will be available.88 The United States should be able to rapidly produce a drone with Sunflower-level capabilities. These systems’ smaller payloads would minimize collateral damage in key international ports. If the Marine Corps continues developing the XQ-58A Valkyrie, the Fleet Marine Force could employ its derivatives from distances exceeding the range of Chinese weapons likely to be at contested ports.

Another option to overcome the tyranny of distance is pre-positioned warehouses that could supply fly-in forces ashore to counter the Chinese pop-up bases. However, this would require permission from both the host nation and major investments in pre-positioning facilities and equipment. Chinese intelligence will likely know where the pre-positioned equipment is located, enabling Chinese missile and drone forces to attack the warehouses or the unloading Maritime Prepositioning Ships as part of the opening volleys of the war.

If host nations will not permit pre-positioning of US forces in the region, or the United States chooses not to, missile batteries could be deployed on the proposed LSMs or merchant ships as afloat pre-positioned batteries. Marines and soldiers could be flown in to meet these ships and then operate from them. This would eliminate the requirement for host nation permission and reduce the vulnerability inherent in unloading.

The Marine Corps should also adopt the US Air Force’s Rapid Dragon concept to use C-130s and MV-22s to provide a longer-range strike capability than available from the F-35.89 The Rapid Dragon program loads cruise missiles onto pallets. These pallets are then air-dropped from the aft bay of a cargo aircraft. The missiles fall free, ignite, and proceed to their targets as normal. These platforms could deliver cruise missiles for a fraction of the cost of F-35s. The use of Rapid Dragon technology would also free up F-35s for other essential operations against the PLA. To further reduce costs, the United States should pursue the air force’s Grey Wolf/Golden Horde low-cost cruise missile program, which is a fraction of the cost of more advanced cruise missiles operated by the Joint Force.90

As Chinese long-range systems are eliminated, US and allied forces could close the range to conduct a suppression of enemy air defenses campaign against remaining Chinese air defenses. However, as the Ukrainians have demonstrated, mobile anti-air systems are exceptionally difficult to destroy. Allied forces will need to develop tactics, techniques, procedures, and equipment that will allow them to successfully engage mobile air defense systems. Once the long-range and anti-air capabilities have been stripped away, US or allied ground forces, in cooperation with host nation forces (if available), can clear the ports and bases of Chinese weapons.

The final, and perhaps most time-consuming, action will be mine clearance operations. Even with allied assistance, clearing mines—particularly modern smart mines—will be a major challenge. Further, China may elect to re-seed minefields using merchant and fishing vessels flying false flags. The US Navy currently severely underinvests in mine clearance capabilities, and this underinvestment seems unlikely to change by 2035.

Establish effective blockades to severely degrade Chinese international trade.

To reduce the strain on US naval and air power, the second mission—establishing an effective blockade—can be built around air-capable amphibious ships, container ships converted to operate light helicopters, operational light helicopter squadrons, Littoral Combat Ships (LCSs) with ASCMs (or containerized ASCMs aboard the amphibious ships), ISR assets, and Marine or army infantry units. In short, new units or equipment would not be required, but existing forces would need to be trained in planning and executing blockade operations.

The limited number of exits from the South and East China Seas significantly reduces blockade requirements. Additionally, crippling China’s economy does not require stopping all shipping—only large container ships, tankers, and bulk carriers, which are easier to track. With accurate intelligence on the movement of large Chinese commercial ships, US and allied blockade forces would be able to operate near the restricted passages south of the Bashi Channel.

Small task forces composed of helicopter-capable ships, infantry boarding parties trained to fast-rope, light helicopters, LCSs, or container ships armed with ASCMs and drones could be stationed to cover each of the major exits from the South China Sea. The United States must establish procedures and units for taking command of seized ships, moving them to a quarantine area, and passing control to a prize court to adjudicate their disposition.

If granted host nation permission, the Joint Force can establish support facilities near major choke points. These facilities would provide basing for persistent ISR of the choke points. They can also be used to resupply and maintain blockade ships and aircraft. If host nations along the First Island Chain refuse, maintaining the blockade will be more difficult but could still be supported from Guam and, if permitted, northern Australian ports. This approach would require the commitment of most of the US Navy’s large amphibious ships, which could be augmented by allied amphibious ships. While sufficient amphibious ships may be unavailable, container ships can be quickly modified to house light helicopters and boarding parties. The navy and Marine Corps developed this capability in the 1990s, designating the ships as T-AVBs. 91

Should maintaining a blockade at the First Island Chain become untenable, the blockade can shift back to the Malacca, Sunda, and Lombok Straits, as well as the passages north and south of Australia. These straits are very narrow: the Malacca Strait is only 1.8 nautical miles wide at its narrowest point, the Sunda Strait is 2.4 nautical miles wide, and the Lombok Strait is 5.4 nautical miles wide.92

A final blockade line could be established at the Strait of Hormuz, Bab el-Mandeb, and Cape of Good Hope. Hormuz and Bab el-Mandeb are particularly narrow. Even from the Cape of Good Hope, the blockade force could interrupt trade between China and Europe or the Middle East. While the passages around Australia and the Cape of Good Hope extend for hundreds of miles, long-endurance drones and satellites can track large vessels and provide intercept paths for blockade forces.

The blockading force will challenge designated ships and direct them to prepare to receive a boarding party. Most commercial ships will comply to avoid the damage associated with being stopped by force. Many crews will likely agree to stay on board, particularly if they are paid at union rates and guaranteed a flight home upon arrival in port. If necessary, the blockading force could employ light attack helicopters to engage ships that refuse orders. When a target ship complies, Marines or soldiers could fast-rope onto the vessel as necessary to seize control and then direct it to a designated anchorage. Upon arrival, the ship could be turned over to contractors for anchor watch until it can be adjudicated by a prize court.

Of course, if the PLA makes a significant effort to penetrate the blockade, major US Pacific Fleet combat elements will be required to intercept and engage the PLA force. Such a mission would align with the primary objective of containing the PLAN inside the First Island Chain.

New capabilities required for this mission

Neutralizing Chinese overseas A2/AD bastions and supporting blockade operations are appropriate roles for ground forces as part of a joint campaign. In addition to already programmed units and equipment, the forces will require:

  • Persistent satellite ISR coverage of maritime choke points and Chinese overseas bases/ports. This will require access to national and commercial space assets.
  • Long-range, but more affordable, ISR drones like the Flexrotor commercial drone.
  • Ground-based, persistent, all-weather ISR that can be inserted from range and operate undetected near a Chinese facility.
  • Large numbers of autonomous, GPS-independent drones as substitutes for current aviation capabilities.
  • A Rapid Dragon-like capability to enable long-range strikes.
  • A Starlink-like communications network to provide high-speed communications for widely dispersed units.
  • Access to naval and commercial shipping to deploy and operate in target areas.
  • Missile/rocket batteries trained to operate from commercial or amphibious ships.
  • Task forces consisting of infantry and light helicopters trained to seize commercial ships while operating from non-doctrinal platforms.
  • Task forces trained to fight in complex urban and port environments to execute the final stage of clearing Chinese overseas bases and ports.
  • Offensive mine warfare capabilities to close certain passages and compensate for shortages in other capabilities.
  • Major investments in mine-clearing capabilities.

Conclusion

This paper aimed to examine low-probability but potentially high-impact ways China could exploit its growing global network of ports. Defeating these Chinese operations would strain the capacity of US joint forces but would not require expensive new capabilities. As noted, by focusing on relatively inexpensive drones, commercial shipping, and containerized weapons, US forces can position themselves to neutralize Chinese actions at overseas ports. While drones represent a minor part of the United States’ current force structure, the Russo-Ukrainian War has dramatically illustrated their increasing value to the Joint Force. Even at its usual slow pace, the Department of Defense should be able to rapidly field large numbers of autonomous drones and loitering munitions.

Finally, preparing to counter these Chinese actions will require planning with allies, training for blockade and port seizure operations, and integrating the new capabilities into operational forces. These are not expensive options, but they are necessary if the Joint Force is to be ready at the onset of war.

About the author

T. X. Hammes is a distinguished research fellow at the Center for Strategic Research, National Defense University. The views expressed here are his own and do not reflect the views of the Department of Defense or the National Defense University.

Related content

Explore the program

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

1    DOD Dictionary of Military and Associated Terms (Washington, DC: Department of Defense, March 2017), https://www.tradoc.army.mil/wp-content/uploads/2020/10/AD1029823-DOD-Dictionary-of-Military-and-Associated-Terms-2017.pdf.
2    Williamson Murray, The Dark Path: The Structure of War and the Rise of the West (New Haven, CT: Yale University Press, 2024), 7.
3    Wilson Beaver and Jim Fein, “The U.S. Needs More Munitions To Deter China,” Heritage Foundation, December 29, 2023, https://www.heritage.org/defense/commentary/the-us-needs-more-munitions-deter-china.
4    Andrew F. Krepinevich, Jr., Protracted Great-Power War: A Preliminary Assessment, Center for New American Security, February 5, 2020, 1, https://www.cnas.org/publications/reports/protracted-great-power-war.
5    Ely Ratner, Geostrategic and Military Drivers and Implications of the Belt and Road Initiative, Council on Foreign Relations, January 25, 2018, https://www.cfr.org/report/geostrategic-and-military-drivers-and-implications-belt-and-road-initiative.
6    Zongyuan Zoe Liu, “Tracking China’s Control of Overseas Ports,” Council on Foreign Relations, updated August 26, 2024, https://www.cfr.org/tracker/china-overseas-ports.
7    “How Ukraine uses cheap AI-guided drones to deadly effect against Russia,” Economist, December 2, 2024, https://www.economist.com/europe/2024/12/02/how-ukraine-uses-cheap-ai-guided-drones-to-deadly-effect-against-russia.
8    Olena Harmash, “Ukraine ramps up arms production, can produce 4 million drones a year, Zelenskiy says,” Reuters, October 2, 2024, https://www.reuters.com/world/europe/ukraine-ramps-up-arms-production-can-produce-4-million-drones-year-zelenskiy-2024-10-02/.
9    Christina L. Garafola, Stephen Watts, and Kristin J. Leuschner, China’s Global Basing Ambitions: Defense Implications for the United States, RAND Arroyo Center, December 8, 2022, https://www.rand.org/pubs/research_reports/RRA1496-1.html.
10    Aadil Brar, “Chinese Warships Permanently Deployed at New Overseas Naval Base,” Newsweek, April 26, 2024, https://www.newsweek.com/china-cambodia-ream-new-permanent-naval-base-1894012.
11    Liz Sly and Julia Ledur, “China has acquired a global network of strategically vital ports,” Washington Post, November 6, 2023, https://www.washingtonpost.com/world/interactive/2023/china-ports-trade-military-navy/.
12    Garafola, Watts, and Leuschner, China’s Global Basing Ambitions, 11.
13    Isaac B. Kardon and Wendy Leutert, “Pier Competitor: China’s Power Position in Global Ports,” International Security 46, no. 4 (2022): 10, https://doi.org/10.1162/isec_a_00433.
14    Kardon and Leutert, “Pier Competitor.”
15    Navya Mudunuri, “The Malacca Dilemma and Chinese Ambitions: Two Sides of a Coin,” Diplomatist, July 7, 2020, https://diplomatist.com/2020/07/07/the-malacca-dilemma-and-chinese-ambitions-two-sides-of-a-coin/.
16    Ji Siqi, “What is the China-Europe Railway Express, and how much pressure is it under from the Ukraine crisis?” South China Morning Post, March 6, 2022, https://www.scmp.com/economy/global-economy/article/3169239/what-china-europe-railway-express-and-how-much-pressure-it.
17    “China Container Port Throughput,” CEIC, last updated December 2021, https://www.ceicdata.com/en/indicator/china/container-port-throughput.
18    “Russian Railways predicted a four-fold increase in container transit,” ERAI, March 28, 2023, archived at Internet Archive, November 2, 2024, https://web.archive.org/web/20241102153525/https://index1520.com/en/analytics/rzhd-sprognozirovali-rost-tranzita-konteynerov-v-chetyre-raza/.
19    “The Kazakh-Chinese border remains an obstacle for rail traffic,” RailFreight.com, September 26, 2024, https://www.railfreight.com/beltandroad/2024/09/26/the-kazakh-chinese-border-remains-an-obstacle-for-rail-traffic/.
20    Shan Wu Su, “China’s Rail Diplomacy in Southeast Asia,” Asia-Pacific Journal, September 22, 2024, https://apjjf.org/2024/9/wu.
21    Umair Jamal, “China-Pakistan Ties Steam Ahead With Proposed Rail Project,” Diplomat, May 3, 2023, https://thediplomat.com/2023/05/sino-pakistani-ties-steam-ahead-with-proposed-rail-project/.
22    “China Begins Surveys for Railway on Myanmar’s Indian Ocean,” Irrawaddy, April 18, 2024, https://www.irrawaddy.com/news/burma/china-begins-surveys-for-railway-on-myanmars-indian-ocean.html.
23    C. Textor, “Primary energy consumption in China from 2019 to 2022, by fuel,” Statista, January 24, 2024, https://www.statista.com/statistics/265612/primary-energy-consumption-in-china-by-fuel-type-in-oil-equivalent/.
24    Avery Chen, “China’s coal imports headed for record year in 2023,” S&P Global, June 20, 2023, https://www.spglobal.com/marketintelligence/en/news-insights/latest-news-headlines/china-s-coal-imports-headed-for-record-year-in-2023-76185032.
25    Ariel Cohen, “China’s Energy Vulnerabilities Drive Xi’s Policies,” Forbes, October 19, 2022, https://www.forbes.com/sites/arielcohen/2022/10/19/chinas-energy-vulnerabilities-drive-xis-policies/.
27    Gabriel Collins, “A Maritime Oil Blockade Against China—Tactically Tempting but Strategically Flawed,” Naval War College Review 71, no. 2 (Spring), https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1735&context=nwc-review.
28    “Why is Xi Jinping building?”
29    “China,” U.S Energy Information Administration, updated November 14, 2023, https://www.eia.gov/international/analysis/country/CHN.
30    Zongyuan Zoe Liu, “China Increasingly Relies on Imported Food. That’s a Problem,” Council on Foreign Relations, January 25, 2023, https://www.cfr.org/article/china-increasingly-relies-imported-food-thats-problem.
31    Matteo Cavallito, “China launches a new initiative against soil pollution,” Re Soil Foundation, December 1, 2022, https://resoilfoundation.org/en/environment/china-soil-pollution.
32    Claudio O. Delang, “The consequences of soil degradation in China: a review,” GeoScape 12, no. 2 (December 2018): 92–103, DOI:10.2478/geosc-2018-0010.
33    Liu, “China Increasingly Relies on Imported Food.”
34    “Why is Xi Jinping building?”
35    “Could economic indicators give an early warning of a war over Taiwan?” Economist, July 27, 2023, https://www.economist.com/china/2023/07/27/could-economic-indicators-signal-chinas-intent-to-go-to-war.
36    Henry Storey, “Water scarcity challenges China’s development model,” Interpreter, September 29, 2022, https://www.lowyinstitute.org/the-interpreter/water-scarcity-challenges-china-s-development-model.
37    “China Imports of Non-food Raw Materials,” Trading Economics, last updated February 2024, https://tradingeconomics.com/china/imports-of-non-food-raw-materials.
38    Clyde Russell, “China’s iron ore imports may hold up despite gloomy economy,” Reuters, August 15, 2023, https://www.reuters.com/markets/commodities/chinas-iron-ore-imports-may-hold-up-despite-gloomy-economy-2023-08-15.
39    C. Textor, “Production of iron ore in China from 2010 to 2022,” Statista, February 9, 2024, https://www.statista.com/statistics/307473/china-iron-ore-production/.
40    GlobalData, “Copper production in China and major projects,” Mining Technology, updated August 23, 2024, June 28, 2023, https://www.mining-technology.com/data-insights/copper-in-china/?cf-view.
41    “Copper ores and concentrates | Imports and Exports | 2022,” TrendEconomy, January 28, 2024, https://trendeconomy.com/data/commodity_h2/2603.
42    Wenyi Zhang, “Ship tonnage in orderbook of Chinese shipbuilding industry 2014-2021,” Statista, December 20, 2024, https://www.statista.com/statistics/1064122/china-tonnage-in-orderbook-of-shipbuilding-industry/.
43    “Trade (% of GDP) – China,” World Bank Group, accessed October 30, 2024, https://data.worldbank.org/indicator/NE.TRD.GNFS.ZS?locations=CN.
44    Kardon and Leutert, “Pier Competitor.”
45    David Wheelock, “How Bad Was the Great Depression? Gauging the Economic Impact,” Federal Reserve Bank of St. Louis, video, July 11, 2013, https://www.stlouisfed.org/the-great-depression/curriculum/economic-episodes-in-american-history-part-3.
46    David C. Gompert, Astrid Stuth Cevallos, and Cristina L. Garafola, War with China: Thinking Through the Unthinkable, RAND, 2016, https://www.rand.org/content/dam/rand/pubs/research_reports/RR1100/RR1140/RAND_RR1140.pdf.
47    Joel Wuthnow, System Overload: Can China’s Military Be Distracted in a War over Taiwan? in China Strategic Perspectives, no. 15, ed. Phillip C. Saunders (Washington, DC: National Defense University Press, June 2020) https://inss.ndu.edu/Media/News/Article/2232448/system-overload-can-chinas-military-be-distracted-in-a-war-over-taiwan/.
48    USCC Staff, “LOGILINK: Risks from China’s Promotion of a Global Logistics Management Platform,” US-China Economic and Security Review Commission, September 20, 2022, https://www.uscc.gov/sites/default/files/2022-09/LOGINK-Risks_from_Chinas_Promotion_of_a_Global_Logistics_Management_Platform.pdf.
49    John Konrad, “U.S. Sounds Alarm on China’s Leading Ship Logistics Software LOGINK,” gCaptain, August 24, 2023, https://gcaptain.com/u-s-sounds-alarm-on-chinas-ship-logistics-software-logink/.
50    Euan Graham, “China pressures Singapore with seizure of military hardware,” Lowy Institute, December 6, 2016, https://www.lowyinstitute.org/publications/china-pressures-singapore-seizure-military-hardware.
51    Isaac B. Kardon, “Washington Tackles a New National Security Threat: Chinese-Made Cranes,” Carnegie Endowment for International Peace, February 28, 2024, https://carnegieendowment.org/2024/02/28/washington-tackles-new-national-security-threat-chinese-made-cranes-pub-91843.
52    “#36 – China’s Container-launched Cruise Missiles,” Vermilion China, February 23, 2023, https://www.vermilionchina.com/p/36-chinas-container-launched-cruise.
54    Rhyannon Bartlett-Imadegawa, “China preparing for ‘protracted’ war, says think tank,” Nikkei Asia, February 14, 2024, https://asia.nikkei.com/Politics/Defense/China-preparing-for-protracted-war-says-think-tank.
55    “#36 – China’s Container-launched.”
56    Phillip C. Saunders, Beyond Borders: PLA Command and Control of Overseas Operations, Strategic Forum no. 306 (July 2020), Institute for National Strategic Studies, National Defense University, https://inss.ndu.edu/Portals/68/Documents/stratforum/SF-306.pdf.
57    Tate Nurkin, et.al., China’s Remote Sensing, OTH Intelligence Group LLC, December 2024, https://www.uscc.gov/sites/default/files/2024-12/Chinas_Remote_Sensing.pdf.
58    Shunsuke Tabeta, “China to launch 26,000 satellites, vying with U.S. for space power,” Nikkei Asia, January 10, 2024, https://asia.nikkei.com/Business/Aerospace-Defense-Industries/China-to-launch-26-000-satellites-vying-with-U.S.-for-space-power.
59    Andrew Jones, “China launches first high orbit internet satellite,” Space News, February 29, 2024, https://spacenews.com/china-launches-first-high-orbit-internet-satellite/.
60    Clayton Swope, “No Place to Hide: A Look into China’s Geosynchronous Surveillance Capabilities,” Center for Strategic and International Studies, January 19, 2024, https://www.csis.org/analysis/no-place-hide-look-chinas-geosynchronous-surveillance-capabilities.
61    Swope, “No Place to Hide.”
62    Dean Cheng, “Why Xi created a new Information Support Force, and why now,” Breaking Defense, April 29, 2024, https://breakingdefense.com/2024/04/why-xi-created-a-new-information-support-force-and-why-now/.
63    Jan Tegler, “Navy Mine Warfare Teeters Between Present, Future,” National Defense, January 17, 2023, https://www.nationaldefensemagazine.org/articles/2023/1/17/navy-mine-warfare-teeters-between-present-future.
64    Quick Look Report: Chinese Undersea Warfare: Development, Capabilities, Trends, China Maritime Studies Institute, Center for Naval Warfare Studies, US Naval War College, May 2023, https://www.andrewerickson.com/wp-content/uploads/2023/05/Naval-War-College_China-Maritime-Studies-Institute_CHINESE-UNDERSEA-WARFARE_CONFERENCE-SUMMARY_20230505.pdf.
65    Elizabeth White, “Sea mines are cheap and low-tech, but they could stop world trade in its tracks,” Strategist, March 6, 2020, https://www.aspistrategist.org.au/sea-mines-are-cheap-and-low-tech-but-they-could-stop-world-trade-in-its-tracks/.
66    Leo Chiu, “Ukraine’s Drone Strike Radius Now 1,800 km – What’s on Kyiv’s Target List?” Kyiv Post, September 9, 2024, https://www.kyivpost.com/post/38716.
67    “Airshow China 2022: CASC unveils FH-97A loyal wingman autonomous drone,” Global Defense News, November 9, 2022, https://armyrecognition.com/news/aerospace-news/2022/airshow-china-2022-casc-unveils-fh-97a-loyal-wingman-autonomous-drone.
68    Daria Dmytriieva, “China unveiled a new kamikaze drone: Improved copy of Iranian Shahed,” RBC-Ukraine, August 17, 2023, https://newsukraine.rbc.ua/news/china-unveiled-a-new-kamikaze-drone-improved-1692269951.html.
69    Ritu Sharma, “‘Catching-Up’ With China, US Pushes Its 6th-Gen Combat Drone Program; Set To Award Contract For 1st Batch Of CCA,” Eurasian Times, February 14, 2024, https://www.eurasiantimes.com/us-accelerates-combat-drone-program-to-catch/.
70    Colin Demarest, “AI-enabled Valkyrie drone teases future of US Air Force fleet,” Defense News, January 18, 2024, https://www.defensenews.com/unmanned/uas/2024/01/18/ai-enabled-valkyrie-drone-teases-future-of-us-air-force-fleet/.
71    Claudia Chiappa, “Russia to build naval base in breakaway Georgia region,” Politico, October 5, 2023, https://www.politico.eu/article/vladimir-putin-russia-black-sea-abkhazia-plans-to-build-naval-base-in-georgias-breakaway-region-as-it-pulls-vessels-from-sevastopol-base/.
72    Quick Look Report.
73    Joshua Arostegui, China Maritime Report No. 32: The PCH191 Modular Long-Range Rocket Launcher: Reshaping the PLA Army’s Role in a Cross-Strait Campaign, China Maritime Studies Institute, US Naval War College, November 3, 2023, https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1031&context=cmsi-maritime-reports.
74    “Missiles of China,” Missile Threat, CSIS Missile Defense Project, Center for Strategic and International Studies, updated April 12, 2021, https://missilethreat.csis.org/country/china/.
75    Zuzanna Gwadera, “Intelligence leak reveals China’s successful test of a new hypersonic missile,” International Institute of Strategic Studies, May 18, 2023, https://www.iiss.org/en/online-analysis/online-analysis/2023/05/intelligence-leak-reveals-chinas-successful-test-of-a-new-hypersonic-missile/.
76    Maximillian K. Bremer and Kelly A. Grieco, “Air denial: The dangerous illusion of decisive air superiority,” Atlantic Council, August 30, 2022, https://www.atlanticcouncil.org/content-series/airpower-after-ukraine/air-denial-the-dangerous-illusion-of-decisive-air-superiority/.
77    Office of the Secretary of Defense, Military and Security Developments Involving the People’s Republic of China 2023, Annual Report to Congress, US Department of Defense, October 19, 2023, https://media.defense.gov/2023/Oct/19/2003323409/-1/-1/1/2023-MILITARY-AND-SECURITY-DEVELOPMENTS-INVOLVING-THE-PEOPLES-REPUBLIC-OF-CHINA.PDF.
78    Office of the Secretary of Defense, Military and Security Developments, 64.
79    US Army, “HQ-9 (Hong Qi 9) Chinese 8×8 Long-Range Air Defense Missile System,” Operational Data Integration Network (ODIN), accessed October 30, 2024, https://odin.tradoc.army.mil/WEG/Asset/HQ-9.
80    “HQ-22 / FK-3 – Surface-to-Air Missile,” Global Security, accessed X, https://www.globalsecurity.org/military/world/china/hq-22.htm.
81    “China’s deep-water fishing fleet is the world’s most rapacious,” Economist, December 8, 2022, https://www.economist.com/international/2022/12/08/chinas-deep-water-fishing-fleet-is-the-worlds-most-rapacious; Xioashan Xue, “As China Expands Its Fleets, US Analysts Call for Catch-up Efforts,” Voice of America, September 13, 2022, https://www.voanews.com/a/as-china-expands-its-fleets-us-analysts-call-for-catch-up-efforts-/6746352.html.
82    Kardon and Leutert, “Pier Competitor.”
83    Matthew P. Funaiole et al., “China Accelerates Construction of ‘Ro-Ro’ Vessels, with Potential Military Implications,” China Power, Center for Strategic and International Studies, October 11, 2023, https://chinapower.csis.org/analysis/china-construct-ro-ro-vessels-military-implications/.
84    J. Michael Dahm, China Maritime Report No. 25: More Chinese Ferry Tales: China’s Use of Civilian Shipping in Military Activities, 2021-2022, China Maritime Studies Institute, US Naval War College, January 2023, https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1024&context=cmsi-maritime-reports.
85    John Chen and Joel Wuthnow, China Maritime Report No. 18:Chinese Special Operations in a Large-Scale Island Landing, China Maritime Studies Institute, US Naval War College, January 2022, https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1017&context=cmsi-maritime-reports.
86    Jeff Schogol, “China is expanding its marine corps, but how capable is it?” Task & Purpose, January 25, 2024, https://taskandpurpose.com/news/china-marine-corps/.
87    Naval Doctrine Publication 1: Naval Warfare (Washington, DC: Department of the Navy, April 2020), https://cimsec.org/wp-content/uploads/2020/08/NDP1_April2020.pdf.
88    Captain R. Robinson Harris et al., “Converting Merchant Ships to Missile Ships for the Win,” Proceedings 145/1/1,391 (January 2019), US Naval Institute, https://www.usni.org/magazines/proceedings/2019/january/converting-merchant-ships-missile-ships-win.
89    Max Hauptman, “Air Force shows off its Rapid Dragon cruise missile system on China’s doorstep,” Task and Purpose, July 26, 2023, https://taskandpurpose.com/news/air-force-rapid-dragon-mobility-guardian-2023/.
90    “Rapid Dragon,” Air Force Research Laboratory, accessed X, https://afresearchlab.com/technology/rapid-dragon.
91    Mark L. Evans, “Wright III (T-AVB-3),” Naval History and Heritage Command, updated October 4, 2024, https://www.history.navy.mil/content/history/nhhc/research/histories/ship-histories/danfs/w/wright-iii–t-avb-3-.html.
92    Fiona S. Cunningham, “The Maritime Rung on the Escalation Ladder: Naval Blockades in a US-China Conflict,” Security Studies 29, no. 4 (2020): 730–768 https://doi.org/10.1080/09636412.2020.1811462.

The post China’s exploitation of overseas ports and bases appeared first on Atlantic Council.

]]>
Warrick quoted in the Associated Press on cuts to the Department of Homeland Security   https://www.atlanticcouncil.org/insight-impact/in-the-news/warrick-quoted-in-the-associated-press-on-cuts-to-the-department-of-homeland-security/ Thu, 20 Mar 2025 17:15:40 +0000 https://www.atlanticcouncil.org/?p=834595 On March 18, Thomas Warrick, a nonresident senior fellow with the Adrienne Arsht National Security Resilience Initiative, was quoted in the Associated Press on personnel cuts to the Department of Homeland Security’s Center for Prevention Programs and Partnerships. He argues that the center is central in averting terrorist attacks by identifying individuals before they perpetrate […]

The post Warrick quoted in the Associated Press on cuts to the Department of Homeland Security   appeared first on Atlantic Council.

]]>

On March 18, Thomas Warrick, a nonresident senior fellow with the Adrienne Arsht National Security Resilience Initiative, was quoted in the Associated Press on personnel cuts to the Department of Homeland Security’s Center for Prevention Programs and Partnerships. He argues that the center is central in averting terrorist attacks by identifying individuals before they perpetrate acts of violence.  

What they really need to do is to expand [the Center for Prevention Programs and Partnerships], not cut it back.

Thomas Warrick

The post Warrick quoted in the Associated Press on cuts to the Department of Homeland Security   appeared first on Atlantic Council.

]]>
Kroenig quoted in the Washington Post on the similarities between Reagan and Trump’s foreign policy https://www.atlanticcouncil.org/insight-impact/in-the-news/kroenig-quoted-in-the-washington-post-on-the-similarities-between-reagan-and-trumps-foreign-policy/ Tue, 11 Mar 2025 14:42:45 +0000 https://www.atlanticcouncil.org/?p=831697 On March 9, Matthew Kroening, vice president and senior director of the Scowcroft Center, was quoted in the Washington Post on the “fusion” of foreign policy priorities between former US President Ronald Reagan and current US President Donald Trump. He argues, in line with his newest book We Win, They Lose: Republican Foreign Policy & […]

The post Kroenig quoted in the Washington Post on the similarities between Reagan and Trump’s foreign policy appeared first on Atlantic Council.

]]>

On March 9, Matthew Kroening, vice president and senior director of the Scowcroft Center, was quoted in the Washington Post on the “fusion” of foreign policy priorities between former US President Ronald Reagan and current US President Donald Trump. He argues, in line with his newest book We Win, They Lose: Republican Foreign Policy & the New Cold War, that American exceptionalism is a uniting factor in both president’s foreign policy.

Reagan talked about ‘a shining city on a hill,’ and in a way ‘America First’ recognizes also that America is different and deserves special treatment.

Matthew Kroenig

The post Kroenig quoted in the Washington Post on the similarities between Reagan and Trump’s foreign policy appeared first on Atlantic Council.

]]>
How US military action against drug cartels in Mexico could unfold https://www.atlanticcouncil.org/blogs/new-atlanticist/how-us-military-action-against-drug-cartels-in-mexico-could-unfold/ Wed, 05 Mar 2025 17:36:34 +0000 https://www.atlanticcouncil.org/?p=830428 A potential four-part scenario can be constructed by examining recent developments in the US-Mexico relationship and US counterterrorism efforts.

The post How US military action against drug cartels in Mexico could unfold appeared first on Atlantic Council.

]]>
During his address to Congress on March 4, US President Donald Trump did not mince words about the threat drug cartels pose: “The cartels are waging war on America, and it’s time for America to wage war on the cartels.” His statement marks the clearest indication so far that the new administration is serious about confronting the cartels and follows a series of escalating actions.

Two weeks earlier, on February 20, the Trump administration officially designated eight Latin American cartels, including six from Mexico, as Foreign Terrorist Organizations (FTOs) for their major roles in drug smuggling and human trafficking into the United States. The move marks a major escalation in the administration’s efforts to cripple the cartels, as an FTO designation grants the administration access to enhanced counterterrorism authorities, such as the ability to launch covert operations authorized by the president. The FTO designation came only days after the Mexican Senate approved the presence of the US Army’s 7th Special Forces Group to conduct joint training with Mexico’s elite Naval Marine Corps.

The Trump administration’s FTO designation and US Special Forces presence in Mexico comes as the administration is taking other notable steps. The United States has imposed new tariffs on Canada and Mexico to pressure them into greater cooperation against cartels and trafficking. On orders from the president, US Northern Command launched new deployments at the US southern border. And Central Intelligence Agency (CIA) surveillance drone flights, approved by Mexico, have reportedly gathered intelligence on cartel operations within the country. The rapid speed and scale of these apparent foreign counteroffensive preparations, arguably not seen since the early stages of the War on Terror, may indicate that the United States is on the verge of direct military action, either unilaterally or with the Mexican military, against cartels on Mexican soil.

While it remains unclear what the US administration will decide next, a scenario outlining what such an engagement might entail can be constructed by examining recent developments in the US-Mexico relationship and US counterterrorism efforts.

The following outlines a potential four-part sequence of events that could unfold if the United States conducts a direct military action against the cartels.

Step 1: Build relationships and training

US-Mexico cooperation is the best method of addressing the cartel problem. Therefore, at the start of this scenario, the new administration will likely work to establish operational partnerships with its Mexican counterparts. However, fostering reliable relationships may be challenging due to the country’s alleged entanglement with cartels. 

Two recent criminal cases brought by the US Department of Justice against two of Mexico’s highest-ranking former law enforcement and military officials highlight the problem. In 2020, former Defense Minister Gen. Salvador Cienfuegos Zepeda was accused of using his position to aid the H-2 Cartel in drug smuggling. In 2024, former Mexican Secretary of Public Security Genaro García Luna was sentenced to thirty-eight years in prison for taking bribes from the Sinaloa Cartel in exchange for assisting the cartel. Moreover, a US Drug Enforcement Administration (DEA) report found evidence that cartels had funneled millions into the 2006 presidential campaign of Andrés Manuel López Obrador, known as AMLO. 

In a move that perhaps anticipates the difficulty of engaging a government compromised by cartel influence, Trump appointed Ron Johnson as US ambassador to Mexico. Johnson is a former US ambassador to El Salvador, retired Green Beret, and veteran CIA officer with more than twenty years of experience leading sensitive paramilitary operations. He is uniquely equipped to secure cooperation from civilian officials while mitigating counterintelligence risks from cartel-affiliated public officials.

The US-Mexico military relationship presents a different set of challenges. During his term as president of Mexico (2018-2024), ALMO increased the funding and authority of the Secretariat of National Defense (SEDENA) in order to expand the main military branch’s role beyond military operations into civilian functions, such as law enforcement and infrastructure projects. However, this expansion occurred during a three-year absence (2019-2021) of a formal US-Mexico counternarcotics agreement, after AMLO pulled out of the Merida Initiative agreement in his first months in office. During this time, cartels extended their territorial control and fueled the rise of fentanyl-related overdose deaths in United States. The Mexican military’s expanding role in civil society and private business in recent years, coupled with allegations of corruption and cartel collusion, particularly around intelligence leaks, may complicate the US relationship with Mexico’s primary military branch. However, given its dominant role in Mexico’s national security, the US will continue to engage with SEDENA on conventional military cooperation, particularly in curbing migration and drug smuggling on the US-Mexico border. 

By contrast, the smaller Secretariat of the Navy (SEMAR), a separate federal executive cabinet member, has built a strong record in conducting successful specialized counter-narcotics operations and has maintained a long-standing partnership with US forces and the DEA. Given its specialized capabilities and established US relationships, SEMAR is well-positioned to be a key partner in any potential US-led joint operations with Mexico against cartel leadership. The fact that the first joint training under the Trump administration was conducted by Green Berets and SEMAR further suggests this likelihood. 

Step 2: Identifying first targets

What cartels might the United States target first? Among the candidates, the Sinaloa Cartel, one of two cartels reportedly responsible for the majority of drug trafficking into the United States, is likely high on the list. As the most powerful drug-trafficking organization in the Western Hemisphere, its influence extends beyond narcotics and human smuggling. The cartel has been involved in business extortion, illegal mining, and oil theft, as well as infiltrating formal businesses to launder money.

But what sets the Sinaloa Cartel apart is its deep ties to China in the fentanyl trade. The cartel has reportedly relied on Chinese suppliers for precursor chemicals, and it uses Chinese money-laundering networks to clean its illegal profits. The Sinaloa Cartel’s danger to US interests is so significant that it has been the primary target of congressional investigations and aggressive US law enforcement actions in recent years, with the most notable recent step against the group being the arrest of Ismael “El Mayo” Zambada, the co-founder and leader of the group, in 2024 by the Biden administration.

The Sinaloa Cartel’s willingness to partner with a major state adversary to flood the United States with deadly drugs underscores its growing brazenness in violating US sovereignty and undermining national security. Targeting the Sinaloa Cartel first would not only disrupt one of the largest fentanyl producers in the Western Hemisphere but also send a clear message to other cartels to refrain from engaging with China and other states hostile to the United States.

Step 3: Covert action and “shock and awe” strategy

Once training operations conclude and intelligence assets finalize target selection, the United States will need to consider its next steps. In the past, countercartel efforts have been managed primarily by US law enforcement agencies, such as the DEA and Federal Bureau of Investigation. These agencies conduct criminal investigations and collaborate with their Mexican counterparts to arrest cartel operatives for prosecution in Mexico or extradition to the United States for trial.

However, the new US administration’s decision to allocate significant resources from the Department of Defense and the CIA to dismantle the cartels suggests that more aggressive measures are also being considered, potentially including the launch of a military campaign. Such a step would require the administration to initiate a formal procedure for authorization.

The first option the Trump administration can pursue is a formal Authorization for Use of Military Force (AUMF) approved by Congress. This would allow the administration to deploy military assets in an open and continuous manner under Title 10 of the US Code. However, given the political sensitivity of US troops operating on Mexican soil, the administration may instead opt for a second option: a CIA-directed covert action conducted in secrecy and under Title 50. In this scenario, Trump would issue a presidential finding that authorizes the CIA to conduct covert actions against the cartels. From there, CIA paramilitary officers or special forces units, typically under Joint Special Operations Command (JSOC), would be used to carry out the secret operations. Trump has historically favored covert operations in counterterrorism efforts against al-Qaeda and the Islamic State of Iraq and al-Sham (ISIS), making this a more likely scenario. 

Regardless of which option the administration chooses, it is likely to launch robust kinetic operations during the initial phase of the conflict. The Trump administration’s designation of the eight cartels as FTOs strongly supports this expectation. This is because the first Trump administration may have set a precedent when it placed Iran’s Islamic Revolutionary Guard Corps (IRGC) Quds Force on the FTO list just eight months prior to the assassination of its leader Qasem Soleimani. Importantly, the Department of Defense announcement of his killing references his leadership in the FTO-designated group in the opening sentence. 

Specifically, in the cartel context, the United States may employ a “shock and awe” strategy that is similar to the first Trump administration’s rapid-strike military campaigns against ISIS. The goal of this approach would be to overwhelm the cartels’ forces through raids and to eliminate high-value cartel targets, particularly sicarios and mid-level commanders coordinating logistics and enforcement operations. In such a scenario, the United States would likely provide heavy air support in order to prevent cartel counteroffensives and ensure that targeted cells cannot regroup or retaliate. This may include US forces embedding with the Mexican navy’s special forces. Drone warfare may also be used to eliminate high-value cartel command centers, fentanyl production labs, and weapons depots. 

Finally, it’s important to note that such direct actions against cartel factions will likely complement, not replace, ongoing bilateral operations between the United States and Mexico to extradite senior cartel leaders for prosecution. Instead, lethal actions can be expected to focus on cartel security forces and professional sicarios responsible for enforcing the cartel’s rule through violence in Mexico, including the assassination of elected officials, journalists, and innocent civilians.

Step 4: Concession and enforcement

Military force will be central in the early phases of the conflict, but the Trump administration has historically followed extreme pressure with engagement. Accordingly, after an initial shock-and-awe campaign, the administration is likely to push for the Mexican government to lead discussions with the cartels to compel them to end their drug smuggling, particularly synthetic drugs, and human trafficking operations in the United States, while also demanding that they sever business ties with state adversaries such as China.

Early signs of this strategy may already be emerging. In February, open-source intelligence indicated a ceasefire was brokered between the Grupo Escorpion and Metros cartels in the northern state of Tamaulipas that called for the end of fighting between the groups and an end to fentanyl trafficking into south Texas. This event, credited to pressure from the Mexican government, could serve as the recipe for future US efforts. This model of applying overwhelming force to compel cartels into submission, followed by behind-the-scenes discussions, will likely define the long-term course of the conflict. Continuous monitoring and enforcement will be essential to ensure compliance with the concessions.

After “shock and awe”

How would cartels respond to a “shock and awe” military campaign similar to that which destroyed the ISIS caliphate? While cartels control territory, command militia-style forces, and possess military-grade weaponry, they lack a standing army, which makes it more difficult for them to survive a sustained military campaign. Additionally, their tactics are limited to lightweight ambushes and terroristic actions, primarily targeting civilians and rival groups. 

Unlike ideological terrorist organizations, cartels operate as businesses. When their funding streams and resources are severely threatened, they are more likely to adapt, negotiate, and shift operations rather than engage in prolonged conventional warfare. Therefore, targeted military attacks on cartels could potentially lead to successful cartel concessions. Furthermore, while direct narco-terrorist attacks on US soil from Mexican cartels are unlikely, US military actions against them could create an opportunity for other state-sponsored groups to conduct counteroffensive attacks, such as targeting US law enforcement officials and terrorizing civilians. 

While it remains to be seen whether the United States will conduct direct military action, one thing is clear: the Trump administration’s efforts to combat drug smuggling and human trafficking into the United States is not likely to be a short-term political goal. Instead, these efforts represent a significant step in redefining US grand strategy away from maintaining the country’s post–World War II global primacy toward securing concrete national interests closer to home. Secretary of Defense Pete Hegseth articulated this shifting policy during a recent Pentagon town hall, stating, “Chaos happens when the perception of American strength is not complete. And so, we aim to reestablish that deterrence, and it starts with our own southern border. It starts with the defense of our homeland.”


James Fowler is a counterterrorism expert who specializes in leveraging technology to support democratic governance and institutional resilience. A retired Special Operations Command (SOCOM) operator, he brings extensive experience in counterterrorism operations and security strategy. Fowler is a member of the Atlantic Council’s Counterterrorism Project, where he contributes to policy discussions and strategic initiatives aimed at enhancing global security.

Alicia Nieves is a legal expert in immigration and refugee law, specializing in humanitarian assistance and conflict rescue. She is a member of the Atlantic Council’s Counterterrorism Project and co-founder of the Gaza Family Project, an initiative of the Arab-American Civil Rights League (ACRL) dedicated to helping American families impacted by the Israel-Hamas war.

The post How US military action against drug cartels in Mexico could unfold appeared first on Atlantic Council.

]]>
To tackle China-enabled drug cartels in Mexico, Trump will need military authorization https://www.atlanticcouncil.org/blogs/new-atlanticist/to-tackle-china-enabled-drug-cartels-in-mexico-trump-will-need-military-authorization/ Mon, 03 Mar 2025 19:00:36 +0000 https://www.atlanticcouncil.org/?p=829949 An authorization to use military force against Mexican drug cartels would unite various government agencies in a coordinated effort to combat a major threat to US national security.

The post To tackle China-enabled drug cartels in Mexico, Trump will need military authorization appeared first on Atlantic Council.

]]>
In an early move echoing post-9/11 counterterrorism strategies, the Trump administration has designated eight major drug cartels, including Tren de Aragua and La Mara Salvatrucha, also known as MS-13, as foreign terrorist organizations. This sets the administration up to potentially seek wide-ranging congressional authorization for military force against these criminal organizations, similar to that which was introduced in the House in 2023 by then Congressman Mike Waltz, before he became US President Donald Trump’s national security advisor. Passing legislation to authorize the use of military force against these drug cartels would be an appropriate and wise response to the threat they pose to Americans. In 2019, the United States experienced more opioid deaths than the rest of the world combined, and these cartels are funneling many of these drugs into the country.

Congressional approval should resemble the Authorization for Use of Military Force (AUMF) enacted after the September 11 attacks, enabling the deployment of military assets against cartel infrastructure both within and beyond US borders. Congressman Dan Crenshaw, who co-sponsored the previous AUMF legislation targeting the cartels, has called for the formation of a “Select Committee to Defeat the Mexican Drug Cartels” that could eventually recommend such an AUMF. An AUMF against the Mexican drug cartels would unite various government agencies in a coordinated effort to combat what administration officials correctly regard as an existential threat to US security. An AUMF would also ensure that the United States could continue combating these terrorist groups when they inevitably fracture, change their names, or otherwise morph into groups that are different from those eight cartels originally designated.

These cartels have extended their networks into the United States, infiltrating major US cities and establishing themselves in furtherance of their criminal empires. The time has come for a whole-of-government response.

Mexican cooperation and challenges

Mexican President Claudia Sheinbaum’s administration has demonstrated unprecedented willingness to collaborate with US counternarcotics efforts. In the past month, he Mexican government has taken significant steps, including announcing that it would deploy ten thousand troops to the US-Mexico border specifically tasked with combating fentanyl trafficking. The Mexican Senate has also approved measures allowing US Special Forces to resume training with Mexican Marines, while enhanced bilateral cooperation on counternarcotics operations continues to develop. However, the path forward is complicated by years of cartel influence through their “plata o plomo” (silver or lead) intimidation tactics, which have entrenched corruption within Mexican institutions. This presents significant challenges for intelligence sharing and operational coordination between Mexico City and Washington, requiring careful consideration on how sensitive information and joint operations are managed.

The China connection

Perhaps most alarming is the emerging evidence of Chinese involvement in the narcotics trade. Intelligence reports indicate that Chinese companies, often operating with apparent impunity, supply Mexican cartels with fentanyl and precursor chemicals, while providing critical financial infrastructure for money laundering operations.

The Chinese doctrinal concept of “unrestricted warfare” proposes multiple indirect approaches for undermining strategic competitors, particularly the United States. Within this broader construct, the US House Oversight Committee identified “drug warfare” as one means by which China deviously attacks the very fabric of US society. This strategic dimension transforms what might otherwise be viewed as a law enforcement issue into a matter of national security. According to a September 2024 report by the Heritage Foundation, China’s facilitation of the fentanyl trade into the United States causes approximately two hundred deaths per day and cost the US economy upward of $1.5 trillion in 2020 alone.

A new strategic approach

Drawing lessons from successful counterterrorism campaigns, the administration should pursue a multi-faceted strategy that would fundamentally reshape the approach to combating cartels. As with the first Trump administration’s successful campaign to dismantle the caliphate of the Islamic State of Iraq and al-Sham (ISIS), the strategy should include both taking military action against criminal organizations’ infrastructure and strengthening diplomatic partnerships with regional allies. Equal emphasis must also be applied to targeting the financial networks that facilitate drug trafficking, as well as addressing the corruption and institutional weaknesses that enable cartel operations to flourish.

This threat must be understood within the broader context of strategic competition with China, as these cartels are effectively serving as proxy forces in a nefarious indirect attack on the United States.

Looking forward

Success will require sustained commitment from both the Mexican and US governments, along with unprecedented levels of international cooperation. Any proposed AUMF would provide a legal framework for military operations, but that force must be combined with other elements of national power to achieve lasting success.

Such an initiative is ultimately about creating alternatives for the Mexican people while eliminating the cartels’ ability to serve as proxies in China’s unrestricted warfare against the United States. This approach addresses both the United States’ and Mexico’s shared security interests and creates opportunities for mutual economic benefit.

As the administration moves forward with these proposals, influential members of Congress are already signaling support for expanded authorities to combat cartel influence. With bipartisan concern over fentanyl deaths and growing awareness of Chinese strategic involvement, the stage appears set for a significant shift in how the United States confronts this evolving threat to national security.


Doug Livermore is a member of the Atlantic Council’s Counterterrorism Program, the director of engagements for the Irregular Warfare Initiative, the national vice president for the Special Operations Association of America, national director for external communications at the Special Forces Association, and the deputy commander for Special Operations Detachment–Joint Special Operations Command in the North Carolina Army National Guard. He also previously served in the Department of Defense as a senior government civilian, intelligence officer, and contractor.

The views expressed are the author’s and do not represent official US government, US Department of Defense, or US Department of the Army positions.

The post To tackle China-enabled drug cartels in Mexico, Trump will need military authorization appeared first on Atlantic Council.

]]>
Eftimiades quoted in a The Bureau article entitled, “Inside The Massive PRC Intelligence Machine Working On US Soil” https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-quoted-in-a-the-bureau-article-entitled-inside-the-massive-prc-intelligence-machine-working-on-us-soil/ Tue, 25 Feb 2025 20:11:42 +0000 https://www.atlanticcouncil.org/?p=828780 On February 17, Forward Defense nonresident senior fellow Nicholas Eftimiades was quoted in a The Bureau article entitled, “Inside The Massive PRC Intelligence Machine Working On US Soil,” where he briefed security experts on his upcoming book. The article notes the importance of Eftimiades’ new book, drawing “insights from nearly 900 cases, including Linda Sun, […]

The post Eftimiades quoted in a The Bureau article entitled, “Inside The Massive PRC Intelligence Machine Working On US Soil” appeared first on Atlantic Council.

]]>

On February 17, Forward Defense nonresident senior fellow Nicholas Eftimiades was quoted in a The Bureau article entitled, “Inside The Massive PRC Intelligence Machine Working On US Soil,” where he briefed security experts on his upcoming book. The article notes the importance of Eftimiades’ new book, drawing “insights from nearly 900 cases, including Linda Sun, who worked for two state governors.”

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Eftimiades quoted in a The Bureau article entitled, “Inside The Massive PRC Intelligence Machine Working On US Soil” appeared first on Atlantic Council.

]]>
Eftimiades interviewed by NTD on Tulsi Gabbard as Director of National Intelligence https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-interviewed-by-ntd-on-tulsi-gabbard-as-director-of-national-intelligence/ Tue, 25 Feb 2025 20:02:41 +0000 https://www.atlanticcouncil.org/?p=828764 On February 17, Forward Defense nonresident senior fellow Nicholas Eftimiades was interviewed on NTD Evening News on the confirmation of Tulsi Gabbard as Director of National Intelligence. In the interview, Eftimiades spoke to Gabbard’s national security priorities and understanding of strategic threats to the United States today.

The post Eftimiades interviewed by NTD on Tulsi Gabbard as Director of National Intelligence appeared first on Atlantic Council.

]]>

On February 17, Forward Defense nonresident senior fellow Nicholas Eftimiades was interviewed on NTD Evening News on the confirmation of Tulsi Gabbard as Director of National Intelligence. In the interview, Eftimiades spoke to Gabbard’s national security priorities and understanding of strategic threats to the United States today.

Forward Defense leads the Atlantic Council’s US and global defense programming, developing actionable recommendations for the United States and its allies and partners to compete, innovate, and navigate the rapidly evolving character of warfare. Through its work on US defense policy and force design, the military applications of advanced technology, space security, strategic deterrence, and defense industrial revitalization, it informs the strategies, policies, and capabilities that the United States will need to deter, and, if necessary, prevail in major-power conflict.

The post Eftimiades interviewed by NTD on Tulsi Gabbard as Director of National Intelligence appeared first on Atlantic Council.

]]>
Wechsler quoted in Haaretz on the dynamics between Trump and Netanyahu ahead of negotiations https://www.atlanticcouncil.org/insight-impact/in-the-news/wechsler-quoted-in-haaretz-on-the-dynamics-between-trump-and-netanyahu-ahead-of-negotiations/ Tue, 25 Feb 2025 18:16:02 +0000 https://www.atlanticcouncil.org/?p=825607 The post Wechsler quoted in Haaretz on the dynamics between Trump and Netanyahu ahead of negotiations appeared first on Atlantic Council.

]]>

The post Wechsler quoted in Haaretz on the dynamics between Trump and Netanyahu ahead of negotiations appeared first on Atlantic Council.

]]>
Citrinowicz quoted in 24 Digital on Israeli targeting of Syrian assets https://www.atlanticcouncil.org/insight-impact/in-the-news/citrinowicz-quoted-in-24-digital-on-israeli-targeting-of-syrian-assets/ Tue, 25 Feb 2025 18:14:55 +0000 https://www.atlanticcouncil.org/?p=827770 The post Citrinowicz quoted in 24 Digital on Israeli targeting of Syrian assets appeared first on Atlantic Council.

]]>

The post Citrinowicz quoted in 24 Digital on Israeli targeting of Syrian assets appeared first on Atlantic Council.

]]>
Samaan quoted in The Washington Post on the potential of Lebanon’s army securing the south https://www.atlanticcouncil.org/insight-impact/in-the-news/samaan-quoted-in-the-washington-post-on-the-potential-of-lebanons-army-securing-the-south/ Tue, 25 Feb 2025 18:14:51 +0000 https://www.atlanticcouncil.org/?p=827778 The post Samaan quoted in The Washington Post on the potential of Lebanon’s army securing the south appeared first on Atlantic Council.

]]>

The post Samaan quoted in The Washington Post on the potential of Lebanon’s army securing the south appeared first on Atlantic Council.

]]>