Intelligence - Atlantic Council https://www.atlanticcouncil.org/issue/intelligence/ Shaping the global future together Sat, 14 Jun 2025 16:14:52 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.2 https://www.atlanticcouncil.org/wp-content/uploads/2019/09/favicon-150x150.png Intelligence - Atlantic Council https://www.atlanticcouncil.org/issue/intelligence/ 32 32 By fusing intelligence and special operations, Israel’s strikes on Iran are a lesson in strategic surprise https://www.atlanticcouncil.org/blogs/new-atlanticist/by-fusing-intelligence-and-special-operations-israels-strikes-on-iran-are-a-lesson-in-strategic-surprise/ Sat, 14 Jun 2025 16:14:51 +0000 https://www.atlanticcouncil.org/?p=853834 Operation Rising Lion offers critical lessons for Western military planners facing similar challenges against peer competitors.

The post By fusing intelligence and special operations, Israel’s strikes on Iran are a lesson in strategic surprise appeared first on Atlantic Council.

]]>
Israel’s “Operation Rising Lion” against Iran, launched early Friday in the Middle East, represents an evolution in how democratic nations can prepare for and execute preemptive operations against peer adversaries.

By fusing years of intelligence preparation with special operations capabilities, Israel achieved strategic surprise and devastating effect against Iran’s nuclear program and military leadership despite months and years of mounting tensions. The operation offers critical lessons for Western military planners facing similar challenges with peer competitors who possess advanced air defenses, nuclear ambitions, and totalitarian control.

Of course, Friday’s Israeli strike on Iran occurred under relatively favorable conditions—already degraded air defenses, neutralized proxies, and no existing nuclear deterrent—complicating direct comparisons to potential preemptive strikes on true US peers such as Russia or China. Still, the concepts retain value worth exploring as Western militaries seek unconventional options to address emerging threats.

Anatomy of a surprise

Israel’s Mossad spy agency had smuggled weapons into Iran ahead of Friday’s strikes, establishing a base of operations from which it remotely launched explosive-laden drones and positioning short-range, precision weapons near critical surface-to-air missile systems. This multiyear preparation enabled what Israeli officials describe as a coordinated campaign targeting Iran’s main enrichment facility in Natanz, its nuclear scientists and military leaders, and parts of its ballistic missile program with devastating precision.

This three-pronged approach demonstrates sophisticated planning that Western intelligence and special operations forces (SOF) should study carefully. First, Mossad commando units deployed precision-guided weapons systems near Iranian surface-to-air missile installations, which activated immediately preceding Israeli Air Force strikes to drop Tehran’s defenses at a critical juncture. Second, specialized equipment and munitions were clandestinely emplaced across Iran to carry out the full range of attacks that achieved the effective decapitation of Iran’s military leadership. Third, explosive drone bases were established deep in Iranian territory to target Iran’s offensive missile systems at strategic sites to deny Tehran an immediate response capability.

The power of pre-positioned munitions

The most striking aspect of Operation Rising Lion was Israel’s ability to achieve tactical surprise through pre-positioned assets rather than relying solely on standoff weapons or penetrating strikes. According to Israeli security sources, Mossad operatives established drone and missile bases “in the open, not far from Iran’s air defense systems” and used vehicle-based weapons platforms throughout the country. This approach allowed over two hundred Israeli aircraft to drop more than 330 munitions on some one hundred targets during the opening strikes while facing degraded air defenses.

The strategic logic parallels successful special operations from previous conflicts. As I wrote recently about Ukraine’s experience against Russia, the core tenets of deep special operations remain constant: “the element of surprise achieved through operational security and misdirection; the targeting of high-value, lightly defended assets in the enemy’s rear areas; and the psychological impact that far exceeds the tactical damage inflicted.” Israel’s pre-positioning strategy enabled all three simultaneously.

Decapitation through intelligence fusion

The operation successfully eliminated Iran’s top military leadership, including Islamic Revolutionary Guard Corps Commander Hossein Salami, Chief of Staff Mohammad Hossein Bagheri, Emergency Forces Commander Gholam Rashid, and several nuclear scientists. This represents one of the most successful decapitation strikes in modern warfare, demonstrating how intelligence preparation can enable surgical targeting of command structures.

The targeting methodology reflects years of intelligence preparation. Israeli officials compiled detailed intelligence dossiers on senior Iranian defense officials and nuclear scientists, enabling precise targeted assassinations while conducting a coordinated campaign to neutralize Iran’s strategic missile array through airstrikes and deep-cover operations. This holistic approach—combining human intelligence, technical collection, and operational preparation—offers a template for future operations against peer adversaries.

Asymmetric air-defense suppression

Perhaps the most operationally significant aspect was Israel’s innovative approach to suppressing Iranian air defenses. Rather than relying solely on conventional airborne Suppression of Enemy Air Defenses missions, Israel used pre-positioned systems to launch precision strikes simultaneously toward designated targets with remarkable accuracy. It deployed advanced technologies mounted on vehicles that completely destroyed Iranian air-defense targets at the onset of the attack.

This approach enabled Israeli planes to achieve air superiority and freedom of maneuver during subsequent waves of the operation. The methodology demonstrates how special operations can create windows of vulnerability in sophisticated air defense networks that conventional forces can then exploit. As the West looks at China’s growing anti-access/area denial capabilities across the Western Pacific, SOF could pursue similar approaches to prevent Beijing from isolating Taiwan, Japan, or the Philippines with long-range antiaircraft systems.

The element of strategic surprise

The operation’s most remarkable feat may be that it achieved strategic surprise despite widespread expectations of Israeli action. Multiple reports over recent days suggested that US officials believed Israel could be preparing to strike Iran, with American personnel evacuated from the region and diplomatic warnings about potential mass casualty events. Yet Iran appeared unprepared for the scale and coordination of the actual attack.

This suggests that strategic surprise in modern warfare depends less on concealing intentions than on concealing capabilities and timing. Israel’s years-long preparation phase enabled operational surprise even when strategic intentions were evident to all parties. As an Israeli security official told the Times of Israel, the mission relied on “groundbreaking thinking, bold planning and surgical operation of advanced technologies, special forces and agents operating in the heart of Iran while evading the eyes of local intelligence.”

Specifically, Western defense planners should carry forward six lessons.

  1. The operation demonstrates how long-term intelligence-SOF fusion can serve deterrent functions while providing robust options if deterrence fails. Israel’s ability to pre-position assets and develop detailed targeting packages likely influenced Iranian decision-making for years before the actual strike. When deterrence ultimately failed, these preparations enabled decisive action rather than graduated escalation.
  2. The use of technologies ranging from precision-guided missiles to explosive-laden drones and vehicle-based weapons platforms demonstrates how modern capabilities can enhance rather than replace classical special operations principles. Ukraine’s recent “Operation Spiderweb” similarly shows how, as I wrote recently, “technological evolution from Lewes bombs to precision drones masks deeper continuities in special operations thinking.” SOF must continue to innovate to provide options for strategic surprise.
  3. Israel’s strikes provide a model for how intelligence services and SOF, through prior operational preparation, can provide robust options for national leadership. This confidence appears grounded in extensive preparation and multiple redundant capabilities that enabled coordinated strikes across multiple Iranian nuclear facilities while simultaneously targeting military command structures.
  4. Western nations should prioritize intelligence-SOF fusion capabilities that enable long-term operational preparation in potential conflict zones. This requires sustained investment in human intelligence capabilities, technical collection systems, and special operations units trained for extended autonomous operations in denied areas.
  5. Israel’s early success despite obvious tensions suggests that operational security remains achievable even under intense scrutiny. The effort relied on close coordination between the Israel Defense Forces and the Mossad intelligence agency over multiple years, indicating that compartmentalization and operational discipline can preserve surprise even in highly monitored environments.
  6. This operation tests the value of preemption. If Iran’s counterattacks fail to deliver a major impact, Israel’s attack could show how well-prepared preemptive action can end conflicts on favorable terms rather than beginning them. By targeting Iran’s nuclear program, missile capabilities, and military leadership simultaneously, Israel appears to have degraded Iran’s ability to sustain prolonged conflict while achieving its core security objectives.

Prime Minister Benjamin Netanyahu’s declaration that the operation would continue “for as many days as it takes to remove this threat” suggests confidence in sustained capabilities rather than one-off strikes. While Tehran retaliated Friday with drones and missiles that killed three people and caused dozens of Israeli injuries, it remains to be seen just how effective its responses will be in light of the regime’s severely degraded capabilities.

Operation Rising Lion represents the evolution of modern special operations principles established during World War II and refined through decades of irregular warfare. The integration of multiyear intelligence preparation, pre-positioned capabilities, and coordinated targeting demonstrates how democratic nations can achieve strategic surprise against peer adversaries even in highly scrutinized security environments.

For Western military planners, the operation offers both inspiration and instruction. The challenge lies not in replicating Israeli capabilities but in developing equivalent intelligence-SOF fusion that provides national leadership with robust options across the spectrum of conflict. Unlike Iran, both China and Russia possess large, survivable nuclear arsenals, which introduces significant escalation risks to any decapitation strike or preemptive action, even if conventional thresholds are initially observed. As tensions with peer competitors continue to mount, the ability to achieve strategic surprise through patient preparation rather than reactive escalation may prove decisive.

The Greek warriors who hid away in the Trojan Horse before springing forth to storm the gates of Troy would recognize the operational logic, if not the technology, used by today’s special operators. Strategic surprise through careful preparation, audacious execution, and clear purpose remains the foundation of effective special operations. Israel’s achievement lies in demonstrating how these timeless principles can be adapted to counter twenty-first-century threats while providing templates for democratic nations facing similar challenges with authoritarian adversaries.

The lesson for future irregular warfare is clear: When facing peer adversaries with advanced capabilities and nuclear ambitions, patient intelligence preparation combined with innovative special operations can achieve effects that conventional deterrence alone cannot guarantee. The investment in such capabilities may prove the difference between managing conflict and winning it decisively.


Doug Livermore is the director of engagements for the Irregular Warfare Initiative, a member of the Atlantic Council’s Counterterrorism Group, the national vice president for the Special Operations Association of America, national director for external communications at the Special Forces Association, and the deputy commander for Special Operations Detachment–Joint Special Operations Command in the North Carolina Army National Guard. He is a former senior government civilian, intelligence officer, and contractor in various roles at the Office of the Secretary of Defense, Department of the Navy, and Department of the Army.

The views expressed are the author’s and do not represent official US government, Department of Defense, or Department of the Army positions.

The post By fusing intelligence and special operations, Israel’s strikes on Iran are a lesson in strategic surprise appeared first on Atlantic Council.

]]>
Eftimiades interviewed by NTD on Chinese espionage https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-interviewed-by-ntd-on-chinese-espionage/ Tue, 27 May 2025 15:06:19 +0000 https://www.atlanticcouncil.org/?p=849256 On May 20, Forward Defense nonresident senior fellow Nicholas Eftimiades was interviewed by NTS News, in a segment entitled, “Former Intelligence Officer: China Leverages Entire Society for Intel.” With Tiffany Meier, Eftimiades discusses the Chinese Communist Party’s espionage strategy, pulling insights from his book, Chinese Intelligence Operations and Tactics.

The post Eftimiades interviewed by NTD on Chinese espionage appeared first on Atlantic Council.

]]>

On May 20, Forward Defense nonresident senior fellow Nicholas Eftimiades was interviewed by NTS News, in a segment entitled, “Former Intelligence Officer: China Leverages Entire Society for Intel.” With Tiffany Meier, Eftimiades discusses the Chinese Communist Party’s espionage strategy, pulling insights from his book, Chinese Intelligence Operations and Tactics.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades interviewed by NTD on Chinese espionage appeared first on Atlantic Council.

]]>
Cole speaks about the role of fiction and narrative in current affairs on the Marine Corps Association Scuttlebutt podcast https://www.atlanticcouncil.org/insight-impact/in-the-news/cole-speaks-about-the-role-of-fiction-and-narrative-in-current-affairs-on-the-marine-corps-association-scuttlebutt-podcast/ Tue, 20 May 2025 14:30:00 +0000 https://www.atlanticcouncil.org/?p=849041 On May 15, Forward Defense nonresident senior fellow August Cole was a featured guest on the Marine Corps Association podcast Scuttlebutt. In this episode, titled “Useful Fiction With August Cole From Modern Day Marine,” Cole discusses how asymmetric forces like fiction and narrative have an outsized impact on today’s battlefield.

The post Cole speaks about the role of fiction and narrative in current affairs on the Marine Corps Association Scuttlebutt podcast appeared first on Atlantic Council.

]]>

On May 15, Forward Defense nonresident senior fellow August Cole was a featured guest on the Marine Corps Association podcast Scuttlebutt. In this episode, titled “Useful Fiction With August Cole From Modern Day Marine,” Cole discusses how asymmetric forces like fiction and narrative have an outsized impact on today’s battlefield.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Cole speaks about the role of fiction and narrative in current affairs on the Marine Corps Association Scuttlebutt podcast appeared first on Atlantic Council.

]]>
Lichfield quoted by Bloomberg on US intelligence sharing with Ukraine https://www.atlanticcouncil.org/insight-impact/in-the-news/lichfield-quoted-by-bloomberg-on-us-intelligence-sharing-with-ukraine/ Wed, 30 Apr 2025 13:23:56 +0000 https://www.atlanticcouncil.org/?p=844311 Read the full article here

The post Lichfield quoted by Bloomberg on US intelligence sharing with Ukraine appeared first on Atlantic Council.

]]>
Read the full article here

The post Lichfield quoted by Bloomberg on US intelligence sharing with Ukraine appeared first on Atlantic Council.

]]>
Ullman in the Hill urging vigilance in national security communication  https://www.atlanticcouncil.org/insight-impact/in-the-news/ullman-in-the-hill-urging-vigilance-in-national-security-communication/ Mon, 31 Mar 2025 20:05:35 +0000 https://www.atlanticcouncil.org/?p=837478 On March 31, 2025, Atlantic Council Senior Advisor Harlan Ullman published an op-ed in the Hill on the potential implications of national security officials using Signal for official communication and planning. He argues that US allies will take the recent Signal breach “very, very seriously,” which could disrupt intelligence sharing.   

The post Ullman in the Hill urging vigilance in national security communication  appeared first on Atlantic Council.

]]>

On March 31, 2025, Atlantic Council Senior Advisor Harlan Ullman published an op-ed in the Hill on the potential implications of national security officials using Signal for official communication and planning. He argues that US allies will take the recent Signal breach “very, very seriously,” which could disrupt intelligence sharing.   

International Advisory Board member

Harlan Ullman

Senior Advisor

The post Ullman in the Hill urging vigilance in national security communication  appeared first on Atlantic Council.

]]>
Our experts separate Signal from noise in the Trump team’s messages about bombing the Houthis https://www.atlanticcouncil.org/blogs/new-atlanticist/our-experts-separate-signal-from-noise-in-the-trump-teams-messages-about-bombing-the-houthis/ Thu, 27 Mar 2025 19:56:04 +0000 https://www.atlanticcouncil.org/?p=836355 The still-unfolding revelations offer perhaps the clearest picture yet of how top officials in the Trump administration are thinking about US foreign policy.

The post Our experts separate Signal from noise in the Trump team’s messages about bombing the Houthis appeared first on Atlantic Council.

]]>
Welcome to the group chat. On Monday, the Atlantic (no relation) published an article by its editor in chief, Jeffrey Goldberg, revealing that senior Trump administration officials had added him, apparently accidentally, to a sensitive discussion on the encrypted messaging service Signal about upcoming strikes on the Houthis in Yemen. On Wednesday, Goldberg released more messages that gave a fuller sense of the discussion. The still-unfolding revelations, which have sparked heated debates in Washington and dominated the news this week, offer perhaps the clearest picture yet of how President Donald Trump’s top officials are thinking about US foreign policy—and well beyond Yemen. Below, Atlantic Council experts offer their emoji-free insights on the biggest lessons to take away from these developments.

Click to jump to a lesson:

What did we learn about US Middle East policy?

What did we learn about how this White House views Europe?

What are the intelligence implications of this leak?

What are the information-security implications of this group chat?

There was a big debate in the chat about who benefits from the Suez Canal. What is the real story?

What did we learn about the campaign against the Houthis?

We learned that while there are predictable differences within the Principals Committee, Trump is clearly calling the shots. Secretary of Defense Pete Hegseth cited the “POTUS directive to reopen shipping lanes,” while Homeland Security Advisor Stephen Miller recalled that “the President was clear” and Vice President JD Vance noted that “the strongest reason to do this, as POTUS said, was to send a message.”  

This exchange revealed a group of senior officials primarily focused on executing a presidential decision, not working to undermine or reverse that decision, as was often the case during the first Trump administration. Even Vance’s somewhat condescending comment about his boss (“I’m not sure the President is aware how inconsistent this is with his message”) was quickly followed by a preemptive retreat (“I am willing to support the consensus of the team and keep these concerns to myself.”) Trump is undoubtedly pleased by the stark difference from his prior experience during his first term with then Secretary of Defense James Mattis, then Secretary of State Rex Tillerson, then Chief of Staff John Kelly, and the other “adults in the room.”  

Trump made the right decision to attack the Houthis to defend freedom of navigation through critical maritime chokepoints, an action I have encouraged for years. (I would prefer a sustained, lengthy special operations–led air campaign against Houthi leadership, rather than the more expensive conventional approach recommended by US Central Command, however.) Trump is similarly correct in his frustrations that governments in the Middle East, Asia, and Europe (with the United Kingdom being the exception) have thus far largely refused to share the burden of reopening the sea lanes. Trump deserves credit, however, for not allowing those understandable frustrations to prevent him from carrying out these duties—as National Security Advisor Michael Waltz aptly summarized in the group chat: “we have a fundamental decision of allowing the sea lanes to remain closed or to re-open them now or later, [and] we are the only ones with the capability.”

But Trump, now mirrored by certain members of his team, remains fundamentally wrong in his minimization of continuing vital US interests in the Middle East. As the world’s largest importer and second-largest exporter, the United States would be disproportionately hurt by any abandonment of the principle of freedom of navigation. Any sharp and unexpected increases in the globally traded price of oil—a price that is directly affected by stability in the Middle East—causes inflation to rise in the United States. Diminishing Houthi capacity to project power, especially in the wake of Israel’s successful campaigns to diminish Hamas and Hezbollah’s ability to do so, further limits Iranian power in the region, a factor that may be critical if a nuclear crisis with Tehran emerges on Trump’s watch. The United States projects its own power in the region first and foremost because it helps secure US economic and national security interests and not as a gift to others—and certainly not, as Miller put it in the group chat, in order to get “some further economic gain extracted in return.”

For many decades, across Republican and Democratic administrations alike, US presidents have all understood this. But Trump’s contrarian views on this subject are clear, long-standing, and well documented. Indeed, even back when Trump announced the first of the Abraham Accords from the Oval Office—one of the crowning achievements of his first term—he still couldn’t have been clearer: “We don’t have to be there anymore. We don’t need oil . . . We no longer have to be there. It started off when we had to be there, but as of a few years ago, we don’t have to be there. We don’t have to be patrolling the straits. We’re doing things that other countries wouldn’t do. But we put ourselves, over the last few years, in a position where we no longer have to be in areas that, at one point, were vital. And that’s a big statement.”

Indeed. And now that Trump has assembled an administration that truly allows him to call the shots, nobody in the region should be surprised by the direction of policies to come. 

William F. Wechsler is the senior director of Middle East Programs at the Atlantic Council. His most recent US government position was deputy assistant secretary of defense for special operations and combating terrorism.

***

One of the least-remarked-upon aspects of the US strikes in Yemen against the Houthis has been the strategic justification for the strikes. Besides Trump’s statement on March 15 at the start of the strikes, Hegseth articulated a justification for the strikes that carried with it strategic continuity that aligns with decades of US national security policy. Hegseth noted that the strikes were principally about freedom of navigation and restoring deterrence in the Middle East region.  

These principles transcend individual presidential administrations. Then US President Joe Biden’s statements at the 2022 US-Gulf Cooperation Council (GCC) Summit contained these principles, as did Trump’s statement at the 2017 US-GCC Summit.  Historically, Hegseth’s thinking can trace its lineage from the Roosevelt administration to the Eisenhower administration and the United States’ leading role in shaping the security of the Middle East region. This policy eventually evolved with the Carter and Reagan administrations’ efforts to counter the hostile nature of a revolutionary Iran. The Trump administration’s bombing campaign is the latest manifestation of this approach. Whether it is acknowledged or not, there is considerable strategic continuity in the most recent US military actions in the region.

Daniel E. Mouton is a nonresident senior fellow at the Scowcroft Middle East Security Initiative of the Atlantic Council’s Middle East Programs. He served on the National Security Council from 2021 to 2023 as the director for defense and political-military policy for the Middle East and North Africa for Coordinator Brett McGurk. 

Most European observers will take these revelations as confirmation of what they sensed before—that parts of this US administration are reflexively anti-European. This anti-European camp prefers to beat up on allies on the continent over addressing real and significant challenges. It reduces Europeans to a caricature of free-riders. It does not grasp the complex, 9.5 trillion-dollar economic integration and interdependency between the United States and the European Union (EU). And it views decades-old alliances as zero-sum games, if not a protection racket-like arrangement. And while this camp eschews foreign entanglements, it also shows an almost childish fascination with the unconstrained exercise of US hard power. Administration officials with these views are among the most senior in Trump’s cabinet.

But European decision makers should take away a few more insights and—most importantly—action items from the exchange. For one, there are officials in the Trump administration who do understand the importance of freedom of navigation and just how integrated global shipping, transatlantic supply chains, and US-EU trading relations are. That’s something to build on as the United States and the EU are on the brink of a trade war, likely to undercut each other while benefiting strategic competitors. Second, Europe will not be taken seriously by this White House until it develops some key capabilities to take care of its own core national security interests. In the current debate, European leaders should take this as further motivation to think big, get ambitious, and move fast to address defense spending, capability gaps, and defense-industrial shortcomings. Third, Europeans should be ready to throw these free-rider comments back at the White House when it inevitably criticizes Europe for requiring moderate levels of European taxpayer money for new military budgets to be spent on buying European.

Jörn Fleck is the senior director of the Atlantic Council’s Europe Center.

***

One of the most pronounced themes in the exchange is its overall negative attitude toward Europe. The continent is referred to in the chat as “pathetic” and “free-loading,” suggesting that relations with Europe are increasingly seen as a burden. Since these private comments are now public, they are likely to strengthen the already negative attitudes toward the United States emanating from the capitals of the largest European countries. It is also striking that in the discussion, Europe is treated as a unitary actor, with no differentiation between individual allies, some of which, like those in NATO’s northeastern corridor, have done precisely what Trump has asked for all along: increased their spending on defense. It remains to be seen whether and how those Eastern flank countries will react, and if this exchange will impact their policies going forward.

Andrew Michta is a senior fellow and director of the Scowcroft GeoStrategy Initiative at the Atlantic Council. The views expressed here are his own.

The Atlantic’s publication of the near-complete Signal chat by Trump administration officials discussing plans for attacks against the Houthis may negatively affect the United States’ ability to collect intelligence against the Houthis and enable the militant group to better prepare for future US military operations. The exposure of the Signal chat may put any US human sources at risk, as well, because the Houthis are likely to suspect that the United States’ ability to strike certain Houthi military targets and individuals also comes from information provided by insiders. Finally, the Houthis may be able to glean from the sequencing of US military operations described in the Signal chat ways to better position Houthi assets to mitigate the effects of future US attacks. 

But there may be a silver lining for the United States, as well. The reference in the chat to the specific movements and locations of Houthi officials will undoubtedly prompt the group to try to tighten up the way its members communicate with one another, particularly regarding how and when cell phones can be used. While the negative consequences for the United States are potentially significant, Houthi concerns about their communications and spies may play to the US advantage. If the Houthis reduce their use of cell phones, and perhaps rely instead on passing verbal or written messages, it will slow the group’s response to threats. And Houthi internal spy hunts are likely to create suspicion and mistrust within the organization, which could undercut the group’s military effectiveness. 

Alan Pino is a nonresident senior fellow with the Scowcroft Middle East Security Initiative at the Atlantic Council’s Middle East programs. He previously served for thirty-seven years at the Central Intelligence Agency, covering the Middle East and counterterrorism.

I spent two years as a National Security Council staffer who helped to coordinate Principals Committee meetings on counterterrorism policy and operations. The United States government allocates enormous resources and capacity to make sure national security deliberations and decisions—and the personnel impacted by both—are kept safe. The use of a publicly available messaging platform and the inadvertent inclusion of a prominent journalist in an operational counterterrorism decision is a stunning breach of security. Three things stick out. 

The first issue is the technical risk. Signal is one of the more secure-by-design encrypted messaging apps with forty million to seventy million monthly active users. It’s a great app that prioritizes privacy, but the platform’s design pales in comparison to the security footprint and communications infrastructure that senior US officials travel around the world with to ensure they can communicate securely. 

The second issue is operational risk. Decisions, deliberations, and the information that feeds both are typically classified. The substance of the leaked chat seems to contain all three.

The third issue is good governance. Parts of the leaked Signal chat were set to automatically delete after one week, with others disappearing after four weeks. Communications by government officials about government decisions, like counterterrorism operations, are subject to laws like the Presidential Records Act to ensure transparency and oversight of government is possible. Not having a record of one of the most serious national security decisions an administration can make is a hindrance to the transparency and accountability expected in a functioning democracy.

Graham Brookie is the Atlantic Council’s vice president for technology programs and strategy, as well as the senior director of the Digital Forensic Research Lab (DFRLab).

***

The “Houthi PC Small Group” chat is one of the most revealing windows into real-time US national security policymaking since the release of the Kennedy-era Cuban Missile Crisis tapes. Of course, the Cuban Missile Crisis tapes were released twenty years after the fact and following exhaustive legal review. The internal deliberations of the Trump-era Principals Committee were revealed while the bomb remnants were still smoldering and because no one thought to check the Signal chat’s participant list

There are two clear implications for US national and information security. The first is that the personal devices of senior US national security officials—always a focus of foreign actors—have almost certainly become the highest-priority collection target in the world. If these senior-most policymakers are sharing this much information on commercial systems, it begs the question of whether other appointees are sharing sensitive information on platforms such as Signal—or even less cryptographically secure apps.

The second implication is the deeply demoralizing effect that this scandal will have across the US defense and intelligence professional apparatus. The specific operational information shared by Hegseth is always marked at least the Secret level and releasable in only rare instances. The information is not classified at a higher level only because US military components must be ready to act on it and may not have access to the most secure communications in the field. What Hegseth shared—a complete operational snapshot two hours before US air strikes commenced—is only ever supposed to be known to a few dozen decision makers. It only belongs on government systems and certainly not in a journalist’s messaging app. 

Service members and defense and intelligence professionals have collectively spent millions of hours learning how to safeguard sensitive national security information. Many are left wondering why they face the threat of immediate expulsion or imprisonment for mishandling such information if there is no accountability at the top. 

Emerson T. Brooking is director of strategy and resident senior fellow at the DFRLab of the Atlantic Council Technology Programs. From 2022 to 2023, he served as cyber policy advisor within the Office of the Under Secretary of Defense for Policy, where he was an author of the 2023 Department of Defense Cyber Strategy.

***

Signal is known for its robust end-to-end (E2E) encryption, often considered the most secure by default among messaging apps. The Signal encryption protocol is trusted to protect messages from unauthorized access during transit and at both ends of conversations. However, the Houthi Principals Committee group chat incident underscores that even robust E2E encryption like Signal’s is insufficient for US cabinet-level discussions, particularly military operation planning.

Several factors contribute to this inadequacy. While encryption secures the content, it doesn’t address operational and physical security risks associated with using consumer apps on personal devices. High-ranking officials using mobile phones in potentially unsecured environments expose themselves to greater surveillance and interception risks.

This case also demonstrates critical user behavior pitfalls. Displaying full names and accidentally adding unauthorized individuals to sensitive chats nullify the intended security of any encryption protocol. No encryption can prevent such human errors.

Finally, regardless of encryption, discussing highly sensitive military and national-security topics on mobile phones inherently carries cybersecurity risks. The ease with which personal mobile devices can be compromised poses a significant threat to classified information. Government communication systems employ far more extensive security measures than consumer apps. The use of personal phones and unauthorized apps can easily be exploited by adversarial actors with communication-interception capabilities.

Iria Puyosa is a senior research fellow at the Atlantic Council’s Democracy+Tech Initiative.

The Suez Canal is not just a European concern—it’s a critical global artery that benefits the entire world, including the United States. While only about 3 percent of US trade passes through the canal directly, that figure understates the canal’s broader strategic and economic relevance. Around 30 percent of global container traffic and 40 percent of Asia-Europe trade flows through the Suez, much of which is embedded in US-linked supply chains. What happens in the canal affects global shipping costs, manufacturing inputs, and ultimately US businesses, consumers, and inflation levels more broadly.

The canal is also a key conduit for global energy flows, with around 9 percent of global seaborne oil flows and 8 percent of liquefied natural gas (LNG) volumes passing through it. Disruptions lead to price spikes and increased volatility in global energy markets, which directly impact US economic stability and consumer prices.

Beyond economics, the canal holds military importance, enabling rapid US naval deployment between the Mediterranean Sea and the Indian Ocean. The Signal chat’s dismissive tone about its importance reflects a narrow understanding of global interdependence. The Suez is a strategic chokepoint—its security is a shared responsibility. Treating it as merely “Europe’s problem” underestimates how deeply interconnected our global systems truly are.

Racha Helwa is the director of the empowerME Initiative at the Atlantic Council’s Rafik Hariri Center for the Middle East.

Issue Brief

Mar 20, 2025

A lifeline under threat: Why the Suez Canal’s security matters for the world

By Racha Helwa, Perrihan Al-Riffai

The Suez Canal is both a maritime choke point and vital waterway for global trade and energy security. Given its strategic role as the fastest sea route between Asia and Europe, any disruption to the Suez Canal can have outsized impacts on global commerce and energy markets, as have occurred in recent years.

Economy & Business International Markets

The leaked Signal conversation reveals a reckless method of bombing that is immoral as well as irresponsible. It is political performance rather than war effort—one more keen on signaling than on meaningful action.

These attacks are an extension of the campaign initiated under the Biden administration but on a much larger scale. The messages show that the Trump administration is chasing headlines without any concern for the wider consequences of targeting the Houthis. The war is being waged at a distance, with no real concern for the devastation left behind. The lives of civilians are collateral damage, while the Houthis themselves are spared to a large extent.

More troublingly, the leaked messages indicate officials gloating over these attacks with emojis, even though there have been subsequent reports of high civilian casualties. These attacks are not meant to incapacitate the Houthis but to send a message to Iran and validate Trump’s criticisms of the Biden administration’s efforts to deter the Houthis. Meanwhile, Meanwhile, the most senior Houthi leaders continue to implement security measures to keep them safe from attacks, limiting their vulnerability to strikes even as lower-level leaders and members are killed.

This bombing campaign is no serious effort to undermine the Houthis, nor is it an articulation of a coherent Yemen policy. Instead, Yemen is being used as a battlefield in an even broader war against Iran with little regard for the millions of Yemeni citizens who call the country home.

Osamah Al Rawhani is a nonresident senior fellow with the Scowcroft Middle East Security Initiative at the Atlantic Council’s Middle East Programs.

***

The published Signal chat offers a rare glimpse into how the Trump administration assesses the Houthis’ current threat level, as well as their military capabilities. Although the group remains a serious threat to Israel and international maritime traffic, the chat suggests that their threat trajectory is not rapidly accelerating. Officials including Central Intelligence Agency Director John Ratcliffe, Hegseth, and Joe Kent, Trump’s nominee to be director of the National Counterterrorism Center, all indicated that delaying the operation would not significantly alter the rebels’ strategic position. This suggests that the Houthis may be persistent, but they are not rapidly advancing.

The messages also underscore the Houthis’ continued success in shielding their senior leadership from detection. Ratcliffe’s comment that more time would be useful “to identify starting points for coverage on Houthi leadership” highlights the success of the group’s long-standing efforts to keep their leaders hidden, especially the group’s leader, Abdel Malik al-Houthi, who is rarely seen in public and frequently relocates to avoid being targeted. By keeping their senior leadership structure largely intact, the Houthis have maintained operational control even when faced with sustained external pressure.

Additionally, the chat contained comments stating that the Houthis’ arsenal of missiles and drones are effective enough to evade European naval defenses. This shows that Iranian efforts to transform the group from a small militant faction to a capable military force, which have been limited compared to what Tehran has provided other groups like Hezbollah, have been largely successful. That revelation raises concerns that additional assistance from Iran, as well as support from other US adversaries such as Russia and China, could act as a force multiplier and accelerate the Houthis’ long-term transition into a fully modernized military force capable of exerting significant influence over regional security. 

Emily Milliken is the associate director of media and communications for the N7 Initiative at the Atlantic Council’s Middle East Programs.

The post Our experts separate Signal from noise in the Trump team’s messages about bombing the Houthis appeared first on Atlantic Council.

]]>
Kroenig interviewed on BBC Radio 5 on the United States’ role in ending the war in Ukraine https://www.atlanticcouncil.org/insight-impact/in-the-news/kroenig-interviewed-on-bbc-radio-5-on-the-united-states-role-in-ending-the-war-in-ukraine/ Fri, 07 Mar 2025 14:10:52 +0000 https://www.atlanticcouncil.org/?p=831020 On March 5, Matthew Kroenig, vice president and senior director of the Scowcroft Center, was interviewed on BBC Radio 5 on President Trump’s tactics to bring Russia and Ukraine to the negotiating table and end the war in Ukraine. He argues that the United States is not aligning with Russia but instead acting as a […]

The post Kroenig interviewed on BBC Radio 5 on the United States’ role in ending the war in Ukraine appeared first on Atlantic Council.

]]>

On March 5, Matthew Kroenig, vice president and senior director of the Scowcroft Center, was interviewed on BBC Radio 5 on President Trump’s tactics to bring Russia and Ukraine to the negotiating table and end the war in Ukraine. He argues that the United States is not aligning with Russia but instead acting as a neutral arbiter to end the war.  

I do think the goal will to be to have a solid, independent Ukraine that can defend itself and the administration is placing a lot of [emphasis] on this mineral deal as a way of showing that the United States is interested in Ukraine’s success for the long term.

Matthew Kroenig

The post Kroenig interviewed on BBC Radio 5 on the United States’ role in ending the war in Ukraine appeared first on Atlantic Council.

]]>
The stage is set for a US-Iran showdown—not a deal https://www.atlanticcouncil.org/blogs/menasource/the-stage-is-set-for-a-us-iran-showdown-not-a-deal/ Tue, 04 Mar 2025 13:49:42 +0000 https://www.atlanticcouncil.org/?p=830157 Right now, signs indicate that the United States and Iran are headed towards confrontation, not a successful diplomatic outcome.

The post The stage is set for a US-Iran showdown—not a deal appeared first on Atlantic Council.

]]>
There has been a flurry of speculation about possible US diplomacy with Iran since US President Donald Trump began his second term. 

After having withdrawn from the 2015 Joint Comprehensive Plan of Action (JCPOA) during his first term, Trump has since expressed an interest in a negotiated settlement with Tehran. But with all deals, the details matter. And while it is true that the Trump administration has not yet given its blessing to Israel for military strikes against Iran—as US intelligence reportedly portends—it was unrealistic to expect such a move from Trump as the opening act of his presidency. Trump needed time to build his team, formulate a policy, and secure international legitimacy and support for military action should it become necessary. The third task requires leaving open a lane for diplomacy to make it possible to blame Tehran should negotiations fail and to secure political support from US allies and partners.

Right now, signs indicate that the United States and Iran are headed towards confrontation, not a successful diplomatic outcome.

The Islamic Republic has not yet softened its position on the nuclear file, even after being weakened by a series of killings of leaders across its proxy network and by the degrading of a chunk of its air defenses and missile capacities. While Iranian decisionmakers have recognized the reality that the 2015 text of the JCPOA is long dead, they have clung to the vision of resurrecting a new deal premised on the basic bargain of temporary nuclear constraints in exchange for sanctions relief, using the JCPOA as a reference point or framework. 

Some Iranian officials have taken to the airwaves to hint that there may be willingness to discuss nonnuclear concerns, but those who are the real decisionmakers on these issues—the supreme leader and commanders of the Islamic Revolutionary Guard Corps (IRGC)—have shunned talks over its missile and drone programs and other regional files. Their stances speak louder than the propagandists trying to give an impression to Western constituencies and others that such fundamental change is possible. History has shown that it is not.

SIGN UP FOR THIS WEEK IN THE MIDEAST NEWSLETTER

In February, the supreme leader himself delivered public remarks warning against negotiations with the Trump administration: “One shall not negotiate with a government like this,” he said. “Negotiating is unwise, unintelligent, not honorable.” Already this has triggered hardened rhetoric from Iranian officials, such as President Masoud Pezeshkian, who had previously made more conciliatory comments towards the Trump administration. Since Khamenei’s speech, the Pezeshkian administration has experienced further headwinds with the impeachment of Economy Minister Abdolnaser Hemmati as well as the resignation of Vice President for Strategic Affairs Javad Zarif, who has long been seen as the face of the Islamic Republic’s engagement with the United States.

But Khamenei’s warning last month was not the sweeping ban he laid down in September 2019, when he said, “the policy of maximum pressure on the Iranian nation is of little importance, and all the officials in the Islamic Republic unanimously believe that there will be no negotiations at any level with the United States.” The Islamic Republic under Khamenei will likely never truly walk away completely from the negotiating table, as its political weaponization is a valuable tool to buy time for the regime and divide the United States from within and from its allies. This does not necessarily mean there will be direct and public diplomacy with the Trump administration at this juncture. However, Khamenei’s latest comments seem to leave some room for diplomacy in that they do not necessarily rule out indirect discussions. Such discussions could take place through various channels of communication that Tehran has long maintained with Washington, including through Arab regional interlocutors and European governments. Russia has also reportedly agreed to serve as an intermediary. Still, the obstacles are significant.

For now, on substance, Iran and the United States are talking past each other about “deals.” Iran is still speaking in the language of the JCPOA. But US officials appear to have something different in mind. In a recent interview, Trump publicly disavowed the JCPOA formula, complaining about its short-term duration. This was followed by his national security advisor expressing a willingness to talk to Iran as long as Tehran wants to give up its entire nuclear program. The US secretary of state hinted at a similar demand, noting that in the past, “efforts that Iran has undertaken diplomatically have been only about how to extend the time frame” for its nuclear program and to continue to enrich, sponsor terrorism, build long-range weapons, and “sow instability throughout the region.” 

Trump’s National Security Presidential Memorandum-2 (NSPM-2) included related pledges, vowing to “deny Iran all paths to a nuclear weapon and end the regime’s nuclear extortion racket.” NSPM-2 also employed mandatory language stating that the US ambassador to the United Nations will “work with key allies to complete the snapback”—or restoration—”of international sanctions and restrictions on Iran.” This language evokes past US demands for zero enrichment or reprocessing in Iran, which the first Trump administration endorsed. Triggering snapback would also restore previous UN Security Council resolutions, inked before the 2015 JCPOA, which included demands for Iran to suspend “all enrichment-related and reprocessing activities . . . and work on all heavy-water related projects.”

NSPM-2 likewise declared that it is US policy that “Iran be denied a nuclear weapon and intercontinental ballistic missiles,” among other measures to counter Iran’s malign behavior beyond its nuclear program. These US positions are reminiscent of the 2003 Libya disarmament deal, in which the country pledged to dismantle its weapons of mass destruction programs, including nuclear, and to adhere to the Missile Technology Control Regime. However, this is a fundamentally different paradigm from the JCPOA, which allowed Iran to enrich uranium up to 3.67 percent purity and did not touch its missile program.

In fact, Iran’s supreme leader has warned that US officials “intend to systematically reduce Iran’s nuclear facilities, similar to how they did with a North African country”—a hint at Libya—”ultimately leading to the shutdown of Iran’s nuclear industry.” In 2011, Khamenei (referring to Libyan dictator Muammar Ghaddafi) said that “this gentleman wrapped up all his nuclear facilities, packed them on a ship and delivered them to the West and said, ‘Take them!’” He added, “Look where we are, and in what position they are now.” In 2023, after talks about reviving the JCPOA stalled, Khamenei reiterated that “there is nothing wrong with the agreement [with the West], but the infrastructure of our nuclear industry should not be touched.” 

Despite forty-six years of failed diplomacy, outside observers have been insisting Iran is ripe for a durable diplomatic arrangement with the United States. Some supporters of negotiations with Iran have also been wishcasting that Trump suddenly adopted the Obama administration’s Iran policy based on an overreading of the new president’s rhetoric and the absence of certain officials, such as former US Secretary of State Mike Pompeo who took a hardline stance, from the policymaking process. But this is a false narrative, one that even some Islamic Republic officials like to promote while arguing that Trump was suckered into an Iran policy that was not his own, despite him expressing disapproval of the JCPOA during his first presidential campaign, well before his national security team was assembled.

There is no public evidence to date that the maximum Tehran is prepared to give—a JCPOA-style arrangement—will meet the minimum the Trump administration is prepared to accept. If current positions hold, this sets the stage for a showdown, not a deal, in the near term, necessitating the development of a robust pressure architecture to further sharpen Tehran’s choices.

Jason M. Brodsky is the policy director of United Against Nuclear Iran (UANI). His research focus includes Iranian leadership dynamics and Iran’s military and security apparatus. He is on X @JasonMBrodsky.

The post The stage is set for a US-Iran showdown—not a deal appeared first on Atlantic Council.

]]>
Eftimiades quoted in a The Bureau article entitled, “Inside The Massive PRC Intelligence Machine Working On US Soil” https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-quoted-in-a-the-bureau-article-entitled-inside-the-massive-prc-intelligence-machine-working-on-us-soil/ Tue, 25 Feb 2025 20:11:42 +0000 https://www.atlanticcouncil.org/?p=828780 On February 17, Forward Defense nonresident senior fellow Nicholas Eftimiades was quoted in a The Bureau article entitled, “Inside The Massive PRC Intelligence Machine Working On US Soil,” where he briefed security experts on his upcoming book. The article notes the importance of Eftimiades’ new book, drawing “insights from nearly 900 cases, including Linda Sun, […]

The post Eftimiades quoted in a The Bureau article entitled, “Inside The Massive PRC Intelligence Machine Working On US Soil” appeared first on Atlantic Council.

]]>

On February 17, Forward Defense nonresident senior fellow Nicholas Eftimiades was quoted in a The Bureau article entitled, “Inside The Massive PRC Intelligence Machine Working On US Soil,” where he briefed security experts on his upcoming book. The article notes the importance of Eftimiades’ new book, drawing “insights from nearly 900 cases, including Linda Sun, who worked for two state governors.”

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades quoted in a The Bureau article entitled, “Inside The Massive PRC Intelligence Machine Working On US Soil” appeared first on Atlantic Council.

]]>
Eftimiades interviewed by NTD on Tulsi Gabbard as Director of National Intelligence https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-interviewed-by-ntd-on-tulsi-gabbard-as-director-of-national-intelligence/ Tue, 25 Feb 2025 20:02:41 +0000 https://www.atlanticcouncil.org/?p=828764 On February 17, Forward Defense nonresident senior fellow Nicholas Eftimiades was interviewed on NTD Evening News on the confirmation of Tulsi Gabbard as Director of National Intelligence. In the interview, Eftimiades spoke to Gabbard’s national security priorities and understanding of strategic threats to the United States today.

The post Eftimiades interviewed by NTD on Tulsi Gabbard as Director of National Intelligence appeared first on Atlantic Council.

]]>

On February 17, Forward Defense nonresident senior fellow Nicholas Eftimiades was interviewed on NTD Evening News on the confirmation of Tulsi Gabbard as Director of National Intelligence. In the interview, Eftimiades spoke to Gabbard’s national security priorities and understanding of strategic threats to the United States today.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades interviewed by NTD on Tulsi Gabbard as Director of National Intelligence appeared first on Atlantic Council.

]]>
What the Middle East conflicts reveal about the future of terrorism https://www.atlanticcouncil.org/blogs/menasource/what-the-middle-east-conflicts-reveal-about-the-future-of-terrorism/ Fri, 21 Feb 2025 19:24:34 +0000 https://www.atlanticcouncil.org/?p=827780 As policymakers turn to the future of Gaza and other political negotiations, they should also take note of the lessons learned over the past sixteen months.

The post What the Middle East conflicts reveal about the future of terrorism appeared first on Atlantic Council.

]]>
The war that has consumed the Middle East for more than a year, drawing in Hezbollah, the Houthis, and Iran, was sparked by Hamas’s brutal—but non-traditional—terrorist attack of October 7, 2023. As these overlapping conflicts may be starting to wind down, it is worth taking stock of the valuable insights they provide into the nature of terrorism and its potential future developments. 

What stand out most are the potential of cross-border attacks, the lower technological barriers to causing major damage, the escalatory risks arising from coordination among terrorist groups, and the power of psychological warfare to shape a conflict.

Securing the border

The inciting attack of October 7 was not a “typical” terrorist act; it was meticulously planned and executed as both an invasion and a declaration of war on Israel. While the attack included elements traditionally associated with terrorism—such as the mass murder of civilians, including women and children; heinous acts like rape; and the abduction of hostages, mostly civilians, taken to Gaza—it went far beyond the conventional scope of terrorism.

The attack underscored for Israel, and probably for other nations, the urgent need to reevaluate its approach to border security, as the threat of terror-attack-as-invasion has become a tangible reality. In the aftermath of October 7, there is a growing possibility that other terrorist organizations, or even some established armies, may attempt to replicate such operations, combining invasion tactics with acts of terror.

SIGN UP FOR THIS WEEK IN THE MIDEAST NEWSLETTER

Israel learned this lesson the hardest way. But other nations—particularly those with adversaries along their borders—should now consider preparing for similar scenarios to ensure the security of their borders and the safety of their civilian populations, thereby minimizing the risk of similar attacks. This includes actively protecting borders, even when an immediate threat is not expected. Israel’s experience has shown that technological measures alone are not always sufficient. In defending against terrorist organizations, the best approach is to prepare based on their capabilities rather than their often difficult-to-predict motivations. Also, we can expect a rise in investments in anti-missile armor, as capabilities such as Israel’s Iron Dome can play a crucial role in maintaining and protecting civilian lives.

Low-tech terror

Another important lesson learned from the tactics and capabilities used by Hamas, Hezbollah, the Houthis, and even Iran is that low-cost technology is now transforming the nature of armed conflicts around the world—from the Middle East to Ukraine. Tools such as drones and unmanned aerial vehicles, as well as low-cost rockets and outdated and primitive missile launchers, are enhancing the precision and effectiveness of attacks, demonstrating that terrorist organizations do not require advanced, high-tech capabilities to achieve strategic goals and inflict significant damage on their adversaries. Terrorist organizations, as well as sovereign countries and established armies, can use simple tools, some of which are purchased online, and adapt them to their needs without necessarily relying on arms industries to challenge their enemies. These methods can prove effective against Western militaries that have chosen to defend against attacks by investing in capabilities such as fighter jets, sophisticated radar systems, naval vessels, and high-end ammunition. 

This should serve as a wake-up call for countries to adapt to the evolving threats posed by inexpensive and accessible technologies. For example, countries should develop solutions to counter drones and other precision capabilities in areas where the Iron Dome system has only partial success. Most importantly, countries must closely monitor developments in their enemies’ capabilities as threats will continue to evolve. This understanding is crucial, as low-tech attacks can persist for extended periods and cause significant damage to both civilian and military targets.

The risk of escalation

The October 7 attack and subsequent active involvement of other terror groups and countries demonstrated how attacks of this nature can quickly escalate into full-scale wars with multiple participants. Besides Israel and Hamas, Hezbollah, Iran, the Houthis, and Shiite militias in Iraq and Syria also became involved in the wide-scale war, although they were not initially part of the attack and could have chosen to remain uninvolved. These groups’ involvement also drew in the United States, the United Kingdom, and others who hit back against them.

This expansion of the conflict had profound consequences for the civilian populations and governments of the countries where these groups operate. More than one million civilians fled their homes in Lebanon during the armed conflict with Israel, following counterattacks by the Israel Defense Forces. This is not to mention the tremendous damage and suffering to the people in the Gaza Strip.

It is now clear that Hamas’s attack not only dramatically damaged Hamas itself, but also weakened the broader Axis of Resistance, as the region’s Iran-backed armed groups are known. This dynamic may lead some terrorist groups to reconsider their actions in the future. These groups likely will seek prior confirmation and support from their allies—meaning Iran, in the case of Hamas and Hezbollah—before any future large-scale operations. 

The important lesson, once again learned from Israel’s harsh experience, is that large-scale, multi-arena wars can erupt unexpectedly, even when the parties’ interests do not fully align. Initially, it was not clear that the October 7 attack would draw Hezbollah into the conflict given that it had not been strong allies with Hamas, but the two groups took greater risks for one another than Western analysts expected. Their initial motivation was driven by hatred toward Israel, a commitment to their terrorist agenda, and a desire to avoid standing idle while another terrorist organization waged a large-scale fight against Israel. Additionally, they sought to avoid appearing less committed to terrorism or less opposed to Israel. 

Therefore, countries must take this into account and understand that previously unconnected terrorist organizations may cooperate toward the same goal—requiring preparation for war scenarios involving multiple fronts. It is likely that their cooperation will be based on a shared ideology, such as resistance to Western influence. It is difficult to determine if external intervention can eliminate such collaborations between terrorist organizations, but terrorist groups must be made to understand that becoming involved in a full-scale war will come at a significant cost to them and their host countries. 

In addition, the United States and Israel, with the support of Western allies, should focus on disrupting cooperation, however limited, between terrorist organizations during peacetime. These efforts should complement other steps aimed at reducing the empowerment of terrorist organizations in the future. This includes capitalizing on the vulnerabilities of the Axis of Resistance to disrupt its empowerment and arms transfers, and strengthen alternatives within their home countries to provide the civilian services previously offered by these organizations—ensuring that, unlike in recent decades, these groups do not take over their countries. 

Additionally, the United States and Israel, along with Western allies, should apply pressure to the countries where these terrorist organizations originate to prevent them from using civilian areas for operations, including by threatening to withhold financial backing. Furthermore, those allies should take action against terror facilities in civilian areas as soon as they are identified. This could come in the form of military action, exposing these facilities so the terrorist organizations would be reluctant to use them, and pressuring countries to take action against these facilities themselves. The goal should always be to minimize civilian harm, reduce the threat posed by such facilities, and deter terrorist groups from operating in these areas due to the risk of destruction and loss of resources.

The psychological war

Following the catastrophe of October 7, Israel quickly regained its military effectiveness and succeeded in inflicting substantial damage on its enemies. This recovery was further strengthened by the remarkable support of its allies, which enhanced both its capabilities and strategic position. This model could also apply to other countries that may be attacked in the future. 

Although Israel managed to recover from the shock of the October 7 attack, the broader perspective of the Gaza war highlighted the significant impact of psychological terror on both the civilian population and government decision-making. This represents a new type of warfare, one that involves not only mainstream media and news reports but also underground sources. Actions by Hamas, such as releasing hostage videos, spreading rumors, and leaking information, profoundly influenced public sentiment, contributing to the chaos seen in Israel, particularly in the war’s early months.

This is another shared lesson from both the Middle East conflict and the Russia-Ukraine war. It’s hard to predict whether future conflicts with terrorist organizations will necessarily involve these kinds of psychological threats and tactics. However, it is clear that the flow of information today—via social media, messaging apps, and other platforms—not only shapes public opinion but also influences the battlefield.

The conflicts across the Middle East that erupted in late 2023 will carry a lasting legacy for the entire region. As policymakers turn to the future of Gaza and other political negotiations, they should also take note of the lessons learned over the past sixteen months as they seek to reshape the region and reduce the impact of terrorism. This particular series of conflicts may be coming to a close, but the threat is not going away.

Maayan Dagan is a visiting research fellow at the Atlantic Council’s Middle East Programs.

The post What the Middle East conflicts reveal about the future of terrorism appeared first on Atlantic Council.

]]>
Issue brief: A NATO strategy for countering Russia https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/issue-brief-a-nato-strategy-for-countering-russia/ Thu, 20 Feb 2025 19:56:35 +0000 https://www.atlanticcouncil.org/?p=820507 Russia poses the most direct and growing threat to NATO member states' security. This threat now includes the war in Ukraine, militarization in the Arctic, hybrid warfare, and arms control violations. Despite NATO's military and economic superiority, a unified and effective strategy is essential to counter Russia's aggression.

The post Issue brief: A NATO strategy for countering Russia appeared first on Atlantic Council.

]]>

Key takeaways

  • Russia is the most direct and significant threat to the security of NATO member states—and since Moscow’s invasion of Georgia in 2008 this threat continues to grow. It now encompasses the war in Ukraine, the militarization of the Arctic, hybrid warfare, and violations of arms control treaties.
  • While NATO holds a significant advantage over Russia in military and economic power, an effective and unified strategy is needed to counter Russia’s aggression and fully harness the Alliance’s collective capabilities.
  • To effectively counter Russia, NATO must defeat Russia in Ukraine, deter Russian aggression against NATO allies and partners, contain Russian influence beyond its borders, and degrade Russia’s ability and will to accomplish its revisionist agenda. That will require, among other actions, a significant increase of support and commitment to Ukraine’s defense against Russia, and a more robust Alliance force posture including the modernization of its nuclear deterrent, the permanent stationing of brigade elements along NATO’s eastern frontier and increased defense industrial capacities.

Russia is “the most significant and direct threat to Allies’ security.” So states the NATO Strategic Concept promulgated at the Alliance’s Madrid Summit in June 2022, just four months after Russia’s massive escalation of its invasion of Ukraine.1 The concept and NATO declarations not only underscore the illegality and brutality of that ongoing attack but also highlight Moscow’s use of nuclear and conventional military aggression, annexation, subversion, sabotage, and other forms of coercion and violence against NATO allies and partners.

Ever since its invasion of Georgia in 2008, Russia’s aggression against the Alliance has steadily intensified. This led NATO leaders at their 2024 Washington Summit to task the development of “recommendations on NATO’s strategic approach to Russia, taking into account the changing security environment.”2 The Alliance’s “Russia strategy” is due for consideration at NATO’s next summit at The Hague in June 2025.3 This issue brief reviews Moscow’s actions affecting the security of the Euro-Atlantic area and presents the enduring realities, objectives, and actions that should constitute the core of an effective NATO strategy to counter the threat posed by Russia.

Intensified and globalized Russian aggression

Russia’s objectives go far beyond the subordination of Ukraine. Moscow seeks to reassert hegemony and control over the space of the former Soviet Union, diminish the power of the democratic community of nations, and delegitimize the international rules-based order. Moscow aims to subjugate its neighbors and to weaken—if not shatter—NATO, the key impediment to its European ambitions.

Toward these ends and under the leadership of President Vladimir Putin, Russia:

  • Has illegally occupied Moldova’s Transnistria region since the early 1990s.
  • Invaded Georgia in 2008, has continued to occupy portions of that country, and recently increased its influence, if not control, over the nation’s governance.
  • Invaded Ukraine in 2014 and significantly escalated this ongoing war in February 2022.
  • Militarized the Arctic by increasing its military presence in the region, including through reopening Soviet-era bases and building new facilities to buttress Russian territorial claims over Arctic waters.
  • Leveraged trade and energy embargoes and other forms of economic pressure to intimidate and coerce its European neighbors.
  • Conducts an escalating campaign of active measures short of war against NATO allies and partners, including information warfare, election interference, sabotage, assassination, weaponized migration, cyberattacks, GPS jamming, and other actions.
  • Expanded its conventional and nuclear military capabilities, an effort that was part of President Putin’s preparations to invade Ukraine.
  • Violated, suspended, and abrogated international arms control agreements, including New START Treaty, the Conventional Armed Forces in Europe (CFE) Treaty, the Intermediate-Range Nuclear Forces (INF) Treaty, the Comprehensive Test Ban Treaty (CTBT), the Open Skies Agreement, and others.4

Enduring realities

A NATO strategy to counter Russia’s aggression is long overdue. Its absence cedes to Russia the initiative, leaving the Alliance too often in a reactive, if not indecisive and passive, posture in this relationship. An effective strategy requires recognition of nine enduring realities:

First, Russia’s invasion of Ukraine was a failure of deterrence. The weakness of the Alliance’s response to Russia’s 2014 invasion of Ukraine, NATO’s failure to respond forcefully to Russia’s months long mobilization of forces along Ukraine’s frontiers in 2021, and NATO’s acquiescence to Putin’s exercise of nuclear coercion emboldened and facilitated Putin’s actions against Ukraine. As a result, the credibility of the Alliance’s commitment to defend resolutely its interests and values has been damaged.

A destroyed Russian tank remains on the side of the road near the frontline town of Kreminna, amid Russia’s attack on Ukraine, in Luhansk region, Ukraine March 24, 2023. REUTERS/Violeta Santos Moura

Second, Russia is at war, not just against Ukraine. It is also at war against NATO. The Alliance can no longer approach the relationship as one of competition or confrontation considering the military invasions, active measures, and other forms of violence and coercion Russia has undertaken against NATO allies and partners.5 As former US Deputy Secretary of State Stephen Biegun has written, “Quite simply, Putin has declared war on the West, but the West does not yet understand we are at war with Russia.”6 By failing to recognize this reality, NATO has ceded escalation dominance to Russia as evidenced by its limiting of support to Ukraine and its inaction against repeated Russian aggression and provocations. The Alliance must recognize and act upon the reality that Moscow has pushed the NATO-Russia relationship into the state of war.

Third, NATO faces long-term conflict with Russia. Putin cannot be expected to abandon his ambitions, even if defeated in Ukraine. Ever since Putin’s speech before the February 2007 Munich Security Conference in which he railed against the international order and NATO’s expanding membership, Russia’s campaign to subjugate its neighbors and to intimidate, divide, and weaken the Alliance has been unceasing and relentless. Nor can the Alliance assume that Putin’s successor will significantly diverge from the objectives and policies that drive Russia’s actions today. Peaceful coexistence with Russia is not attainable in the short to medium term and will be difficult to attain in the long term.

Quite simply, Putin has declared war on the West, but the West does not yet understand we are at war with Russia.


—Stephen Biegun, former US Deputy Secretary of State

Fourth, Russia will continue efforts to increase the size and capability of its armed forces. While Russian land forces have suffered significant losses in its invasion of Ukraine, Moscow has reconstituted that force faster than expected. Russia’s land forces were estimated to be 15 percent larger in April 2024 than when Russia attacked Kyiv in February 2022.7 Earlier this year, Russia announced new ambitious plans to restructure and expand its ground forces to 1.5 million active personnel.8 Moreover, the Russian air force and navy have not been significantly degraded by the war against Ukraine. Russia’s air force has only lost some 10 percent of its aircraft. While Russian naval ships have been destroyed in the Black Sea, Russian naval activity worldwide has increased.9 Similarly, Russian nuclear forces have been unaffected by the conflict in Ukraine. Russia retains the world’s largest arsenal of deployed and nondeployed nuclear weapons and continues to develop new models of intercontinental ballistic missiles (ICBM) and intermediate range ballistic missiles (IRBM), hypersonic boost-glide vehicles, nuclear-powered cruise missiles, nuclear-powered subsurface drones, antisatellite weapons, and orbital space weapons.10 With some 6 percent of gross domestic product (GDP) being directed to its military, Moscow is investing to increase its defense-industrial and research and development capacities.11 Russia’s industrial base produces more ammunition than that produced by all NATO members and is fielding new high-tech weapons systems, such as the nuclear-capable multiple warhead IRBM Oreshnik Russia, which was demonstrated in combat against Ukraine last November.12 In April 2024, NATO SACEUR General Christopher Cavoli testified to the US Congress that:

  • “Russia is on track to command the largest military on the continent and a defense industrial complex capable of generating substantial amounts of ammunition and material in support of large-scale combat operations. Regardless of the outcome of the war in Ukraine, Russia will be larger, more lethal and angrier with the West than when it invaded.”13

Fifth, Moscow’s aggressive actions short of war will continue and escalate. Putin has yet to face a response from the Alliance that will dissuade him from further exercising information warfare, cyber warfare, energy and trade embargoes, assassination, GPS jamming, sabotage, fomenting separatist movements, and other forms of hybrid warfare. These actions are intended to intimidate governments; weaken the credibility of the Alliance’s security guarantee; create and exacerbate internal divisions; and divide allies, among other objectives. Left unchecked, they threaten to undermine the Alliance’s ability to attain consensus necessary to take decisive action against Russia.

Sixth, Moscow’s exercise of nuclear coercion will continue as a key element of Russia’s strategy and should be expected to intensify. Threats of nuclear warfare are a key element of Putin’s strategy to preclude NATO and its members from providing Ukraine support that would enable it to decisively defeat Russia’s invasion. This repeated exercise of nuclear coercion includes verbal threats from President Putin and other senior Russian officials; the launching of nuclear capable ICBMs; the use of a nuclear capable IRBM against Ukraine, the first use of such a system in a conflict; nuclear weapons exercises; and the deployment of nuclear weapons to Belarus, according to both Russia and Belarus.14 NATO allies have repeatedly rewarded this coercion by expressing fear of nuclear war; declaring that NATO forces will not enter Ukraine; restricting NATO’s role in assisting Ukraine; limiting the flow of weapons to Ukraine; and restricting their use against legitimate military targets in Russia. Rewarding nuclear coercion encourages its repeated exercise and escalation. It risks leading Russia to conclude it has attained escalation dominance. A key challenge for NATO going forward will be to demonstrate that Russia’s threats of nuclear strikes are counterproductive, and the Alliance cannot be deterred by nuclear coercion.

NATO leaders stand together for a photo at NATO’s 75th anniversary summit in Washington in July 2024. REUTERS/Yves Herman

Seventh, Moscow is conducting a global campaign of aggression to weaken the democratic community of nations and the rules-based international order. Over the last two decades, Russia has exercised its military, informational, and economic assets to generate anti-Western sentiment across the globe, including in Europe, Africa, the Middle East, and the Indo-Pacific region. This has included military support to authoritarian, anti-Western regimes well beyond Europe, including Venezuela, Syria, and Mali. The most concerning element of Russia’s global campaign is the partnerships it has operationalized with China, Iran, and North Korea. Russia’s “no limits partnership” with China enables Putin to mitigate the impacts of Western sanctions on his war economy. Both Iran and North Korea have provided Russia with weapons and ammunition, and North Korean soldiers have joined Russia’s fight against Ukraine. In return, Russia has supplied missile and nuclear technologies, oil and gas, and economic support to these nations that enables them to stoke violence across the Middle East, threaten the Korean Peninsula, and drive forward Beijing’s hegemonic ambitions in the Indo-Pacific region.

Eighth, an effective Russia strategy will require a coordinated leveraging of all the instruments of power available through the Alliance, its member states, and its key partners, including the European Union. This includes the application of diplomatic, economic, ideological, informational, and other elements of power—none of which are the Alliance’s primary capacity, military power—that can be marshaled through its members states and multinational institutions, such as the European Union, where the Alliance and its member states have influence and authority.

Ninth, NATO significantly overmatches Russia in military and economic power.
NATO Headquarters estimates the combined GDP of Alliance member states to be $54 trillion, more than twenty-five times Russia’s estimated GDP of more than $2 trillion.15 The combined defense budget of NATO members amounts to approximately $1.5 trillion,16 more than ten times that of Russia’s publicly projected defense budget of $128 billion for 2025.17 This imbalance of power favoring the Alliance will be enduring and makes the execution of an effective Russia strategy not a matter of capacity, but one of strategic vision and political will.

Core objectives

To counter the direct and significant threat posed by Moscow, a NATO strategy for Russia should be structured around four core objectives:18

  • Defeat Russia in Ukraine: NATO must defeat Russia’s war against Ukraine. This is its most urgent priority. Failure to do so—and failure includes the conflict’s perpetuation—increases the risk of a wider war in Europe and will encourage other adversaries around the world to pursue their revisionist and hegemonic ambitions. Russia’s decisive defeat in Ukraine is essential to return stability to Europe and to reinforce the credibility of the Alliance’s deterrent posture.
  • Deter aggression by Russia: A key Alliance priority must be the effective deterrence of Russia aggression against the Alliance. A robust conventional and nuclear posture that deters Russian military aggression is far less costly than an active war. Deterrence must also be more effectively exercised against Russia’s actions short of war. Failure to deter aggression in this domain can undermine confidence in the Alliance and increase the risk of war.
  • Contain Russia’s influence and control: The Alliance must actively contain Russia’s efforts to assert influence and control beyond its borders. The Alliance must assist Europe’s non-NATO neighbors in Central and Eastern Europe, the Balkans, the Caucasus, and in Central Asia to strengthen their defenses and resilience to Russian pressure. NATO and NATO allies should also work to counter and roll back Russia’s influence and engagement around the globe.
  • Degrade Russia’s capabilities and determination: A core objective for the Alliance should include weakening Russia’s capacity and will to pursue its hegemonic ambitions. Denying Russia access to international markets would further degrade its economy, including its defense-industrial capacity. Active engagement of the Russian public and other key stakeholders should aim to generate opposition to Putin and the Kremlin’s international aggression.

Achievement of these objectives would compel the Kremlin to conclude that its revanchist ambitions, including the diminishment or destruction of NATO, are unachievable and self-damaging. It would diminish Russia’s will and ability to continue aggression in Europe and weaken the impact of Russia’s partnerships, including with China, Iran, and North Korea. In addition, achieving these objectives would return a modicum of stability to Europe that in the long-term would enhance the prospects for NATO’s peaceful coexistence with Russia.

Regardless of the outcome of the war in Ukraine, Russia will be larger, more lethal, and angrier with the West than when it invaded.


—Gen. Christopher Cavoli, NATO Supreme Allied Commander Europe

A NATO strategy to defeat, deter, contain, and degrade Russian aggression and influence should effectuate the following actions by the Alliance, its member states, and partners:

  • Defeat Russia in Ukraine and accelerate Ukraine’s accession into the NATO alliance Defeating Russian aggression against Ukraine requires its own strategy, which should feature five key elements: adopting Ukraine’s war objectives, including total territorial reconstitution (i.e., the Alliance must never recognize Russian sovereignty over the territories it illegally seized from Ukraine); maximizing the flow of military equipment and supplies to Ukraine, free of restrictions on their use against legitimate military targets in Russia; imposing severe economic sanctions on Russia; deploying aggressive information operations to generate opposition in Russia against Putin’s aggression; and presenting a clear, accelerated path for Ukraine to NATO membership. NATO membership, and the security guarantee it provides, would add real risk and complexity to Russian military planning. NATO membership for Ukraine is the only way to convince the Kremlin that Ukraine cannot be subject to Russian hegemony and would provide security conditions needed for Ukraine’s rapid reconstruction and economic integration into Europe.
  • Fulfill and operationalize NATO’s regional defense plans. To establish a credible and effective deterrent against Russian military aggression, NATO allies must:
    • Build and deploy the requisite national forces. Military plans are no more than visions in the absence of required capabilities. NATO’s European and Canadian allies need to generate more forces, with requisite firepower, mobility, and enabling capacities. In short, given European allies’ obligations under NATO’s new regional defense plans, they must act with urgency.
    • Strengthen transatlantic defense industrial capacity. High intensity warfare, as seen in Ukraine, consumes massive amounts of weapons stocks, much of which have to be in a near constant state of modernization to match the technological adaptations of the adversary. Today, the Alliance has struggled (and often failed) to match the defense-industrial capacity of Russia and its partners. NATO’s defense industrial base must expand its production capacities and its ability to rapidly develop, update, and field weapons systems.
    • Increase allied defense spending to the equivalent of 5 percent of GDP. To facilitate the aforementioned requirements and to address emerging challenges beyond Europe that could simultaneously challenge the transatlantic community, NATO allies need to increase the agreed floor of defense spending from 2 percent to 5 percent and fulfill that new commitment with immediacy. NATO members cannot allow themselves to be forced to choose between defending against Russia and another geopolitical challenge beyond Europe.
  • Terminate the NATO Russia Founding Act (NRFA). Russia has repeatedly and blatantly violated the principles and commitments laid out in the Founding Act. Russia’s actions include having invaded Ukraine both in 2014 and in 2022, using nuclear coercion and escalatory rhetoric to pressue the Alliance, and deploying nonstrategic nuclear weapons to Belarus, as both Russia and Belarus have affirmed. Consequently, NATO should formally render the NRFA defunct, including the Alliance’s commitments to:
    • Adhere to the “three nuclear no’s” that NATO member states “have no intention, no plan and no reason to deploy nuclear weapons on the territory of new members, nor any need to change any aspect of NATO’s nuclear posture or nuclear policy – and do not foresee any future need to do so.”19
    • Abstain from permanently stationing “substantial combat forces” in Central and Eastern Europe.20
  • Update NATO’s nuclear force posture. In response to Russia’s modernization of its nuclear arsenal, exercise of nuclear coercion, and adjustments to its nuclear strategy that lowers the threshold for first use of nuclear weapons, the Alliance must update its own nuclear posture. The objectives should be to provide NATO with a broader and more credible spectrum of nuclear weapons options. An updated force posture would improve NATO’s ability to manage, if not dominate, the ladder of conflict escalation, complicate Russian military planning, and thereby weaken Moscow’s confidence in its own military posture and its strategy of nuclear “escalation to de escalate.” Toward these ends, the Alliance should:
    • Increase the spectrum of NATO’s nuclear capabilities. This should include a nuclear-armed sea-launched cruise missile (SLCM-N) and a ground-launched variant. The breadth and number of NATO nuclear weapons exercises, such as the yearly Steadfast Noon, should be expanded and further integrated with exercises of conventional forces.
    • Expand the number of members participating in the Alliance’s nuclear sharing agreements. Doing so will expand the tactical options available to NATO and underscore more forcefully Alliance unity behind its nuclear posture.
    • Broaden the number and locations of infrastructure capable of hosting the Alliance’s nuclear posture. The Alliance’s nuclear posture still relies solely on Cold War legacy infrastructure in Western Europe. Given the threat posed by Russia, NATO should establish facilities capable of handling nuclear weapons and dual capable systems, including nuclear weapons storage sites, in NATO member states along its eastern frontier.
  • Reinforce NATO’s eastern flank. Russia’s assault on Ukraine and its growing provocations against NATO member states and partners underscore the need to further reinforce the Alliance’s eastern frontier. To date, NATO’s deployments along its eastern flank amount to more of a trip-wire force rather than one designed for a strategy of defense by denial. To give greater credibility to the Alliance’s pledge not to “cede one inch” when considering a potential attack by Russia, NATO should:
    • Establish a more robust permanent military presence along the Alliance’s eastern frontier. NATO is expanding its eight multinational battlegroups deployed to Central and Eastern Europe. But each of these deployments should be further upgraded to full brigades that are permanently stationed there. These elements should feature robust enabling capacities, particularly air and missile defenses and long-range fires. If the United States is expected to sustain a presence of 100,000 troops in Europe, the least Western Europe and Canada can do is to forward station some 32,000 troops combined in Central and Eastern Europe.
    • Conduct large-scale, concentrated exercises on NATO’s eastern flank. The Alliance has commendably reanimated its emphasis on large-scale joint military exercises. However, those exercises have yet to be concentrated on NATO’s eastern flank. Doing so would enhance readiness, reassure the Alliance’s Central and Eastern European member states, and demonstrate resolve and preparedness in the face of Russian aggression.
    • Upgrade the Alliance’s air defense and ballistic missile defense systems to more robustly address Russian threats. In its attacks on Ukraine, Russia has demonstrated with brutality its emphasis on missile and long-range drone strikes against military and civilian targets. As part of its efforts to upgrade its air and missile defense capacities, NATO should direct the European Phased Adaptive Approach to address threats from Russia.21
A Grad-P Partizan single rocket launcher is fired towards Russian troops by servicemen of the 110th Territorial Defence Brigade of the Ukrainian Armed Forces, amid Russia’s attack on Ukraine, on a frontline in Zaporizhzhia region, Ukraine January 21, 2025. REUTERS/Stringer
  • Expand the NATO SACEUR’s authority to order deployments and conduct operations along NATO’s eastern frontier. The Alliance’s regional defense plans are said to provide SACEUR with greater authority to activate and deploy NATO forces before crisis and conflict situations. Due to the aggressiveness of Russia’s ambitions, NATO should consider further expanding those authorities as they relate to the deployment and missions of forces along the Alliance’s eastern frontier. The actions of a deterrent force can be even more important than the magnitude of their presence.
  • Augment the Alliance’s posture in the Arctic. Russia has heavily militarized the Arctic, upgraded the status and capability of its Northern Fleet, and deepened its military cooperation with China in the region while the Kremlin continues to assert Arctic territorial claims that conflict with those of NATO allies. While NATO has been increasing the tempo of its Arctic operations and improving its Arctic capabilities, Russia continues to pose a significant threat in the region and possibly outmatches the Alliance in the High North. To further reinforce deterrence against Russian aggression in the Arctic, the Alliance should:
    • Develop a comprehensive NATO strategy to defend its interests in the High North. Such a document would underscore the Alliance’s commitment to the region and help foster allied investments in infrastructure, capabilities, and training needed to defend and deter Russian threats in the High North.
    • Establish a NATO Arctic Command and Joint Force. The Arctic poses a unique set of geographic and climatic challenges requiring tailored operational capabilities. A command and air-ground-naval force focused specifically on the High North would provide the Alliance a dedicated and tailored deterrent to counter Russian aggression in the Arctic.22
  • Bolster deterrence against Russian actions short of war by strengthening resilience and through more assertive and punitive counteractions. NATO and NATO member states’ failure to respond robustly to Russia’s hybrid warfare—whether it is information warfare, cyberattacks, sabotage, assassinations, or other forms of aggression — has resulted in Russia’s intensification and escalation of these actions. The transatlantic community must strengthen its resilience against such attacks but also take stronger punitive measures against Russia if it is to persuade Russia to cease these attacks. While much of what needs to be done falls beyond the remit of NATO’s military capabilities, greater consideration should be given to how military assets can be leveraged to gather intelligence about Russian activity and provide a military dimension to the transatlantic community’s response to such provocations. For example, when a Russian ship fired a warning shot directed at a commercial Norwegian fishing boat within Norway’s exclusive economic zone or when Russia pulled out Estonian navigation buoys from the Narva River,23 an immediate show of force from NATO could have been an appropriate response.
  • Strengthen the deterrence and resilience capacities of non-NATO nations in Europe and Russia’s periphery. Recent elections in Georgia, Moldova, and Romania reflect the intensity of Russia’s determination to claw back control and influence over the space of the former Soviet Union and Warsaw Pact. A key priority of a Russia strategy should be to strengthen efforts by the Alliance, its member states, and key institutional partners, such as the European Union, to reinforce the resilience and defense capabilities of non-NATO nations in Central and Eastern Europe, the Balkans, the Caucasus, and Central Asia. NATO’s programs, such as the Defence and Related Security Capacity Building Initiative, warrant even greater emphasis and resources, particularly in those regions.
  • Intensify Russia’s economic and diplomatic isolation. The current set of measures taken against Moscow in these realms have failed to sufficiently degrade Russia’s war economy and its ability to sustain its invasion of Ukraine and provocations elsewhere in the world. A key priority for NATO and its member states should be to significantly escalate economic sanctions, including the exercise of secondary sanctions to eliminate Moscow’s ability to generate international revenue from energy exports and attain critical technologies needed by its defense industrial sector.
  • Increase efforts to generate internal Russian opposition to the Kremlin’s revanchist objectives and greater support for democratic principles and governance. Russia has undertaken aggressive campaigns to influence the politics of NATO allies and partners. In the recent elections of Moldova and Romania, Russian intervention nearly effectuated regime change. For too long, the transatlantic community has remained on the defensive in this realm. NATO and its member states need to shift to the offensive and weaponize the power of truth to illuminate the brutal realities of Moscow’s invasion of Ukraine, the corruption of Russian officials, and other realties of Russian governance. NATO allies must more actively support Russian stakeholders—particularly civil society—that are more aligned with transatlantic values. This is critical to degrading the political will of the Russian state to continue its aggressions.
  • Modulate dialogue with Russia, limiting it to what is operationally necessary. The Alliance should formally disband the NATO-Russia Council—which last met in 2022—until Moscow has demonstrated genuine commitment to a constructive relationship. Nonetheless, the Alliance should establish and/or maintain lines of communication between the NATO secretary general and the Kremlin, as well as between Supreme Headquarters Allied Powers Europe (SHAPE) and the Russian General Staff, to enable crisis management and provide transparency needed for military stability. This would not preclude NATO allies from dialogues with Russia deemed necessary, for example, to assist Ukraine or pursue arms control measures.

The bottom line

As noted, NATO possesses an overmatching capacity to defeat Russia in Ukraine, deter Russian aggression, contain Russian influence beyond its borders, and degrade Russia’s ability and will to accomplish its revisionist agenda. Today, there is no better time to achieve these objectives by fully marshaling the Alliance’s assets and potential. Moscow cannot undertake an all-out military attack on NATO without risking the viability of Russia’s armed forces and thus its regime. The accomplishment of these objectives would provide stability to Europe’s eastern frontier and establish the best foundation for an eventual relationship with Moscow that is minimally confrontational, if not cooperative and constructive. However, this will take political will and resources. Russia today is determined to prevail in Ukraine, expand its military capabilities, and further leverage its partners, particularly China, Iran, and North Korea, to defeat the community of democracies and, particularly, the Alliance. Russia already envisions itself as being at war with NATO.

About the authors

Explore the program

The Transatlantic Security Initiative, in the Scowcroft Center for Strategy and Security, shapes and influences the debate on the greatest security challenges facing the North Atlantic Alliance and its key partners.

Related content

1    “NATO Strategic Concept,” June 29, 2022, https://www.nato.int/strategic-concept/
2    Washington Summit Declaration, issued by NATO heads of state and government participating in the meeting of the North Atlantic Council in Washington, DC, July 10, 2024, https://www.nato.int/cps/ar/natohq/official_texts_227678.htm
3    Washington Summit Declaration
4    See Mathias Hammer, “The Collapse of Global Arms Control,” Time Magazine, November 13, 2023, https://time.com/6334258/putin-nuclear-arms-control/
5     more information about active measures, see Mark Galeotti, “Active Measures:
Russia’s Covert Geopolitical Operations,” Strategic Insights, George C. Marshall
European Center for Security Studies, June 2019, https://www.marshallcenter.org/en/
publications/security-insights/active-measures-russias-covert-geopolitical-operations-0
6    Stephen E. Biegun, “The Path Forward,” in Russia Policy Platform, Vandenberg Coalition
and McCain Institute, 2024, 32-36, https://vandenbergcoalition.org/the-russia-policyplatform/
7    US Military Posture and National Security Challenges in Europe, Hearing Before the
House Armed Services Comm., 118th Cong. (2024), (statement of Gen. Christopher
G. Cavoli, Commander, US European Command), https://www.eucom.mil/about-thecommand/2024-posture-statement-to-congress
8    Andrew Osborn, “Putin Orders Russian Army to Become Second Largest After China’s
at 1.5 Million-strong,” Reuters, September 16, 2024, https://www.reuters.com/world/
europe/putin-orders-russian-army-grow-by-180000-soldiers-become-15-millionstrong-2024-09-16/
9    US Military Posture Hearing (statement of Gen. Cavoli)
10    US Military Posture Hearing (statement of Gen. Cavoli)
11    Pavel Luzin and Alexandra Prokopenko, “Russia’s 2024 Budget Shows It’s Planning for
a Long War in Ukraine,” Carnegie Endowment for International Peace, October 11, 2023, https://carnegieendowment.org/russia-eurasia/politika/2023/09/russias-2024-budget-shows-its-planning-for-a-long-war-in-ukraine?lang=en
12    “How Does Russia’s New ‘Oreshnik’ Missile Work?,” Reuters video, November 28, 2024,
https://www.youtube.com/watch?v=pYKDNSYw1NQ
13    US Military Posture Hearing (statement of Gen. Cavoli)
14    “Ukraine War: Putin Confirms First Nuclear Weapons Moved to Belarus,” BBC, June
17, 2023, https://www.bbc.com/news/world-europe-65932700; and Associated Press,
“Belarus Has Dozens of Russian Nuclear Weapons and Is Ready for Its Newest Missile, Its
Leader Says,” via ABC News, December 10, 2024, https://abcnews.go.com/International/
wireStory/belarus-dozens-russian-nuclear-weapons-ready-newest-missile-116640354
.
15    “Defense Expenditures of NATO Countries (2014-2024),” Press Release, NATO Public
Diplomacy Division, June 12, 2024, 7, https://www.nato.int/cps/is/natohq/topics_49198.htm
16    “Defense Expenditures of NATO Countries (2014-2024)
17    Pavel Luzin, “Russia Releases Proposed Military Budget for 2025,” Eurasia Daily Monitor
21, no. 134, Jamestown Foundation, October 3, 2024, https://jamestown.org/program/
russia-releases-proposed-military-budget-for-2025/
18    These core objectives are derived in significant part from the writings of Stephen E.
Biegun and Ambassador Alexander Vershbow. Biegun calls for “a new Russia policy
for the United States…built around three goals: defeat, deter, and contain.” See: https://
vandenbergcoalition.org/wp-content/uploads/2024/11/8_The-Path-Forward-Beigun.pdf

published November 21, 2024. See also: Alexander Vershbow, “Russia Policy After the
War: A New Strategy of Containment,” New Atlanticist, Atlantic Council blog, February 22,
2023, https://www.atlanticcouncil.org/blogs/new-atlanticist/russia-policy-after-the-war-anew-strategy-of-containment/
19    See the NATO-Russia Founding Act, “Founding Act on Mutual Relations, Cooperation
and Security between NATO and the Russian Federation,” NATO, May 27, 1997, https://
www.nato.int/cps/en/natolive/official_texts_25468.htm
20    NATO-Russia Founding Act.
21    Jaganath Sankaran, “The United States’ European Phased Adaptive Missile Defense
System,” RAND Corporation, February 13, 2015, https://www.rand.org/pubs/research_
reports/RR957.html
22    For an excellent proposal for a Nordic-led Arctic joint expeditionary force, see Ryan
R. Duffy et al., “More NATO in the Arctic Could Free the United States Up to Focus on
China,” War on the Rocks, November 21, 2024, https://warontherocks.com/2024/11/morenato-in-the-arctic-could-free-the-united-states-up-to-focus-on-china/
23    See Seb Starcevic, “Russian Warship Fired Warning Shot at Norwegian Fishing Boat,”
Politico, September 24, 2024, https://www.politico.eu/article/russia-warship-chaseaway-norway-fishing-vessel/; and George Wright, “Russia Removal of Border Markers
‘Unacceptable’ – EU,” BBC, May 24, 2024, https://www.bbc.com/news/articles/
c899844ypj2o

The post Issue brief: A NATO strategy for countering Russia appeared first on Atlantic Council.

]]>
Deterring Chinese aggression takes real-time intelligence https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/deterring-chinese-aggression-takes-real-time-intelligence/ Thu, 13 Feb 2025 16:46:21 +0000 https://www.atlanticcouncil.org/?p=824581 LTG (R) Scott D. Berrier argues that transforming the Intelligence Communit's early-warning system and attaining real-time awareness is crucial to deterring Chinese aggression.

The post Deterring Chinese aggression takes real-time intelligence appeared first on Atlantic Council.

]]>

Click on the banner above to explore the Tiger Project.

To advance peace through strength, the US military must be capable of denying the People’s Republic of China (PRC) any chance of taking Taiwan by force. This will take more than military modernization. The Trump administration needs to transform the Intelligence Community’s (IC) early-warning capabilities. It’s time to inject unprecedented speed and efficiency into this national mission with a clear goal: attaining real-time awareness across all domains—space, cyberspace, sea, land, and air. Creating this capability is crucial for gathering intelligence against hard targets, understanding emerging events, anticipating the future, and maintaining decision advantage. It’s a tall order, but it’s achievable with the president’s leadership and industry’s cutting-edge tech.

A conflict with the PRC over Taiwan is neither imminent nor inevitable. The PRC has a strategy for annexing Taiwan without an invasion—and it’s in use right now. This strategy has more to do with cyber power than firepower. But the Joint Force and the IC must be prepared for all potential futures—including the risk that the PRC might one day try to blockade or invade Taiwan, sparking a global security crisis.

Operationalize the JWC and JADC2

In the unfortunate event of a future crisis or conflict with the PRC, the IC would need to deliver real-time, decision-quality information advantage in all warfighting domains. The Defense Department’s Joint Warfighting Concept (JWC) theorizes new ways to array the Joint Force with a kill web linking any sensor to any shooter. The enabling Joint All-Domain Command and Control System (JADC2) concept is the holistic underlying approach to link these sensors and associated data into the joint all-domain kill web. For the United States, partners, and allies to operate effectively, the JWC and JADC2 will require those forces to possess real-time information because the side that sees first decides first, and the one that acts first will have the advantage.

If deterrence fails, conflict with the PRC would be unlike any other in history. It would be much faster, more lethal, and more autonomous in an era with swarm technology and hypersonic weapons. It could even include the unthinkable: the use of nuclear capabilities. In addition to combat in the traditional air, land, and sea domains, operations in space and cyberspace would play outsized roles. To be ready to prevail, the entire US intelligence enterprise must rethink and retool how it collects in all domains, and how it uses artificial intelligence (AI) and advanced techniques to analyze and deliver information at speed, enabling JWC/JADC2 in new ways. Speed, timing, and escalation would depend on US and allied reactions, as well as readiness levels and positioning of forces that might be involved. Scenarios involving blockades or an invasion would pose unique challenges to current indication and warning methodologies and models.

Overcome silos that hinder national security

Attaining a real-time, all-domain awareness capability will require a unified effort across the IC, which comprises eighteen independent agencies with authorities to collect, analyze, and report. While some roles and missions overlap, they all have unique capabilities and specified intelligence tasks under Title 50, established laws, and associated IC policy documents. All use different sources, methods, and unique tradecraft to produce intelligence on a variety of national security threats and challenges.

Each agency collects sensitive and restricted information not available to all consumers. Agencies operate on their own top-secret networks and with proprietary software and tools. Each agency partners differently and disseminates intelligence on an as-needed basis (some with more restrictions than others). Each agency has grown its culture, governed its own rice bowls, and competed for scarce resources, creating a competitive atmosphere in the IC that limits collaboration and integration.

To be sure, the IC was highly effective in the lead-up to Russia’s invasion of Ukraine. Time and observables were contributing factors, as Russian force movements were visible months before the invasion and the US military had time to posture for the conflict. At the national level, agile disclosure policies allowed for timely and accurate sharing with partners and allies, empowering a coalition build that enabled rapid military and political support for Ukraine. But it is unlikely that a crisis or conflict with the PRC would unfold in a similar way. The PRC has carefully studied Russian mistakes in Ukraine and is unlikely to repeat them in a Taiwan scenario. Moreover, the proximity of Taiwan to the mainland—combined with the tyrannies of time, distance, and force posture in the region—could create larger dilemmas for the IC.

Proactively strengthen the IC’s posture

All in all, the IC’s preparedness for potential crisis and conflict scenarios involving the PRC has significant room for improvement. The IC has grown incredible capabilities but also daunting bureaucracies that stifle true integration. Combine this with the explosion of information sources, collection techniques, analytical tools, AI advancements, technical hurdles, tradecraft discrepancies, and individual agency priorities, and the result is a lack of unity across the intelligence enterprise. The status quo puts at risk the IC’s ability to see what’s coming in real time—potentially with damaging and cascading consequences.

The IC posture shortfalls are amplified by a lack of information integration across the Department of Defense (DoD). JWC and JADC2 require both intelligence and non-intelligence information sharing at speed for rapid situational understanding and decision advantage. But this underpinning of real-time authoritative intelligence—to see, decide, and act first—does not yet exist. Right now, the IC is inundated with data and tools, but has no way to integrate at scale. It’s time for major changes to the system.

The armed services, intelligence agencies, and many US partners have collection tools and capabilities to identify threats. But if there were a crisis or conflict with the PRC, imagine how many People’s Liberation Army (PLA) objects and targets would be involved. In a conflict scenario, the Joint Force would need a clear integrator of the data streams or multiple intelligence (multi-INT) analysis required to hold all those foreign military objects and targets at risk, or to service those targets kinetically or non-kinetically when required. Such a capability is crucial for deterring and defeating threats.

Avoid governing by crisis

Too often, sweeping changes have come only during or after a great crisis, usually with great loss of life and national embarrassment.

  • The 1941 attack on Pearl Harbor resulted in the wartime mass mobilization and the eventual first use of an atomic bomb.
  • It took the humiliating failures associated with Operation Eagle Claw in 1980 to drive the wide-ranging reforms in the 1987 Goldwater-Nichols Act, which brought about dramatic improvements at DoD. That statute mandated new doctrine for joint operations, the creation of US Special Operations Command, new ways to educate and manage DoD personnel, and changes in how the US military operates.
  • The response to the 9/11 attacks drove comprehensive changes in civil society and national security, culminating in the creation of a new cabinet position to unify the IC and prevent strategic surprise and catastrophic attacks against the United States or its allies and partners.

These changes only occurred with presidential leadership and bipartisan congressional consensus. Otherwise, the United States’ layered governmental bureaucracy, policies, bifurcated political system, and funding process do not normally allow for effective, incremental strategic change. The nation cannot afford to govern by crisis or to rely on twentieth-century-style incremental intelligence reform. Without a strong national mandate, the IC will maintain its current trajectory. That trajectory is inadequate in peacetime and will not suffice in a crisis that leads to conflict.

Integrating intelligence is key

To advance peace through strength, leadership is needed now. The Trump administration has the opportunity to raise public awareness about the range of threats posed by the PRC, Russia, Iran, and North Korea, and to accelerate national security to deal with those threats—particularly by building real-time, all-domain awareness. This awareness can enable the Joint Force to have well-established, rehearsed, and standardized kill chains for credible deterrence. What’s more, it can position the United States to identify and address growing threats in the gray zone—where rivals are trying to compete with the United States without resorting to direct conflict.

In a recent, positive development, the undersecretary of defense for intelligence and security (USD-I&S) signed a directive designating the Defense Intelligence Agency as the “enterprise lead” for the common intelligence picture (CIP). This is a good start. But given the enormity of the task, limited time available, and bureaucratic hurdles, DoD will need to go much further—and that won’t happen without a presidential directive, bipartisan congressional support, and a comprehensive approach spanning DoD, the IC, and industry.

Imagine a nationally mandated and funded project to integrate intelligence from all disciplines to gain and maintain real-time, all-domain awareness across multiple networks and classification levels. Turning this idea into reality is the only way the United States and its allies and partners can proactively seize the initiative, reestablish deterrence, and prevail in the event of conflict. To demonstrate US national resolve and potentially advance strategic deterrence, the high-level commitment to intelligence integration and JADC2 should be highly visible to the PRC and Russia while the sensitive details remain carefully guarded.

The president can drive the change

A presidential directive focused on realizing JWC/JADC2 capabilities to address the PRC threat could empower and drive a “whole of DoD and IC” effort to achieve full operating capabilities with strategic impact. This would strengthen the nation’s competitive edge and position the military and the IC to deliver peace through strength. With ten of the nation’s intelligence agencies under DoD’s umbrella, the secretary of defense should lead this effort in collaboration with the director of national intelligence. This could entail empowering a senior DoD leader such as the USD-I&S with real authority to effect change.

The JWC mandate should require delivery of actionable capabilities within specified timelines, include technical, AI, and tradecraft experimentation, and provide other transaction authority (OTA) or other rapid-acquisition authorities that optimize industry support. For the incoming USD-I&S, the quick stand-up of actionable working groups with deliverables and timelines will be critical. At a minimum, technical, tradecraft, AI, integration, experimentation, and industry work groups should be established. Deputies from each DoD intelligence agency and the services should be assigned to this effort on a full-time basis. Ruthless enforcement of timelines and deliverables by the deputy secretary of defense and USD-I&S will be the only way to effectively lead and direct this effort.

There is no time to lose. Attaining real-time awareness across all domains is vital for national security and defense. With the new administration’s leadership and industry’s cutting-edge tech, transforming early-warning capabilities with real-time, all-domain awareness can become both a strategic and budgetary priority and an operational reality.


Lieutenant General, US Army (ret.) Scott D. Berrier is a nonresident senior fellow at the Indo-Pacific Security Initiative within the Atlantic Council’s Scowcroft Center for Strategy and Security and a senior vice president in the intelligence and national security sector with Booz Allen Hamilton.

Related content

The post Deterring Chinese aggression takes real-time intelligence appeared first on Atlantic Council.

]]>
McNamara published in Pell Center series on espionage of US intellectual property https://www.atlanticcouncil.org/insight-impact/in-the-news/mcnamara-published-in-pell-center-on-china-theft-of-us-intellectual-property/ Wed, 05 Feb 2025 17:00:00 +0000 https://www.atlanticcouncil.org/?p=824729 On February 5th, Whitney McNamara, nonresident senior fellow at Forward Defense, published a piece in the Pell Center’s series on China’s widespread espionage targeting critical intellectual property threatens US economic and military power.

The post McNamara published in Pell Center series on espionage of US intellectual property appeared first on Atlantic Council.

]]>

On February 5, Whitney McNamara, nonresident senior fellow at Forward Defense, published a piece in the Pell Center’s series, “The Project on U.S. – China Technology Competition” entitled, “For an Enduring Advantage, Accelerate Adoption over Stymieing Theft.” McNamara discusses how China’s widespread espionage targeting critical intellectual property threatens US economic and military power and emphasizes the vital role that the Department of Defense should be playing in regard to a solution. 

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post McNamara published in Pell Center series on espionage of US intellectual property appeared first on Atlantic Council.

]]>
Punaro on Fox Business on the DC plane crash and Tulsi Gabbard https://www.atlanticcouncil.org/insight-impact/in-the-news/punaro-on-fox-business-on-dc-plane-crash-tulsi-gabbard/ Fri, 31 Jan 2025 17:00:00 +0000 https://www.atlanticcouncil.org/?p=823345 On January 31st, Arnold Punaro, non-resident senior fellow at Forward Defense, was featured on Fox Business to discuss the Black Hawk helicopter involved in the DC plane crash and Tulsi Gabbard’s Senate confirmation hearing.

The post Punaro on Fox Business on the DC plane crash and Tulsi Gabbard appeared first on Atlantic Council.

]]>

On January 31st, Arnold Punaro, non-resident senior fellow at Forward Defense and Scowcroft Center Advisory Council member, was featured on Fox Business to discuss the Black Hawk helicopter involved in the DC plane crash and Tulsi Gabbard’s Senate confirmation hearing. Punaro emphasized that the incident could have been avoided and expressed his trust in the Senate Intelligence Committee Chairman Tom Cotton. 

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Punaro on Fox Business on the DC plane crash and Tulsi Gabbard appeared first on Atlantic Council.

]]>
The West must study the success of Ukraine’s Special Operations Forces https://www.atlanticcouncil.org/blogs/ukrainealert/the-west-must-study-the-success-of-ukraines-special-operations-forces/ Thu, 30 Jan 2025 01:32:53 +0000 https://www.atlanticcouncil.org/?p=822020 The success of Ukraine’s Special Operations Forces in the war against Russia can provide a range of valuable lessons for Kyiv's Western partners that will shape military doctrines for years to come, writes Doug Livermore.

The post The West must study the success of Ukraine’s Special Operations Forces appeared first on Atlantic Council.

]]>
Since the onset of Russia’s full-scale invasion in 2022, much has been written about the extensive training provided to the Ukrainian military by the country’s Western partners. However, the West also has much to learn from Ukraine’s unique military experience. In particular, the successes of Ukraine’s Special Operations Forces provide a range of valuable lessons for their Western counterparts that will shape military doctrines for years to come.

The effectiveness of Ukraine’s Special Operations Forces can be largely attributed to their exceptional adaptability in rapidly changing battlefield conditions. When Russia launched its full-scale invasion in February 2022, Ukrainian SOF units quickly adjusted to meet the immediate challenges of high-intensity conflict against a far larger and better armed enemy.

This adaptability has manifested in several crucial ways. The rapid reconfiguration of small unit tactics to counter Russian mechanized forces has been particularly noteworthy, as has the development of innovative solutions to overcome numerical disadvantages. Ukrainian SOF units have consistently shown their ability to adopt new technologies and tactics based on battlefield feedback. Perhaps most importantly, they have implemented flexible command structures that enable decentralized decision-making, allowing for rapid responses to emerging threats and opportunities.

Ukraine’s ability to adapt has been further demonstrated through the innovative use of civilian infrastructure and technologies. Ukrainian SOF units have effectively incorporated commercial drones, civilian communications networks, and other non-military technologies, showing remarkable creativity in overcoming resource constraints.

One of the most significant lessons from the conflict has been the effective integration of SOF units with conventional military forces engaged in large-scale combat operations. Ukrainian SOF units also played a vital role in preparing the battlefield before and during the initial phases of the invasion. They established networks of resistance, gathered intelligence, and identified key targets that would later prove crucial for conventional forces.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

Ukraine’s achievements since 2022 have owed much to years of solid preparations. Following Russia’s occupation of Crimea in 2014, Ukrainian Special Operations Forces underwent significant transformation with assistance from NATO countries, particularly the United States, United Kingdom, and Canada. Between 2015 and 2021, Ukraine also implemented major structural reforms to align with NATO standards, including the establishment of dedicated SOF training centers.

These steps helped lay the foundations for a sophisticated network of resistance capabilities across potential invasion routes by early 2022. Ukrainian SOF units mapped key infrastructure, identified potential targets, and established relationships with local civilian networks, while developing protocols for rapid information sharing between SOF units, conventional forces, and civilian resistance elements. These preparations proved vital, enabling Ukrainian forces to target Russian supply lines, command nodes, and communications systems using real-time intelligence.

Throughout the invasion, coordination between Ukrainian SOF units and conventional forces has enabled effective combined arms operations. SOF units frequently act as forward observers, providing targeting data to artillery units and conducting battle damage assessments. The ability to rapidly share intelligence has been particularly important in urban environments, where the complexity of the battlefield requires close cooperation between different military elements.

Russia’s invasion has reinforced the importance of unconventional warfare in modern conflicts. Ukrainian SOF units have successfully employed various unconventional warfare techniques that have had strategic impacts far beyond their tactical execution.

Ukraine’s implementation of guerrilla tactics and sabotage alongside partisans has been highly effective, with numerous successful operations conducted behind enemy lines. This has included the disruption of Russian supply lines, targeting of key military infrastructure and command centers, and the execution of precision strikes on high-value targets.

The psychological aspect of warfare has proven equally important, with Ukrainian SOF units making significant contributions to information warfare campaigns that have influenced both domestic and international audiences. They have conducted deception operations that have complicated Russian planning and operations, while also executing morale operations targeting both enemy forces and occupied populations.

The successful integration of modern technology has been a key characteristic of Ukrainian SOF operations. Despite facing a far wealthier and numerically superior adversary, Ukrainian SOF units have leveraged various technological capabilities to maintain operational effectiveness. They have utilized commercial technologies for reconnaissance and surveillance, integrated drone operations into tactical planning and execution, and leveraged artificial intelligence and big data analytics for targeting and planning.

Ukraine’s SOF operations provide several critical lessons for the country’s Western partners. In terms of doctrine development, it is clear that military organizations must emphasize flexibility and adaptability in force structure and training, while integrating SOF capabilities more deeply in support of conventional forces.

The importance of technological integration and adaptation cannot be overstated. Future military forces must be prepared to operate in environments where commercial technology plays an increasingly important role, and where the ability to utilize these technologies can provide crucial advantages. In terms of equipment, Western planners should focus on communications jamming and interception, improved surveillance and reconnaissance capabilities, and integrating AI tools to aid in intelligence collection and analysis.

The role of Ukrainian SOF operations in the current war provides valuable insights for military forces worldwide. Their impact demonstrates the critical importance of adaptability and the effective use of technology in modern warfare. These lessons are particularly relevant as military organizations prepare for future high-intensity conflicts in increasingly complex operational environments.

Doug Livermore is national vice president for the Special Operations Association of America and deputy commander for Special Operations Detachment–Joint Special Operations Command in the North Carolina Army National Guard. The views expressed are the author’s and do not represent official US Government, Department of Defense, or Department of the Army positions.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post The West must study the success of Ukraine’s Special Operations Forces appeared first on Atlantic Council.

]]>
North Korea is using Russia’s Ukraine invasion to upgrade its army https://www.atlanticcouncil.org/blogs/ukrainealert/north-korea-is-using-russias-ukraine-invasion-to-upgrade-its-army/ Thu, 23 Jan 2025 19:09:38 +0000 https://www.atlanticcouncil.org/?p=820577 North Korea's participation in Russia's Ukraine invasion is a dangerous escalation in what is already the largest European war since World War II with potentially alarming implications for global security, writes Alina Hrytsenko.

The post North Korea is using Russia’s Ukraine invasion to upgrade its army appeared first on Atlantic Council.

]]>
The first North Korean soldiers were taken prisoner by Ukraine in early January, providing final confirmation of the Hermit Kingdom’s involvement in the ongoing Russian invasion of Ukraine following initial reports in late 2024. The participation of North Korean troops represents a dangerous escalation in what is already the largest European war since World War II, with potentially alarming implications for global security.

Pyongyang’s support for the Russian war effort began in late 2022 with the delivery of artillery shells. The list of armaments was subsequently expanded to include ballistic missiles. These supplies have helped Russia maintain the momentum of its invasion despite the country’s significantly depleted stores of munitions. With Moscow now also facing manpower shortages and reluctant to order a fresh round of mobilization, the arrival of North Korean troops helps relieve domestic pressure to recruit more Russians for the war.

While no official data is available, Ukrainian, US, and South Korean sources have estimated that North Korea has sent at least 11,000 soldiers to join Russia’s invasion. Some are believed to be drawn from highly trained elite units. Materials found on dead North Korean troops and battlefield accounts from Ukrainian forces indicate that the heavily indoctrinated North Koreans have been ordered to kill themselves if necessary to avoid being captured alive and taken prisoner.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

Pyongyang has a very specific interest in sending troops to fight against Ukraine. While the deployment is unlikely to dramatically alter the battlefield situation in the Kremlin’s favor, it allows the North Koreans to acquire priceless combat experience, test weapons systems, gain access to Russian military technologies, and secure Moscow’s further assistance in countering UN sanctions.

North Korea currently boasts one of the world’s largest armies with around 1.3 million active soldiers. However, unlike Russia, the Korean People’s Army (KPA) has not been directly involved in any major wars for many years. This lack of battlefield experience is a source of considerable concern for North Korean dictator Kim Jong Un, who is anxious to counter South Korea’s more technologically advanced military.

Sending thousands of troops to fight in the Russian invasion of Ukraine provides the KPA with valuable insights into what is widely recognized as the most technologically advanced battlefield environment in the history of warfare. North Korean soldiers are now learning the realities of modern drone warfare first-hand. As a result, North Korea will be “more capable of waging war against its neighbors,” senior US officials have warned.

Ukrainians have been impressed by the skill and tenacity of the North Koreans they have encountered, including their ability to shoot down drones. “They are young, motivated, physically fit, brave, and good at using small arms. They are also disciplined. They have everything you need for a good infantryman,” Ukrainian army spokesman Lieutenant Colonel Yaroslav Chepurnyi told POLITICO.

North Korea is believed to receive significant financial and technological incentives for supplying Putin with soldiers. South Korean intelligence officials estimate that Moscow is paying Pyongyang $2000 per solder each month. While this money is no doubt welcome, the real prize is access to advanced Russian military tech. In exchange for troops, North Korea is believed to be receiving support from Moscow that will help upgrade its military, including the country’s anti-aircraft, submarine, and missile capabilities.

The Ukrainian front also serves as a valuable testing ground for North Korea, allowing the country to assess the effectiveness of the weapons it supplies to Russia. This will make it possible for Pyongyang to improve the quality of its own domestic arms industry and adapt future output to the realities of the modern battlefield. Meanwhile, the troops who survive their time on the Ukrainian front lines are expected to return home and become instructors, sharing their knowledge of modern warfare with colleagues.

At this point, North Korea’s participation in the Russian invasion of Ukraine looks to be less about supporting Putin’s imperial ambitions and more about upgrading Kim Jong Un’s war machine. In the short term, the presence of North Korean soldiers is allowing Russia to overcome mounting manpower shortages. But with Russia believed to be losing tens of thousands of troops each month, there is little chance that Pyongyang will be able to fully satisfy Moscow’s insatiable demand for additional manpower.

Looking ahead, the historically unprecedented appearance of North Korean soldiers on the battlefields of Europe could alter the security equation on the Korean peninsula and beyond. “For the first time in decades, the North Korean army is gaining real military experience,” commented Ukrainian military intelligence spokesman Andrii Yusov. “This is a global challenge. Not just for Ukraine and Europe, but for the entire world.”

Alina Hrytsenko is an analyst at Ukraine’s National Institute for Strategic Studies.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post North Korea is using Russia’s Ukraine invasion to upgrade its army appeared first on Atlantic Council.

]]>
Trump’s ‘deep state’ dilemma https://www.atlanticcouncil.org/content-series/inflection-points/trumps-deep-state-dilemma/ Wed, 11 Dec 2024 20:12:00 +0000 https://www.atlanticcouncil.org/?p=813311 In this more perilous world, the incoming president will need to lean on the proven patriots in intelligence whom he has disparaged in the past.

The post Trump’s ‘deep state’ dilemma appeared first on Atlantic Council.

]]>
There are plenty of jitters these days in Washington about President-elect Donald Trump’s designs on the size and effectiveness of our sprawling federal government. Nowhere are those concerns greater than among those intelligence professionals occupying what Trump disparagingly calls “the deep state.”

It’s hard to dispute that there’s federal fat to be trimmed, and Trump’s calling for cuts resonates with Americans well beyond his base. At what point, however, do those cuts hit the muscle and bone required for US global leadership at a far more dangerous time than Trump faced during his first presidency?

With wars in the Middle East and Europe, with escalating tensions with China, and with an accelerating contest for technology’s commanding heights, the answer is simple: A purge of career intelligence professionals would have far-reaching negative consequences at a moment when the United States needs even more capable, confident, and motivated espionage agencies.

That was the context today for the New York Times’ lead essay by John Sipher, an Atlantic Council senior fellow and twenty-eight-year veteran of the Central Intelligence Agency’s National Clandestine Service, and Michael V. Hayden, an Atlantic Council board member and former director of the Central Intelligence Agency and the National Security Agency. They worry “that Mr. Trump may be interested in wrecking the operation of the intelligence community.” 

Write Sipher and Hayden: “Needless to say, the notion that the intelligence community is disloyal is false. The community is filled with skilled professionals committed to providing the president—any president—with the best possible intelligence, often at great personal sacrifice.”

In today’s Wall Street Journal, hardly a newspaper that echoes the New York Times’ opinions, the lead editorial questions Trump’s nomination of Tulsi Gabbard, former member of Congress and military officer, to lead his intelligence agencies at such a challenging moment.

The Journal’s editorial board based its concerns heavily on Gabbard’s record of opposition to policies that worked in the first Trump administration, so this piece might resonate more at Mar-a-Lago than Sipher and Hayden’s.

“Ms. Gabbard is on ample record as a dogmatic opponent of the policies that made Mr. Trump’s first-term foreign policy a success and that Democrats resisted,” the editorial board writes under the headline “How Tulsi Gabbard Sees the World.” “The former Democrat would be a risky fit as director of national intelligence.”

The editorial board based that judgment on the argument that the Director of National Intelligence’s job is to “convey intelligence fairly,” and that her “record suggests she is as likely to reject new intel and muddy the waters.”

The piece reminds readers that she defended Syrian dictator Bashar al-Assad against findings of chemical weapons use, about which Trump had no doubts. It notes that Gabbard accused Trump of wanting war with Iran, when his “maximum pressure” campaign achieved the opposite. She accused Trump, through his strike killing Iranian military commander Qasem Soleimani, of “pushing our nation headlong into a war with Iran.” Wrong again. 

The editorial board argues that supporters of Trump’s foreign policy will “think twice about confirming her.” 

Sipher and Hayden remind us that Trump’s promises to destroy “the deep state” predate his first term in the White House. His nominations and rhetoric underscore that he might be more determined to achieve that outcome in his second term.

Trump is right that the world has grown far too dangerous and unstable. History will judge him on how he addresses that reality. The incoming president’s dilemma is that this more perilous world will require him to lean on the proven patriots in intelligence and also those in the military whom he has disparaged in the past.


Frederick Kempe is president and chief executive officer of the Atlantic Council. You can follow him on X: @FredKempe.

This edition is part of Frederick Kempe’s Inflection Points newsletter, a column of dispatches from a world in transition. To receive this newsletter throughout the week, sign up here.

The post Trump’s ‘deep state’ dilemma appeared first on Atlantic Council.

]]>
NATO exercises: The guarantee of Alliance security and test of readiness https://www.atlanticcouncil.org/content-series/ac-turkey-defense-journal/nato-exercises-the-guarantee-of-alliance-security-and-test-of-readiness/ Tue, 03 Dec 2024 14:00:00 +0000 https://www.atlanticcouncil.org/?p=807267 To ensure regional security, NATO must continue enhancing its capabilities and remain as a combat-ready force.

The post NATO exercises: The guarantee of Alliance security and test of readiness appeared first on Atlantic Council.

]]>
Since its establishment in 1949, NATO has been dedicated to securing lasting peace in Europe and across the transatlantic region, based on individual liberty, democracy, human rights, and the rule of law. As of 2024, NATO has expanded its membership to thirty-two countries, covering an area that represents 16.63 percent of the world’s habitable land and 12.13 percent of the global population. To maintain this peace, NATO must ensure effective deterrence, enhance its capabilities, utilize resources efficiently, and remain a combat-ready force.

Achieving combat readiness is a comprehensive process that involves several key components:

  1. Training and education: Regular drills and exercises, specialized training, and continuous education on the latest technology, tactics, and global security developments.
  2. Logistical preparation: Efficient supply chain management, maintenance and upkeep of equipment, and rapid deployment capabilities.
  3. Technological readiness: Modernization of equipment and robust cybersecurity measures to maintain operational integrity.
  4. Intelligence and surveillance: Accurate and timely intelligence, supported by robust surveillance systems and networks.
  5. Strategic planning: Effective scenario planning and flexible strategies.
  6. Physical and mental preparedness: Ensuring physical conditioning and mental resilience.
  7. Interoperability and coordination: Conducting joint operations and fostering allied cooperation.
  8. Leadership and command structure: Maintaining strong leadership and a clear command structure.

In this article, I will strategically examine NATO exercises within the field of training and education.

While war games and military exercises simulate real scenarios, they differ in execution. Military exercises involve actual troops and equipment, focusing on replicating wartime decisions for training purposes. In contrast, war games use simulations with artificial players and models to explore potential decisions and outcomes.

Exercises serve various purposes, including testing tactics, demonstrating deterrence, and ensuring forces are prepared for combat. They also verify the readiness of units before deployment.

NATO held its first military exercise in 1951 to develop a unified military force under centralized command. Since then, NATO has conducted thousands of exercises across various domains, particularly during the Cold War. Notable exercises include the REFORGER (Return of Forces to Germany) series, which tested the rapid deployment of North American troops to Europe, with the last major exercise being REFORGER 88, involving 125,000 personnel.

NATO’s rapid reaction forces have evolved since the creation of the Allied Command Europe Mobile Force (AMF) in 1960, which played a crucial role in deterrence and defense during the Cold War. Subsequently, NATO expanded its mission to include crisis response, reflecting the evolving security environment.

In 2002, the AMF was restructured into the NATO Response Force (NRF), which continues to be integral to NATO’s strategy, ensuring readiness and adaptability through operational exercises.

Following Russia’s annexation of Crimea in 2014 and the full-scale invasion of Ukraine in 2022, NATO significantly increased its collective defense exercises and further enhanced its defense plans.

Now, let us explore NATO and member exercises conducted in 2024 to gain some insights:

  1. Steadfast Defender 24: NATO’s largest military exercise held from January to May 2024, showcased the enduring unity between Europe and North America, reflecting the shared commitment to safeguarding over one billion people for the past seventy-five years. The exercise involved over 90,000 troops from all thirty-two NATO members and was conducted in two main phases: securing the Atlantic region and rapidly moving troops across Europe, from the High North to Central and Eastern Europe. This exercise demonstrated NATO’s ability to respond swiftly to emerging threats and highlighted the Alliance’s readiness and collective defense capabilities.
  2. Coalition Warrior Interoperability Exercise (CWIX): An annual NATO exercise celebrating its twenty-fifth anniversary in 2024, CWIX enhances the readiness and resilience of command-and-control capabilities and IT services. Hosted at NATO’s Joint Force Training Centre in Poland, CWIX 2024 involved over 2,500 participants and tested more than 26,000 cases across 480 capabilities, from emerging technologies to proven tools. CWIX plays a crucial role in ensuring interoperability among NATO forces.
  3. EFES 2024: The largest joint military exercise conducted by the Turkish Armed Forces, held from April 25 to May 31, 2024, took place in two phases: a computer-assisted command post phase in Istanbul and a live-fire phase in Izmir. With participation from forty-five nations and nearly 11,000 military personnel, EFES 2024 demonstrated significant international military collaboration and commitment. Participants included nine NATO members, sixteen NATO partners, fifteen African Union countries, two Latin American nations, one Middle Eastern nation, one other European nation, and one Asian nation, highlighting its importance in regional and global security.
  4. Baltic Operations 2024, Ramstein Legacy 24, and other exercises also involved members and partners.

Based on the exercises, three separate reports, analyses, and the ongoing Ukraine-Russia war since 2022, we can conclude that although NATO has made substantial progress in areas such as defense spending, forward defense, high-readiness forces, command and control, and collective defense exercises, as well as integrating new members, the alliance is prepared for immediate combat but may not be fully equipped for a protracted war. Therefore, what are our short- and mid-term solutions to address the vulnerabilities?”

Drawing from my NATO and national experience, as well as academic research, I offer the following recommendations for improving exercises to strengthen deterrence:

  • Address and overcome key lessons learned in meetings at all levels, from the chair of the NATO Military Committee (CMC), supreme allied commander Europe (SACEUR), and supreme allied commander transformation (SACT), down to component commanders, chiefs of staff, mentors, and directors of centers of excellence.
  • Designate mentors/senior fellows with academic and combat experience to NATO institutions, such as the NATO Defense College and NATO School.
  • Develop more effective leadership training at all levels to ensure quick and accurate decision-making.
  • Enhance response plans for various conflict scenarios, including asymmetric and future challenges, to improve forces’ readiness for unforeseen situations.
  • Test physical and psychological training to ensure troops manage combat demands and stresses.
  • Improve national resilience and interoperability across all domains through joint, allied, and live-fire exercises and operations.
  • Ensure that the southern region also is included in exercises.

Lastly, to guarantee alliance security, we must prepare our troops without hesitation, with combat readiness listed as a top priority.


Uğur Tarçın is a retired Turkish Lieutenant General. He served in Italy, Bosnia-Herzegovina, Kosovo, Belgium, the USA, and İzmir, throughout his NATO career. Currently, he teaches at Marmara University and SAHA ISTANBUL Academy.

Explore other issues

The Atlantic Council in Turkey aims to promote and strengthen transatlantic engagement with the region by providing a high-level forum and pursuing programming to address the most important issues on energy, economics, security, and defense.

The post NATO exercises: The guarantee of Alliance security and test of readiness appeared first on Atlantic Council.

]]>
Marc Polymeropoulos reflects on future of the Pentagon under Trump with MSNBC https://www.atlanticcouncil.org/insight-impact/in-the-news/marc-polymeropoulos-reflects-on-future-of-the-pentagon-under-trump-with-msnbc/ Mon, 25 Nov 2024 14:42:42 +0000 https://www.atlanticcouncil.org/?p=809341 On November 24, Marc Polymeropoulos joined MSNBC to discuss what the defense and intelligence community can expect from President-elect Trump’s promised changes.

The post Marc Polymeropoulos reflects on future of the Pentagon under Trump with MSNBC appeared first on Atlantic Council.

]]>

On November 24, Marc Polymeropoulos joined MSNBC to discuss what the defense and intelligence community can expect from President-elect Trump’s promised changes.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Marc Polymeropoulos reflects on future of the Pentagon under Trump with MSNBC appeared first on Atlantic Council.

]]>
Michael Groen writes an op-ed about securing AI labs in Real Clear Defense https://www.atlanticcouncil.org/insight-impact/in-the-news/michael-groen-writes-an-op-ed-about-securing-ai-labs-in-real-clear-defense/ Mon, 25 Nov 2024 14:41:25 +0000 https://www.atlanticcouncil.org/?p=809091 On November 21, Michael Groen, non-resident senior fellow at Forward Defense, authored an op-ed for Real Clear Defense arguing that the United States must focus on securing AI laboratories to protect its razor-thin advantage in the AI race with China. In his words, to address threats from China’s cyber-espionage and intellectual property theft, “the U.S. government, academia, […]

The post Michael Groen writes an op-ed about securing AI labs in Real Clear Defense appeared first on Atlantic Council.

]]>

On November 21, Michael Groen, non-resident senior fellow at Forward Defense, authored an op-ed for Real Clear Defense arguing that the United States must focus on securing AI laboratories to protect its razor-thin advantage in the AI race with China. In his words, to address threats from China’s cyber-espionage and intellectual property theft, “the U.S. government, academia, and the private sector need to take coordinated action.”

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Michael Groen writes an op-ed about securing AI labs in Real Clear Defense appeared first on Atlantic Council.

]]>
Why this former Finnish president wants a new European spy agency https://www.atlanticcouncil.org/blogs/new-atlanticist/why-this-former-finnish-president-wants-a-new-european-spy-agency/ Tue, 05 Nov 2024 16:30:29 +0000 https://www.atlanticcouncil.org/?p=804747 One notable recommendation in a new report by former President of Finland Sauli Niinistö is the creation of a unified EU intelligence service.

The post Why this former Finnish president wants a new European spy agency appeared first on Atlantic Council.

]]>
Europe has seen report after report on how to bolster its defenses and enhance its readiness in an increasingly unpredictable world. The most recent of these comes from Sauli Niinistö, the former president of Finland and now a special adviser to the president of the European Commission. Published on October 30, this report, alongside others like the much-discussed Mario Draghi paper on European competitiveness, lays out a number of familiar, albeit urgent, calls for action. Will it be different this time? Will Europe follow through on these recommendations?

A push for real intelligence sharing

Notably, one of Niinistö’s top recommendations goes a step beyond usual European diplomatic rhetoric: the creation of a unified European Union (EU) intelligence service. “As a long-term objective, the EU should have a fully-fledged intelligence cooperation service, serving all EU institutions and Member States,” he writes in the report. However, he goes on to note that its aim “should not be to emulate the tasks of Member States’ national foreign intelligence and domestic security services, nor to interfere with their prerogative on national security.”

Instead, Niinistö suggests strengthening the EU’s Single Intelligence Analysis Capacity, which includes both the EU Intelligence and Situation Centre and EU military intelligence within the EU Military Staff under the European External Action Service, the diplomatic service of the EU. Both entities operate under the EU High Representative for Foreign Affairs, and former Estonian Prime Minister Kaja Kallas is the designate for this position. This framework should serve as an official channel for intelligence exchange among the EU’s intelligence services. The need for such a channel was made clear following Russia’s full-scale invasion of Ukraine in 2022 and China’s pledge of a “no limits” relationship with Russia, which underscored how ill unprepared the EU was for the emerging challenges posed by Moscow and Beijing.

In practice, this would mean deeper, more structured cooperation among member states to share intelligence and respond faster to hybrid threats, such as cyberattacks and disinformation campaigns. This recommendation acknowledges the reality that Europe’s security challenges demand something stronger than piecemeal national efforts or ad hoc alliances, as the hybrid attack on the Finnish, Polish, Lithuanian, Latvian, and Estonian borders made clear. 

Many Russian and Chinese diplomats have been expelled from European capitals due to espionage allegations, while Brussels, home to numerous institutions and embassies, has become a hub for covert activities. The war in Ukraine has further fueled instability within the EU, with incidents ranging from drones surveilling military training areas and assassination plots against arms industry executives to sabotage. Western nations already collaborate on intelligence through the Five Eyes alliance, which links the agencies of the United States, United Kingdom, Australia, Canada, and New Zealand. Niinistö emphasized that any EU intelligence body should focus on leveraging and effectively utilizing existing intelligence.

More civil-military coordination

Another standout from the report is Niinistö’s call for a European Civil Defence Mechanism to bridge the gap between military and civilian responses. The war in Ukraine has shown that keeping essential services running during conflict is just as crucial as maintaining military strength.

The report points out that Europe needs to move past its fragmented approach and ensure that when a crisis hits, military and civilian authorities are coordinated. This isn’t just theory; it’s the kind of readiness that can save lives and stabilize societies.

Public-private partnerships

The COVID-19 pandemic was a crash course in why private sector involvement is indispensable in a crisis. During the pandemic, partnerships with private companies were essential for vaccine development and distribution.

In his report, Niinistö argues that these lessons need to be expanded to broader crisis preparedness. This means developing clear rules for public-private cooperation, especially in industries vital for crisis response such as energy, medicine, and transportation.

Stockpiles and supply chains

Europe’s supply chain issues during recent crises exposed a major weakness. In response, Niinistö calls for a comprehensive EU-level stockpiling strategy to prevent future shortages.

Coordinating reserves across public and private sectors can buffer against disruptions, whether they come from geopolitical tensions or natural disasters. An EU-wide stockpiling strategy is practical, overdue, and aligns with similar calls in Draghi’s economic competitiveness report.

Getting citizens on board

Preparedness isn’t just a government affair; it’s a societal effort. Currently, only 32 percent of Europeans indicate that they would be willing to defend their country if it were involved in a war.

The Niinistö report stresses that Europeans need to be informed, engaged, and prepared at a personal level. Encouraging citizens to take an active role, from learning basic crisis management to preparing for power outages, is part of a realistic resilience plan.

Another report, but what next?

Reports like Niinistö’s and Draghi’s outline clear paths forward, but their effectiveness depends on political will and follow-through. In Niinistö’s report, the ambitions are clearly outlined: intelligence cooperation, military-civil readiness, and crisis preparedness. Niinistö’s report will contribute to the agenda of European Commission President Ursula von der Leyen’s upcoming term, during which the EU is set to appoint its first defense commissioner (former Lithuanian Prime Minister Andrius Kubilius). This new role will include the responsibility of preparing a comprehensive defense white paper, expected to be unveiled by next spring.

What Europe needs now is to move past endless discussions and start implementing real, measurable actions. If these ideas remain only on paper, Europe’s preparedness will continue to lag behind the evolving threats it faces.


Piotr Arak is an assistant professor of economic sciences at the University of Warsaw and chief economist at VeloBank Poland.

The post Why this former Finnish president wants a new European spy agency appeared first on Atlantic Council.

]]>
Congressman Mike Turner on how the ‘emerging axis of evil’ will challenge the next US administration https://www.atlanticcouncil.org/blogs/new-atlanticist/congressman-mike-turner-on-how-the-emerging-axis-of-evil-will-challenge-the-next-us-administration/ Thu, 31 Oct 2024 16:07:50 +0000 https://www.atlanticcouncil.org/?p=803980 The chairman of the House Permanent Select Committee on Intelligence discussed the threats to US security that the next president will face.

The post Congressman Mike Turner on how the ‘emerging axis of evil’ will challenge the next US administration appeared first on Atlantic Council.

]]>

The next presidential administration is going to have to “step up to the plate” in terms of leadership to “change the direction” of the wars in Ukraine and the Middle East, said US Congressman Mike Turner at an Atlantic Council Front Page event on Wednesday. 

Turner, an Ohio Republican who is chair of the House Permanent Select Committee on Intelligence, added that the next president must ensure that US adversaries “see a United States that is going to step up and say, ‘We’re going to not only de-escalate but resolve these conflicts in favor of the United States.’”

He also addressed the recent movement of thousands of North Korean troops into Russia to fight Ukraine, which Turner said should be considered a “red line” for Ukraine’s Western partners. “The United States and NATO allies should seriously discuss and consider attacking directly North Korean troops that are in Ukraine and that are attacking Ukraine,” he said. “I’m not saying that it should be a decision that is finalized,” he added, but he said that NATO leaders should “have the discussion.”

Below are more highlights from this discussion on the US election and the national security threats the next administration will face, which was moderated by Atlantic Council President and CEO Frederick Kempe.

An emerging axis

  • Turner said that “China is the most significant threat” that the United States faces, but he added that the “most immediate threat” to US interests is the “emerging axis of evil,” referring to increasing defense and economic cooperation among Russia, China, Iran, and North Korea.
  • The next administration, Turner said, must understand that this enhanced defense cooperation “is a direct threat” to the United States and the West. “These are not small territorial skirmishes. They’re not regional conflicts. This is a much broader conflict,” he said.
  • Meeting this threat, he said, will require significant investments in the “deferred maintenance and modernization that needs to happen to the United States’ military systems so that we can have parity with our great power competitors.”

Nuclear threats

  • Comparing the US nuclear arsenal to an antique car, Turner said the United States needed to modernize its nuclear weapons capabilities. Since Russia’s and China’s nuclear weapons are newer, Turner argued, they “don’t look at us as having the same level of deterrence that they do.”
  • Turner highlighted the threat that would be posed if Russia were to put an anti-satellite nuclear weapon in space, as US intelligence that Turner made public in February indicates Moscow has made advances toward. Comparing the prospect to a “Cuban missile crisis in space,” he said that if Russia were to detonate such a weapon, “all low-Earth orbit satellites would be decimated,” and financial, communications, and military infrastructure relying on space “would be wiped out.”
  • As Israel has dealt severe blows to the Iranian-backed Hezbollah and Hamas, there is “an opportunity to impact Iran’s march to becoming a nuclear weapon state.” With Tehran’s proxies diminished, Turner said, “the focus becomes directly on Iran itself.”

The way forward in Ukraine

  • Turner argued that more robust support for Kyiv, such as allowing Ukrainian forces to strike deeper inside Russia with US and Western weapons, would lead to greater congressional support for more Ukraine aid. “People want a plan to win,” he said. “If there is viable support and strong support” for Ukraine from the next administration, he added, “I think you’ll see stronger support in Congress.”
  • On a potential peace agreement between Ukraine and Russia, Turner said that whatever the outcome of such negotiations, “we need to make certain that Crimea does not become militarized.” If Russia kept Crimea in a peace settlement and militarized it, Turner warned, then along with the exclave of Kaliningrad, Russia will have “reconstituted the reach of the former Soviet Union through the Warsaw Pact countries by merely owning two pieces of real estate.”

Daniel Hojnacki is an assistant editor on the editorial team at the Atlantic Council.

Watch the full event

The post Congressman Mike Turner on how the ‘emerging axis of evil’ will challenge the next US administration appeared first on Atlantic Council.

]]>
Eftimiades interviewed for France TV documentary on China’s espionage and transnational repression https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-interviewed-for-france-tv-documentary-on-chinas-espionage-and-transnational-repression/ Tue, 29 Oct 2024 19:21:34 +0000 https://www.atlanticcouncil.org/?p=803432 In 2024, Forward Defense Nonresident Senior Fellow Nicholas Eftimiades was interviewed for an award-winning documentary by France Télévisions on Chinese espionage and transnational repression efforts.

The post Eftimiades interviewed for France TV documentary on China’s espionage and transnational repression appeared first on Atlantic Council.

]]>

In 2024, Forward Defense Nonresident Senior Fellow Nicholas Eftimiades was interviewed for an award-winning documentary by France Télévisions on Chinese espionage and transnational repression efforts. The documentary outlines recent cases of international spying by China’s Ministry of State Security (Guoanbu), as well as examples of the arrest and repatriation of Chinese nationals under the Chinese government’s Operation Fox Hunt. Eftimiades was interviewed and quoted extensively throughout the film, saying that “The Ministry of State Security has about a hundred thousand people, which is five times [the size of] the largest intelligence services out there. We’ve never seen anything like this in history before. Even the old days of the Soviet Trust in the 1930s had nowhere near this much reach and power.”

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades interviewed for France TV documentary on China’s espionage and transnational repression appeared first on Atlantic Council.

]]>
Braw in Politico on whole-of-society approach to intelligence https://www.atlanticcouncil.org/insight-impact/in-the-news/braw-in-politico-on-whole-of-society-approach-to-intelligence/ Tue, 22 Oct 2024 12:03:49 +0000 https://www.atlanticcouncil.org/?p=807299 On October 22, Transatlantic Security Initiative senior fellow Elisabeth Braw wrote an op-ed in Politico discussing the changes that the Western allies need to make to make sure their intelligence capabilities remain up to the task.

The post Braw in Politico on whole-of-society approach to intelligence appeared first on Atlantic Council.

]]>

On October 22, Transatlantic Security Initiative senior fellow Elisabeth Braw wrote an op-ed in Politico discussing the changes that the Western allies need to make to make sure their intelligence capabilities remain up to the task.

The Transatlantic Security Initiative, in the Scowcroft Center for Strategy and Security, shapes and influences the debate on the greatest security challenges facing the North Atlantic Alliance and its key partners.

The post Braw in Politico on whole-of-society approach to intelligence appeared first on Atlantic Council.

]]>
Marc Polymeropoulos analyzes recent Israeli intelligence successes in Foreign Policy https://www.atlanticcouncil.org/insight-impact/in-the-news/marc-polymeropoulos-analyzes-recent-israeli-intelligence-successes-in-foreign-policy/ Fri, 11 Oct 2024 18:30:00 +0000 https://www.atlanticcouncil.org/?p=799773 On October 10, Foreign Policy published an op-ed co-authored by Marc Polymeropoulos, nonresident senior fellow at Forward Defense, David V. Gioe, and Elena Grossfeld, about the renaissance of Israel’s intelligence after the failure of October 7.

The post Marc Polymeropoulos analyzes recent Israeli intelligence successes in Foreign Policy appeared first on Atlantic Council.

]]>

On October 10, Foreign Policy published an op-ed co-authored by Marc Polymeropoulos, nonresident senior fellow at Forward Defense, David V. Gioe, and Elena Grossfeld, about the renaissance of Israel’s intelligence after the failure of October 7.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Marc Polymeropoulos analyzes recent Israeli intelligence successes in Foreign Policy appeared first on Atlantic Council.

]]>
Marc Polymeropoulos on NBC about the future of Iran’s ‘axis of resistence’ https://www.atlanticcouncil.org/insight-impact/in-the-news/marc-polymeropoulos-on-nbc-about-the-future-of-irans-axis-of-resistence/ Fri, 11 Oct 2024 18:24:15 +0000 https://www.atlanticcouncil.org/?p=796143 On September 30, Marc Polymeropoulos, nonresident senior fellow at at Forward Defense, was quoted by NBC in an article analyzing the future of Iran’s ‘axis of resistance’ after Israel’s significant blows to Hamas and Hezbollah. In his words, “The one concern we should have is a return to the old kind of terrorist game, soft […]

The post Marc Polymeropoulos on NBC about the future of Iran’s ‘axis of resistence’ appeared first on Atlantic Council.

]]>

On September 30, Marc Polymeropoulos, nonresident senior fellow at at Forward Defense, was quoted by NBC in an article analyzing the future of Iran’s ‘axis of resistance’ after Israel’s significant blows to Hamas and Hezbollah. In his words, “The one concern we should have is a return to the old kind of terrorist game, soft targets such as embassies overseas, both Israeli and U.S.”

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Marc Polymeropoulos on NBC about the future of Iran’s ‘axis of resistence’ appeared first on Atlantic Council.

]]>
Marc Polymeropoulos joins AEI’s WTH Is Going On Podcast on Lebanon pager attacks https://www.atlanticcouncil.org/insight-impact/in-the-news/marc-polymeropoulos-joins-aeis-wth-is-going-on-podcast-on-lebanon-pager-attacks/ Fri, 11 Oct 2024 18:16:53 +0000 https://www.atlanticcouncil.org/?p=794063 On September 23, Marc Polymeropoulos, nonresident senior fellow at Forward Defense, joined Danielle Pletka and Marc A. Thiessen on The American Enterprise Institute’s What The Hell Is Going On podcast to talk about the pager attacks Israel carried out against Hezbollah in Lebanon.

The post Marc Polymeropoulos joins AEI’s WTH Is Going On Podcast on Lebanon pager attacks appeared first on Atlantic Council.

]]>

On September 23, Marc Polymeropoulos, nonresident senior fellow at Forward Defense, joined Danielle Pletka and Marc A. Thiessen on The American Enterprise Institute’s What The Hell Is Going On podcast to talk about the pager attacks Israel carried out against Hezbollah in Lebanon.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Marc Polymeropoulos joins AEI’s WTH Is Going On Podcast on Lebanon pager attacks appeared first on Atlantic Council.

]]>
Marc Polymeropoulos mentioned in YNET News about Hezbollah pager attacks https://www.atlanticcouncil.org/insight-impact/in-the-news/marc-polymeropoulos-mentioned-in-ynet-news-about-hezbollah-pager-attacks/ Fri, 11 Oct 2024 18:13:34 +0000 https://www.atlanticcouncil.org/?p=793893 On September 21, YNET News, an Israeli media outlet, mentioned comments from Marc Polymeropoulos, nonresident senior fellow at Forward Defense, calling Hezbollah pager attacks as ” the most impressive kinetic operation I can recall in my career. Israeli intelligence is living in [Hasan] Nasrallah’s brain.” These comments were inserted in an article detailing reactions from […]

The post Marc Polymeropoulos mentioned in YNET News about Hezbollah pager attacks appeared first on Atlantic Council.

]]>

On September 21, YNET News, an Israeli media outlet, mentioned comments from Marc Polymeropoulos, nonresident senior fellow at Forward Defense, calling Hezbollah pager attacks as ” the most impressive kinetic operation I can recall in my career. Israeli intelligence is living in [Hasan] Nasrallah’s brain.” These comments were inserted in an article detailing reactions from US national security leadership and community.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Marc Polymeropoulos mentioned in YNET News about Hezbollah pager attacks appeared first on Atlantic Council.

]]>
Marc Polymeropoulos’ tweet about Hezbollah pager attacks mentioned in SpyTalk https://www.atlanticcouncil.org/insight-impact/in-the-news/marc-polymeropoulos-tweet-about-hezbollah-pager-attacks-mentioned-in-spytalk/ Fri, 11 Oct 2024 18:09:36 +0000 https://www.atlanticcouncil.org/?p=793891 On September 21, SpyTalk’s weekly roundabout on the latest news about intelligence, foreign policy, and military operations mentioned Marc Polymeropoulos, nonresident senior fellow at Forward Defense, for his tweet calling Hezbollah pager attacks “most impressive denied area kinetic op I have witnessed in my career.” 

The post Marc Polymeropoulos’ tweet about Hezbollah pager attacks mentioned in SpyTalk appeared first on Atlantic Council.

]]>

On September 21, SpyTalk’s weekly roundabout on the latest news about intelligence, foreign policy, and military operations mentioned Marc Polymeropoulos, nonresident senior fellow at Forward Defense, for his tweet calling Hezbollah pager attacks “most impressive denied area kinetic op I have witnessed in my career.” 

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Marc Polymeropoulos’ tweet about Hezbollah pager attacks mentioned in SpyTalk appeared first on Atlantic Council.

]]>
Marc Polymeropoulos mentioned in the Washington Post about Hezbollah pager attacks https://www.atlanticcouncil.org/insight-impact/in-the-news/marc-polymeropoulos-mentioned-in-the-washington-post-about-hezbollah-pager-attacks/ Fri, 11 Oct 2024 18:07:36 +0000 https://www.atlanticcouncil.org/?p=793883 On September 21, Marc Polymeropoulos, nonresident senior fellow at Forward Defense, was mentioned in “Israel’s pager attack an intelligence triumph, with uncertain ends” by Shane Harris in the Washington Post. The article mentioned Polymeropoulos’ comment describing the attacks as “the most impressive denied area kinetic op I have witnessed in my career.”

The post Marc Polymeropoulos mentioned in the Washington Post about Hezbollah pager attacks appeared first on Atlantic Council.

]]>

On September 21, Marc Polymeropoulos, nonresident senior fellow at Forward Defense, was mentioned in “Israel’s pager attack an intelligence triumph, with uncertain ends” by Shane Harris in the Washington Post. The article mentioned Polymeropoulos’ comment describing the attacks as “the most impressive denied area kinetic op I have witnessed in my career.”

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Marc Polymeropoulos mentioned in the Washington Post about Hezbollah pager attacks appeared first on Atlantic Council.

]]>
Marc Polymeropoulos on South China Morning Post about possible Israeli intentions behind Hezbollah pager attacks https://www.atlanticcouncil.org/insight-impact/in-the-news/marc-polymeropoulos-on-south-china-morning-post-about-possible-israeli-intentions-behind-hezbollah-pager-attacks/ Fri, 11 Oct 2024 17:59:32 +0000 https://www.atlanticcouncil.org/?p=793856 On September 20, Marc Polymeropoulos, nonresident senior fellow at Forward Defense, spoke with the South China Morning Post about possible Israeli intentions behind the pager attacks against Hezbollah. In his remarks, Polymeropoulos explored the possibility that the Hezbollah pager attacks may be part of a wider Israeli strategy of “escalate to deescalate.”

The post Marc Polymeropoulos on South China Morning Post about possible Israeli intentions behind Hezbollah pager attacks appeared first on Atlantic Council.

]]>

On September 20, Marc Polymeropoulos, nonresident senior fellow at Forward Defense, spoke with the South China Morning Post about possible Israeli intentions behind the pager attacks against Hezbollah. In his remarks, Polymeropoulos explored the possibility that the Hezbollah pager attacks may be part of a wider Israeli strategy of “escalate to deescalate.”

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Marc Polymeropoulos on South China Morning Post about possible Israeli intentions behind Hezbollah pager attacks appeared first on Atlantic Council.

]]>
Marc Polymeropoulos joins MSNBC to weigh in on Israeli military strikes against Hezbollah in Lebanon https://www.atlanticcouncil.org/insight-impact/in-the-news/marc-polymeropoulos-joins-msnbc-to-weigh-in-on-israeli-military-strikes-against-hezbollah-in-lebanon/ Fri, 11 Oct 2024 17:56:28 +0000 https://www.atlanticcouncil.org/?p=793877 On September 19, Marc Polymeropoulos, nonresident senior fellow at Forward Defense, joined NBC News’ Raf Sanchez and retired Gen. Barry McCaffrey to discuss Israel’s military strikes against Hezbollah in Lebanon after the waves of walkie-talkies and pagers explosions.

The post Marc Polymeropoulos joins MSNBC to weigh in on Israeli military strikes against Hezbollah in Lebanon appeared first on Atlantic Council.

]]>

On September 19, Marc Polymeropoulos, nonresident senior fellow at Forward Defense, joined NBC News’ Raf Sanchez and retired Gen. Barry McCaffrey to discuss Israel’s military strikes against Hezbollah in Lebanon after the waves of walkie-talkies and pagers explosions.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Marc Polymeropoulos joins MSNBC to weigh in on Israeli military strikes against Hezbollah in Lebanon appeared first on Atlantic Council.

]]>
Marc Polymeropoulos joins MSNBC to comment on Israel’s alleged elimination of senior Hezbollah leadership https://www.atlanticcouncil.org/insight-impact/in-the-news/marc-polymeropoulos-joins-msnbc-to-comment-on-israels-alleged-elimination-of-senior-hezbollah-leadership/ Mon, 07 Oct 2024 14:36:24 +0000 https://www.atlanticcouncil.org/?p=793867 On September 20, Marc Polymeropoulos, nonresident senior fellow at Forward Defense, joined MSNBC Peter Alexander and Colin Clarke of The Soufan Group to assess Israel’s officials claim “entire senior Hezbollah ‘command'” has been eliminated.

The post Marc Polymeropoulos joins MSNBC to comment on Israel’s alleged elimination of senior Hezbollah leadership appeared first on Atlantic Council.

]]>

On September 20, Marc Polymeropoulos, nonresident senior fellow at Forward Defense, joined MSNBC Peter Alexander and Colin Clarke of The Soufan Group to assess Israel’s officials claim “entire senior Hezbollah ‘command'” has been eliminated.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Marc Polymeropoulos joins MSNBC to comment on Israel’s alleged elimination of senior Hezbollah leadership appeared first on Atlantic Council.

]]>
Testimony on Israel and the Middle East at a crossroads: How Tehran’s terror campaign threatens the US and our allies https://www.atlanticcouncil.org/commentary/testimony/testimony-on-israel-and-the-middle-east-at-a-crossroads-how-tehrans-terror-campaign-threatens-the-us-and-our-allies/ Thu, 19 Sep 2024 15:17:07 +0000 https://www.atlanticcouncil.org/?p=793130 Kirsten Fontenrose, nonresident senior fellow at the Scowcroft Middle East Security Initiative in the Atlantic Council’s Middle East Programs, testifies before the US House Committee on Foreign Affairs on how Tehran’s terror campaign threatens the US and allies. Below are her prepared remarks. Chairman Burchett, Ranking Member Phillips, and members of the Committee, thank you […]

The post Testimony on Israel and the Middle East at a crossroads: How Tehran’s terror campaign threatens the US and our allies appeared first on Atlantic Council.

]]>

Kirsten Fontenrose, nonresident senior fellow at the Scowcroft Middle East Security Initiative in the Atlantic Council’s Middle East Programs, testifies before the US House Committee on Foreign Affairs on how Tehran’s terror campaign threatens the US and allies. Below are her prepared remarks.

Chairman Burchett, Ranking Member Phillips, and members of the Committee, thank you for the opportunity to testify.  I served as the Senior Director for Gulf Affairs at the National Security Council for 2018, after nearly twenty years of service focused on the Middle East and Africa at the Department of Defense, Department of State and other branches of government. In each role I witnessed the advancement of a positive American agenda for catalyzing strong security partners, welcoming markets, and stable governments across the Middle East stymied by a determination in Tehran to undermine U.S. partnerships and extirpate U.S. influence from Marrakesh to Bangladesh.  

This influence underpins American economic power in the region, opening doors for American businesses, increasing access to critical natural and technical resources, and ensuring strong currencies are tightly intertwined with the dollar. It underpins the U.S.’ ability to sustain strategic reach without a large footprint, creating demand to equip and train militaries with whom the U.S. can plug-and-play when necessary. It underpins the willingness of regional partners to engage with the U.S. on ways to expand civil liberties and personal freedoms anathema to Iran’s oppressive theocracy.  

I closely track the Islamic Revolutionary Guard Corps’ (IRGC) development of weaponry. Because of growth in their missile and drone programs, accelerated by the lapse of U.N. sanctions and provisions in UNSCR 2231 in 2020 and 2023, Iran is now able to deliver lethal effects to every country in the Middle East.  

Iran has learned to exploit swings in U.S. policy, divisions between the U.S. and partners in Europe and the Middle East, the openness of American society, commercially available dual-use technology, and criminal gangs in their multi-pronged, terrorism-based effort to ensure the regime’s survival and weaken U.S. resolve. In the last three administrations the U.S. strove to alter Iran’s foreign policy using carrots, then sticks, then carrots again.  What has not been tried is a long-term, multi-domain, bipartisan strategy for addressing Iran’s goal to unseat the U.S. as the partner of choice for many important Arab states. 

Tehran Believes it is Winning  

Iran does not want a full-scale war in the Middle East at this moment. Leaders in Tehran do not seek to invite American military operations against their homeland. In their estimation, making the region inhospitable to U.S. forces is the more prudent way to actualize the Supreme Leader’s vision of a “great estate” in which the theocracy dictates the foreign policy of western Asia.  

With this goal in mind, Tehran believes it is winning, at low cost. Iran’s lesson learned from the Gaza conflict is that the return on their investment in Hamas, the Houthis, Hezbollah and lesser militias has paid off handsomely: U.S. society is divided; Israeli society is divided; the U.S.-Israel relationship is strained; the U.S. reputation internationally is tarnished; 60,000 Israelis are displaced from the northern border; the Abraham Accords are paused; militias in Syria and Iraq are sustaining pressure on U.S. troops; and maintaining a heightened defense posture at home and at its embassies globally while Tehran deliberates retaliation for the deaths of Ismail Haniyeh and Fuad Shukr is straining Israel’s manpower and budget.  

This upheaval is equally useful to Tehran in distracting attention in western capitals from IRGC operations that should be the focus of a coordinated coalition counter effort.  These operations are poorly addressed and merit smarter action in cooperation with partners: 

  • Houthi attacks on global shipping from Yemen. All 6 types of anti-ship ballistic missiles and 4 of the 6 types of cruise missiles used by the Houthis in attacking ships in the Red Sea are provided by Iran or fitted with Iranian guidance kits. Protecting the freedom of navigation in global shipping lanes is a top U.S. objective per both the U.S. National Security Strategy and National Defense Strategy, yet the U.S. currently outsources implementation of this objective to European navies with a fraction of the U.S. capability to address it.  
  • Ties to terrorist groups with American blood on their hands. In the astute words of a 30-year veteran of the U.S. intelligence community with deep knowledge of Iran’s covert activities, “Iran is the only country in the world that has maintained a relationship with Al Qaeda – to include allowing an active Al Qaeda facilitation cell on its territory – without paying a price.” 
  • Ties to criminal networks in the U.S. and Europe in the service of assassination and kidnapping plots. Operations to silence journalists and dissidents abroad have been a pillar of Iran’s foreign policy for 40 years. These have evolved in an alarming way, as reported by the Washington Post on September 12th of this year. Western intelligence services accustomed to tracking IRGC Quds Force operatives see a new reliance on western criminal networks who traverse borders with ease.  The Financial Times has reported on attempts by Iran and Hezbollah to acquire weapons from drug cartels.
  • Disinformation campaigns to divide America from withinMicrosoft and Open AI discovered 5 Iran-backed websites aimed at English speakers globally that promulgate false narratives about the U.S.  The Foundation for Defense of Democracies identified 14 more. Examples include “Afro Majority” which targets African Americans, and “Not Our War” targeting American veterans.  Specific to the war in Gaza, Iran removed the data in a Palestinian polling group’s survey results and replaced them with false numbers that implied an inaccurately high rate of Palestinian support for Hamas as future leaders of Gaza. In the summer of 2024 U.S. ODNI revealed that Tehran sponsored anti-Israel protests on U.S. college campuses and attempted hacks on the Presidential campaigns of both major U.S. political parties. Iran’s alignment with China in the pursuit of sowing division among American communities gives the regime unfettered access to American youth via Chinese-owned social media platforms. To apply a military term, Iran and China are engaged in Phase 0 (pre conflict) shaping of the environment in the U.S., continuously exposing Americans to disinformation. Without hyperbole, the risk in not addressing this activity is that future generations of American decision makers will be fed an unhealthy dose of what our adversaries want them to consume. 
  • Sales of ballistic missiles and drones to aid Russia’s invasion of Ukraine. The U.S. and European partners were aghast when Iran sold Shahed series attack drones to Russia yet actions did nothing to deter further sales.  Russia now produces those drones domestically, geometrically increasing their use on the battlefield. Iran followed with the sale of Fatteh-136 short range ballistic missiles. The only effective defense against these missiles are Patriot interceptors, which are expensive and in low stock. Looking forward, it is logical to expect the Iran-Russia weapons program propinquity to expand to co-development and production of new weaponry. 

Calculus in Tehran 

The Permanent Mission of the Islamic Republic of Iran to the United Nations (U.N.) denied this missile transfer. The framing of this denial is important because it illustrates the duplicity inherent in the regime’s foreign policy, and it is as ironic in the context of Gaza as it is in Ukraine: “Iran’s position vis-à-vis the Ukraine conflict remains unchanged. Iran considers the provision of military assistance to the parties engaged in the conflict – which leads to increased human casualties, destruction of infrastructure, and a distancing from ceasefire negotiations – to be inhumane.  Thus, not only does Iran abstain from engaging in such actions itself, but it also calls upon other countries to cease the supply of weapons to the sides involved in the conflict.” 

Iran recently elected a President marketed as a “moderate” in a vote with the lowest turnout in the regime’s history. While President Pezashkian may truly harbor dreams of reform, he is in no position to enact them.  His engineered election is proof of a shrewd calculation by the regime inner circle.  They expect that offering new nuclear negotiations may entice a Harris administration or create obstacles for a Trump administration in ways that protect the regime’s interests.  

Being at the table for nuclear talks has proven to be a sweet spot for this regime.  The talks are the goal.  They have no intention of signing a deal.  Tehran expects that if a Harris administration takes the helm they can freeze nuclear enrichment while engaging in talks and this will result in lackadaisical sanctions enforcement. This allows the continuation of roughly 1.5 million barrels per day of oil and up to 300,000 barrels per day of condensate exports.  Combined with production for domestic use, Iran’s production is just half a million barrels less than they could produce sustainably in a wholly unsanctioned environment according to industry analysts.  

Iran’s President Pezashkian said Iran needs more than $100 billion in foreign investment, and the lack of sanctions enforcement is also hoped to entice foreign investment from the UAE and Saudi Arabia.  All without closing a centrifuge or disposing of enriched material. 

If a Trump administration takes office, Tehran reasons that the window dressing provided by a few moderate officials and their current hints at willingness to restart nuclear talks will convince the international community to reject U.S. requests to reapply maximum economic pressure.  

However, a close look at the new Cabinet formed by President Pezashkian confirms that the regime remains committed to hardline policies. At least three are members of the IRGC, including those who control the Ministries of Intelligence, Justice, and Interior. 

The Regime’s Technology Toolbox 

Cyber. In addition to the nuclear program and terrorist proxy sponsorship, Iran invests in deadly military hardware and software, projects it defends as critical foreign policy tools. 

The Economist’s Byte by Byte podcast calculated the increase in Iranian cyber attack activity since October 7thof last year at 300%.  While Iran’s cyber capability does not yet match that of Israel, it is improving consistently.  In the Arab world, Iran’s capability is comparable to that of the United Arab Emirates, but at a larger scale. Vulnerabilities that previously took Iranian cyber actors weeks to exploit now take days. Iran has transferred cyber expertise to Hezbollah and could choose to offer the same to additional armed groups.  Of concern to Israel is the possibility that advanced cyber techniques or tools could be passed by Russia to Iran as part of their expanding security interdependency.   

Missiles and DronesDespite a flurry of U.S. effort to prevent it, the U.N. arms embargo on Iran expired in October of 2020. As I warned would happen in an article the previous June titled “The Gulf is Watching Washington’s Moves on the UN Embargo on Iran”, Iran has made lethal strides in its missile and drone programs. The IRGC has added new ballistic missiles to their arsenal and extended the range and accuracy of pre-existing models. The new missiles display improved precision in tests, thanks to the acquisition of better guidance systems and better targeting technology.  Iran has advanced its utilization of solid fuel technology, making IRGC missiles easier to transport and faster to launch – therefore harder to detect and preemptively strike. Iran’s cruise missiles and drones also boast extended ranges, better guidance systems, longer flight durations.  Drone payload capacity has also been improved, both in size and quality, with the import of advanced surveillance technologies, for example.  

Iran extends this largesse to its affiliates across the region.  With specific regard to the crippling of Red Sea shipping, note that the International Institute for Strategic Studies wrote in October of 2023 “With Iranian assistance, the Houthis have managed to build up an array of precisionguided rockets, ballistic missiles, land attack cruise missiles and anti-shipping capabilities in a remarkably short period of time.” In February of this year the IRGC Navy fired two ballistic missiles from a ship for the first time.  This capability equates to an extension of its missile arsenal range.  

In October of 2023 restrictions on Iran’s missile program under UNSCR 2231 ended.  These restrictions prevented Iran from importing or exporting missiles, drones, or components of either. At the time of its expiration 48 states signed a statement calling Iran’s missile program “one of the greatest challenges to international non-proliferation efforts” and stressing that Iran’s foreign policy of arming militias abroad “endangers international stability and escalates regional tension.”  According to the U.N., Iran’s sale of ballistic missiles to Russia is legal.  

UNSCR 2231 also prohibited Iran from converting missiles into nuclear delivery vehicles. Iran did not abide by this prohibition while it was active, but the expiration of these restrictions means IRGC work in this area is unencumbered. 

A Note on Nukes. Perhaps the greatest danger posed by Iran’s missile program is its potential to deliver a nuclear warhead.  The series most likely to serve this purpose in the IRGC arsenal today are, in order of capability, the Khorramshar 1/2, the Shahab-3, the Emad. Should Iran cross the threshold of nuclear weaponization, the risk of deadly escalation in any exchange of fire between Iran and Israel will spike, due to payload uncertainty.  Barring intelligence to the contrary, any missile of a nuclear-capable variant fired from Iran would be assumed to carry a nuclear payload. In a wargame the scenario becomes mutually assured destruction.   

The conflict in Gaza, the war in Ukraine, the war in Yemen, and the nonsensical Houthi campaign against global shipping are all laboratories in which Iranian engineers study and tweak IRGC weaponry.  Allowing Iran’s partners to continue deploying Iranian munitions in these theaters effectively furthers Iranian R&D.   

What the US Can Do About It 

Congressional Action. While altering Iranian behavior is a complex task, altering our own should not be.   

  1. Iran’s missile sales to Russia provide ample justification for passing legislation that truncates the process for transferring to Ukraine weapons seized in intercepted Iranian shipments to proxies.  When Iranian weapons are used against Russia, it could be in Russia’s interest to pressure Iran to halt those shipments.  
  • Iranian meddling in the election campaigns of America’s two largest political parties must be fully understood to be mitigated. Congress could urge the appointment of a Special Counsel and establish a bipartisan task force to draft policy recommendations based on the Special Counsel’s findings.  
  • The dangerous spectrum of Iranian actions designed to abrogate U.S. influence from the Middle East justifies the framing of a unified strategy, perhaps by a Select Committee, that reflects the U.S. mission to see an Iran that does not possess a nuclear weapon, does not sponsor terrorism, does not suppress the will of its people, and does not interfere with U.S. 

elections or the American social fabric.   

Diplomacy. The sanctions, military deterrence, and diplomacy drawn on in successive attempts to change these Iranian behaviors remain valid tools but require tweaking. Diplomatic efforts should be in the service of forming and mobilizing a coalition to refine and adopt the Americanled strategy instead of in the service of exchanging messages with intransigent Iranian nuclear negotiators or Hamas representatives. 

I recommend the coalition adopt a position that rejects the entry of missiles and drones into sovereign airspace and waters without approval and assigns repercussions for violations.  Further, that the coalition be mobilized to disrupt operations that enable the Iranian programs that have violated and continue to violate this position. Finally, that the coalition discuss with Iran and, barring improvement, announce that should Iran continue to destabilize and suppress economic growth in either or all of Lebanon, Yemen, the Palestinian territories, Syria and Iraq, the bill for resultant reconstruction projects will be Iran’s and not born by any members of the Coalition. This announcement could lead to populations of these countries reassessing Iran’s role in their midst.  

This coalition should agree on and publish actions that will be taken against Iran when a citizen of a coalition member country is kidnapped by the IRGC anywhere in the world. Stronger action should be triggered when a citizen is assassinated, or an assassination is attempted. Heeding human rights lawyers, the U.S. should push for universal jurisdiction tools to be applied to Iran by the coalition. Many countries currently refrain from doing so due to fear of retributive kidnappings. The coalition should agree to open structural investigations into human rights abuses at the hands of Iranian officials where victims who can provide evidence have moved into jurisdictions that can host criminal trials or file for civil litigation. 

Note that this discussion of a coalition is entirely removed from discussions of military posture or action. Separating these asks makes it easier for partner nations to participate at the level supported by their populace.    

Military Deterrence. Diplomacy has not – and arguably cannot – reduce Iran’s intent to conduct acts of terror. Deterrence is established when an enemy believes they have more to lose than gain from a hostile action. Iran’s Supreme Leader, as the head of a nation with near absolute power, has quite a bit to lose. This logic underpins Iran’s proxy-based foreign policy.  Potential losses are offloaded to external entities, increasing Iran’s risk tolerance.  This is also why Iran has refused to negotiate on its support of proxies like it has on its nuclear program.  The value of proxies far outweighs the cost of arming them and treating them as negotiable would fray their loyalty.  

How to counter this logic?  The U.S. has shied away from kinetic action inside Iran over several administrations with good reason.  Tehran understands that primary among these were U.S. concerns about civilian loss of life and the risk of fomenting popular support for the regime.  Advances in precision weaponry drastically reduce these risks.  Following Iran’s April 13th multifront drone and missile attack on Israel, Israel’s 3-missile strike on a Russian-made S300 air defense system near one of the IRGC’s nuclear sites elicited nary a blink from average Iranians. The U.S. should make it clear to the leadership of Iran’s proxy, drone and missile programs that new capabilities now permit the U.S. and partners to dismantle their facilities and chains of command with low to no risk of negative secondary effects.  Though “AUMF” is a four letter word in Congress, an Authorized Use of Military Force could convey this quickly and clearly.  

The barrage of munitions fired from Iranian and proxy stockpiles on April 13th in what the IRGC termed Operation True Promise was a test of both Israel’s air defenses and the US-led network of countries pledged to peace with Israel. Since then, Iran has worked to undermine and to court America’s partners in the region. Years of CENTCOM engagement are one reason this work has so far failed.  But integrated air and missile defense (IAMD) is not yet fully realized and neither our partner nations nor our citizens are well-protected from Iranian weaponry. The Diplomatic Security Service can be asked to provide details on the threat level from missiles and drones to our embassies abroad, especially in countries where Iran has influence and affiliates.  

Sanctions. Acknowledging debate about the effectiveness of current sanctions on Iran, there is reason for optimism.  In 2023 Treasury was mainstreaming AI in sanctions research, per their 2021 modernization agenda. As these specialized AI tools continue to learn and be applied, the depth of research and speed the U.S. applies to uncovering IRGC front companies and compiling cases for targeted sanctions will accelerate. These tools will also enable a more thorough application of secondary sanctions against brokers and facilitators anywhere in the world who play middleman in the Chinese-Iranian oil trade or Iran’s drone sales in Africa, Central Asia, and Latin America. 

UNSCR 2231 sanctions on Iran’s authority to enrich uranium will expire in October 2025 unless snapback is triggered. Iran has threatened to immediately weaponize if this occurs and pre-2015 sanctions are automatically reimposed. While U.S. issuance of and adherence to redlines has been abysmal, consecutive administrations have been clear that Iranian possession of a nuclear weapon will not be countenanced. The current US military posture in the region presents a credible deterrent. Iran will certainly weigh these two data points. The U.S. should create conditions for Iran to walk back their threat without loss of face.  

Go for a Grand Bargain. The regime in Iran has learned from a dozen years of experimentation that its interests are best served by focusing the attention of the U.S. Government on a single issue while operating with no impediments elsewhere.  That single issue, the nuclear file, has reached a point where Iran has very little room to continue slowly ramping up the program to keep the U.S. riveted. IRGC intent is no doubt to mature the missile, drone and proxy programs to the point that any one of them can be peeled off to serve as the next single issue of focus.  To prevent another dozen years of IRGC terrorist capability advances, the U.S. should consider crafting a grand bargain comprised of carrots and sticks that establishes deterrence while allowing the partial fulfillment of an Iranian objective where it also overlaps with U.S. interests.  

While designing a multifaceted deal will be complex, the last 12 years prove that addressing the range of Iran’s hostile behaviors individually is even less likely to yield results.  

Elements could include an end to Iranian arms transfers and financial support to designated terrorist groups in other sovereign countries; a roll back of Iranian stockpiles of enriched uranium;  the proportional removal of U.S. sanctions related to the nuclear program and sponsorship of terrorism; a U.S. greenlight for foreign direct investment into Iran from Saudi Arabia and the UAE in agreed-upon sectors; the continuation of U.S. and Arab state plans for IAMD and burgeoning initiatives like the Comprehensive Security Integration and Prosperity Agreement (C-SIPA), as the military activities in each are purely defensive; the continuation of  Iran and Arab state cooperation ensuring mutual non-aggression and developing trade; U.S. and European cooperation with the region to establish a non-binding regional security conflict resolution mechanism for the Middle East with membership extended to both Iran and Israel; a gradual draw down of U.S. forces present in the region without the request of the host government and potential further reductions in U.S. troop presence pending Arab partners assurances to the U.S. that Iran does not demonstrate hostile intent and/or that strengthened U.S.-Arab security arrangements are sufficient. Note that such strengthened security agreements do not have to include a quartered troop commitment, rather they can be a U.S.  commitment to respond if the partner is attacked.     

The U.S. should not expect any deal reached to be more than a set of transactional arrangements. The U.S. and Iran did find ground to cooperate after 9/11 against the Taliban and later against ISIS in Iraq, when neither country wished to see a Sunni terrorist group establish a stronghold in the region.  The U.S. also provided humanitarian assistance to Iran after the Bam earthquake in 2003. Most other instances of cooperation have emerged not due to shared objectives but because Iran conducted an aggressive act the U.S. was then compelled to mitigate, like when exchanging Iranian prisoners for kidnapped Americans, negotiating the JCPOA to limit Iran’s nuclear program, or signing the Algiers Accord in 1981 after Iran held 52 Americans hostage for 444 days.  

Time spent negotiating a grand bargain is also time available in parallel lanes to develop new tools for future use in dismantling the nuclear or missile and drone programs as required. If no deal is reached, the U.S. should have contingency plans on the shelf for applying additional sanctions, conducting strikes, or implementing other options inside or outside of Iran. 

Conclusion 

Without U.S. leadership, October 2025 will mark the end of any mechanism for reimposing U.N. 

sanctions on Iran’s nuclear, missile or drone programs.  Tehran will be free to pursue further tools of terror and coercive expansionism. The interests of all actors, including Iranians, are better served by curtailing this. 

We are currently in a rare period of widespread transitions among actors in this space. The time is opportune to reset norms, establish red lines, and devise an updated approach for managing Iran’s hegemonic aspirations, incorporating lessons from the past 12 years of US strategy and four years of unencumbered Iranian weapons advancements. 

There is tragic irony in the fact that the U.S. and Iran share the same goal of someday seeing a smaller U.S. footprint in the Middle East.  The U.S. keeps 40,000 troops in the region in large part because of requests from Arab partners for defense against an Iran they see as hostile. Were Iran to reduce its harassment of these neighbors, the U.S. would see less reason to be present and would pull troops home.  Tehran would be smarter to discuss with Arab states its discontent with the continued U.S. presence, rather than directing attacks on U.S. troops. The latter only underscores the threat perception that keeps the U.S. there.    


Through our Rafik Hariri Center for the Middle East, the Atlantic Council works with allies and partners in Europe and the wider Middle East to protect US interests, build peace and security, and unlock the human potential of the region.

The post Testimony on Israel and the Middle East at a crossroads: How Tehran’s terror campaign threatens the US and our allies appeared first on Atlantic Council.

]]>
Experts react: What’s behind the Hezbollah beeper and walkie-talkie explosions https://www.atlanticcouncil.org/blogs/new-atlanticist/experts-react/experts-react-whats-behind-the-hezbollah-beeper-and-walkie-talkie-explosions/ Wed, 18 Sep 2024 21:44:48 +0000 https://www.atlanticcouncil.org/?p=792975 Our experts explain what the explosions of communication devices in Lebanon could mean for the conflict between Israel and Hezbollah.

The post Experts react: What’s behind the Hezbollah beeper and walkie-talkie explosions appeared first on Atlantic Council.

]]>
Beep, beep, boom. Thousands were injured and dozens killed in Lebanon this week when beepers and walkie-talkies used by Hezbollah exploded in a coordinated manner on successive days. “We are opening a new phase in the war,” said Israeli Defense Minister Yoav Gallant, though Israel has not officially acknowledged that it was behind this operation. The attacks come as tensions are rising between Israel and Hezbollah, potentially opening up another front amid the war in Gaza. How did Israel (apparently) do it? And what does it mean for the Middle East conflict? Our experts messaged in with the answers.

Click to jump to an expert analysis:

Marc Polymeropoulos: This master class in covert action is an escalation meant to de-escalate this conflict

Jonathan Panikoff: Hezbollah faces a psychological blow as it tries to avoid instigating a war

Kirsten Fontenrose: Hezbollah losing its ability to communicate is a win for Israel—and a loss for global intelligence agencies


This master class in covert action is an escalation meant to de-escalate this conflict

The operation was a master class in covert action, both from the kinetic and supply chain aspects.  

In fact, this is the most impressive kinetic intelligence operation I can recall in my career. The scale and scope of it was just staggering. It was not a decapitation strike against leadership figures, but more of an incapacitation strike, bringing Hezbollah to its knees by injuring hundreds of Hezbollah members in a single strike—and then doing it again the next day.  

Israel has now achieved complete intelligence domination over Hezbollah, from the July hit on Fuad Shukr, to the preemptive strikes that in essence prevented a wider war, and now this audacious operation. What an evolution for Israeli intelligence, as they have certainly rebounded after the disaster of October 7.

This likely will cause Hezbollah to undertake a brutal counterintelligence review, which may paralyze the group. No one will be trusted.

The supply-chain side of the operation appears to be quite extraordinary, as Israel took advantage of the Hezbollah move to pagers (think of The Wire), which ironically was designed to thwart Israeli signals intelligence collection. Israel apparently found this unique vulnerability—Hezbollah’s need to import pagers.  

In my view, this operation may have been designed to send a message—not necessarily the traditional operational prep of the environment operation, which would have signified the beginning of an Israeli ground move into Lebanon. Instead, this may have been part of the Israeli strategy of “escalate to de-escalate.” In other words, by delivering a devastatingly stark and brutal warning to Hezbollah that it has totally compromised its security, Israel signifies to the group that a wider war would be disastrous.

Marc Polymeropoulos is a nonresident senior fellow in the Forward Defense practice of the Atlantic Councils Scowcroft Center for Strategy and Security. He worked for twenty-six years at the CIA before retiring in July 2019 at the senior intelligence service level.


Hezbollah faces a psychological blow as it tries to avoid instigating a war

The planning and execution of the pagers operation on Tuesday, and the walkie-talkies operation on Wednesday, almost certainly took months of effort by Israel. There is a very real potential that it could raise tensions further, and the operation absolutely could be a prelude to war. But for Israel, it may also be an effort to try and convince Hezbollah that an invasion is imminent, regardless of whether one is or not, in hopes that the group—which almost certainly does not want a full-scale war with Israel—finally moves back ten kilometers from the border. This would enable tens of thousands of northern Israeli families to return to their homes after almost a year away because of the threat posed by the group.

At the same time, this strike did not just hit Hezbollah leaders but the rank and file of the terrorist organization. As a result, it would not be a surprise to see a lot of the Hezbollah rank and file clamoring to respond. But for Hezbollah to admit that these attacks were this wide of a counterintelligence failure would be bad for the group—not to mention dangerous to its survival.

Hezbollah leaders are desperate not to be seen as the ones instigating a war with Israel. Memories of the devastating 2006 war still loom large, and Hezbollah Secretary-General Hassan Nasrallah and Deputy Secretary-General Naim Qasim won’t want to give an excuse for global blame to be shifted from Israel—over Gaza or a potential invasion of Lebanon—to Hezbollah itself because it is viewed as striking Israel in a manner beyond what’s been occurring for the last eleven-plus months. That creates a conundrum for the group at a time when its internal credibility is going to be diminished given the psychological impact of its rank-and-file members, not just its leaders, being reminded that Israel can get them anytime, anywhere.

 Jonathan Panikoff is the director of the Atlantic Council’s Scowcroft Middle East Security Initiative. He is a former deputy national intelligence officer for the Near East at the US National Intelligence Council.


Hezbollah losing its ability to communicate is a win for Israel—and a loss for global intelligence agencies

The spontaneous combustion of Hezbollah communications equipment is helping intelligence communities around the world map the relationships and reach of a US-designated terrorist organization with global reach—across Lebanon into Syria and Yemen, from Iran’s ambassador to Lebanon to (according to my contacts) high-ranking Lebanese officials. Intelligence communities are filling in gaps in their matrices, narrowing in on new neighborhoods for collection, trying to make the most of this momentary flash of light on a dark network map, making hay while the sun shines.

But the same intelligence communities are quietly cursing under their breath. Because as quickly as Hezbollah’s detailed network was illuminated, it will go dark. It will cause planners and fighters in Iran’s Axis of Resistance to put down their phones around the region. If you are a smuggler or drug dealer conscripted by Hezbollah in exchange for safe passage through the Syrian border, you have the perfect excuse right now to ignore their calls and not show up for duty. There are likely mothers of young men in Syria purging their sons’ rooms of everything with a battery, diamond traders in West Africa tossing phones down mine shafts, and money launderers in Latin America tossing phones off yachts. Without warning from Israel that this operation would take place, intelligence services that may have invested years in hacking the communications networks of criminals and operatives on their watch lists will have their feeds cut off.  

Communications are central to command and control; Hezbollah has effectively lost the ability, at least temporarily, to mobilize large numbers of fighters. Spooked and unreachable fighters will stay home or be forced to meet in clusters to coordinate, creating new targeting opportunities for drone strikes. Several thousand fighters are missing trigger fingers or worse. These create favorable conditions for potential operations by the Israel Defense Forces designed to push Hezbollah farther from Israel’s northern border. This is currently the subject of debate among Israeli leadership and the voices invited to weigh in are not limited to the war cabinet that has called the shots in Gaza, reflecting recognition that there is a lot at stake in such a decision. 

The negative psychological impact of this operation on Hezbollah’s rank and file and its reputational impact on the group and Iran’s Axis of Resistance are unquantifiable but undoubtedly significant.

Kirsten Fontenrose is a nonresident fellow at the Scowcroft Middle East Security Initiative in the Atlantic Council’s Middle East Programs. She was previously the senior director for the Gulf at the National Security Council.


The post Experts react: What’s behind the Hezbollah beeper and walkie-talkie explosions appeared first on Atlantic Council.

]]>
Putin hopes Belarus border bluff can disrupt Ukraine’s invasion of Russia https://www.atlanticcouncil.org/blogs/ukrainealert/putin-hopes-belarus-border-bluff-can-disrupt-ukraines-invasion-of-russia/ Tue, 27 Aug 2024 20:17:05 +0000 https://www.atlanticcouncil.org/?p=788044 With his overstretched army struggling to repel Ukraine's invasion of Russia, Vladimir Putin has pressed Belarusian dictator Alyaksandr Lukashenka to mass troops on the Ukrainian border, but Belarus is unlikely to join the war, writes Peter Dickinson.

The post Putin hopes Belarus border bluff can disrupt Ukraine’s invasion of Russia appeared first on Atlantic Council.

]]>
Kyiv has this week called on Belarus to withdraw its army from the Ukrainian border and warned of “tragic consequences” if the Belarusian military joins the Russian invasion of Ukraine. The strongly worded August 25 statement from Ukraine’s Ministry of Foreign Affairs came in response to mounting reports of Belarusian troops concentrating close to the country’s shared border with Ukraine.

Ukrainian officials urged their Belarusian counterparts to “cease unfriendly actions” and called for them to pull back beyond firing range. In an apparent bid to spell out the possible consequences of any further escalation, they noted that if the Belarusian military violated the border, “all troop concentrations, military facilities, and supply routes in Belarus will become legitimate targets for the Armed Forces of Ukraine.”

Ukraine’s stern message was officially addressed to Minsk, but there is little doubt in Kyiv that the current Belarusian border buildup has actually been orchestrated by the Kremlin. Indeed, Sunday’s Ukrainian statement specifically cautioned Minsk against acting “under Moscow’s pressure.”

Russia has long sought to deepen Belarus’s involvement in the war against Ukraine, but on this particular occasion the Kremlin is believed to have a very specific goal in mind. Vladimir Putin hopes that by manufacturing a potential Belarusian threat along Ukraine’s northern border, he can force Kyiv to divert troops away from the ongoing Ukrainian invasion of Russia’s Kursk region and ease the pressure on his own overstretched army.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

Now in its fourth week, Ukraine’s bold cross-border offensive has succeeded in exposing the limitations of Putin’s once vaunted military machine. The Russian army had already experienced a severe loss of status during the first two years of the war thanks to a string of battlefield setbacks and embarrassing defeats. Ukraine’s recent advance into the Russian Federation itself has now done further damage to Russia’s military reputation. In a matter of days, Ukrainian forces have been able to seize more Russian land than Putin’s army gained in Ukraine during the previous seven months.

Faced with the twin challenges of conquering Ukraine and defending Russia, it has become painfully apparent in recent weeks that Vladimir Putin is struggling to do both. With virtually his entire military already committed to the fight in Ukraine, he responded to the initial shock of Kyiv’s Kursk offensive by scraping together a variety of units and calling on untested young Russian conscripts to stem the tide of the Ukrainian invasion.

Recent reports indicate that Russian resistance on the Kursk front is now finally strengthening, but it may still be some time before Moscow is able to liberate the approximately five hundred square miles of Russian territory currently under Ukrainian control and force the Ukrainian military back across the border. In order to deprive Kyiv of momentum and prevent any more unwelcome surprises, it therefore makes perfect military sense for Putin to call upon his Belarusian ally and instruct him to stage a diversion.

READ MORE COVERAGE OF THE KURSK OFFENSIVE

Belarus dictator Alyaksandr Lukashenka has evidently gone along with Putin’s plan and has ordered a significant portion of his military to deploy to the Ukrainian border. Nevertheless, a Belarusian invasion of northern Ukraine remains highly unlikely. While it is true that Lukashenka is almost entirely dependent on the Kremlin for his political survival, both he and Putin appear to understand perfectly well that any attempt to force Belarus into the war could end in disaster.

Lukashenka’s domestic position is precarious enough without engaging in foreign wars. He was almost ousted in 2020 by nationwide protests following a rigged presidential election, and only managed to cling onto power thanks to Moscow’s intervention. This reliance on Russia has robbed Lukashenka of any lingering legitimacy and forced him to accept what some have termed as the “creeping annexation” of his country by the Kremlin.

Meanwhile, Belarusian society has shown virtually no interest in joining Russia’s anti-Ukrainian crusade. While pro-Russian sentiment remains widespread in the country, there is little enthusiasm for the imperial ambitions underpinning the Russian invasion of Ukraine. On the contrary, many Belarusians feel a sense of solidarity with their Ukrainian neighbors, and recognize that today’s resurgent Russian imperialism poses a similar threat to their own country.

This mood has given rise to serious questions about the readiness of the Belarusian military to participate in Russia’s war. Since the start of the full-scale invasion, there have been numerous reports claiming that Belarusian officers are deeply reluctant to fight in Ukraine. If Lukashenka attempts to force them, there is a reasonable chance he will not be obeyed. This could destabilize his regime and lead to unpredictable consequences for the Kremlin.

With little prospect of the Belarusian military joining the invasion of Ukraine, Putin has found different ways for Lukashenka to make himself useful. During the initial phase of the war, the Russian dictator used his Belarusian counterpart’s fiefdom as a gateway for the failed march on Kyiv and as a launch pad for air strikes on targets across Ukraine. Belarus has subsequently continued to offer Russia meaningful practical support, digging deep into its Soviet era stockpiles to deliver large quantities of much-needed military equipment.

Throughout the war, the two leaders have staged frequent personal meetings in an apparent bid to counter perceptions of Putin as an international pariah. Lukashenka has also played a supporting role in Putin’s nuclear saber-rattling, hosting Russian nuclear weapons in Belarus and participating in joint nuclear drills together with the Russian military. The current Belarusian border buildup fits neatly into this pattern, with Lukashenka once again serving as Putin’s accomplice while stopping short of direct military involvement.

For now, the Ukrainian authorities seem content to limit their response to strong words of warning along with a minimum of military precautions. While they cannot afford to completely ignore the presence of the Belarusian army on their border, there is little sign that Ukraine is prepared to slow the pace of its Kursk offensive in order to guard against an invasion threat that few in Kyiv regard as credible. Instead, they appear intent on treating it as yet another Russian ruse and calling Putin’s bluff, just as they have done with his so-called red lines and his attempts at nuclear blackmail.

Peter Dickinson is editor of the Atlantic Council’s UkraineAlert service.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Putin hopes Belarus border bluff can disrupt Ukraine’s invasion of Russia appeared first on Atlantic Council.

]]>
How the Israeli intelligence community got its mojo back https://www.atlanticcouncil.org/blogs/new-atlanticist/how-the-israeli-intelligence-community-got-its-mojo-back/ Tue, 27 Aug 2024 17:00:07 +0000 https://www.atlanticcouncil.org/?p=787846 Israel’s recent preemptive strikes against Hezbollah targets helped avert a wider war and showed how Israeli intelligence has bounced back from the failures of October 7.

The post How the Israeli intelligence community got its mojo back appeared first on Atlantic Council.

]]>
In my twenty-six-year career at the Central Intelligence Agency (CIA), I found that there were many misnomers in the intelligence business that were shared by the public and even policymakers. One is the notion that the CIA should be able to foresee world events, a concept that I termed (with some derision) “predictive certainty.” Policymakers would quite naturally welcome—and likely push—the US intelligence community to tell them precisely what will happen on any given subject. That of course rarely occurs; it is a notion derived from espionage books and movies.

Instead, I always believed as an operations officer that we must strive to collect intelligence that ultimately can provide a warning to policymakers. That warning function was—and still is—key in any CIA station’s job description. The CIA performed admirably if we sent up the bat signal, so that policymakers can decide on various courses of action if or when something went down. An event may seem likely to occur (with signs, never definitive, that an invasion or a coup was planned, for example), so the intelligence collected must spur on policymakers to consider several options. “No surprises” was the mantra I would follow. During management stints in Washington, and while serving abroad as an operations officer, I would tell my State Department, White House, and Department of Defense colleagues that my collection missions should be judged as successful if they were never blindsided.

Yet there was an important caveat to my promises: I would assure a US ambassador that we would collect, we would warn, we would analyze and assess. But do not expect the intelligence to have such a level of granularity that it implied certainty of an outcome.

This will go down in Israeli military history, just like the preemptive strikes in 1967 by the IDF against Egyptian land and air forces.

During these last several days of late August, however, the Israeli intelligence community hit a grand slam by obtaining such exquisite intelligence that it was highly predictive in nature—and not only that, it also likely staved off a wider war. As such, the Israeli intelligence community deserves extraordinary credit for this intelligence coup. According to media reports, the Israelis collected information that not only indicated that Hezbollah was about to launch a significant attack against northern and central Israel, but also the precise time—5:15 a.m. local time on August 25—when the launches would occur and the specific units that would conduct the attacks.

This was a very noteworthy feat, in my view presumably gleaned from a combination of Israeli signals intelligence (an intercept of a warning order from within the Hezbollah hierarchy, for example); imagery of movement within the rocket, missile, or drone units themselves, perhaps via Israeli drones or other overhead collection; and even reporting from human sources, who could have told the Israelis the precise plans and intentions of the Hezbollah leadership. Let us not forget that Israel has shown an ability to penetrate Hezbollah, with the late July assassination in Beirut of Fuad Shukr, a close confidant and military adviser to Hezbollah leader Hassan Nasrallah.

This intelligence collection then allowed the Israel Defense Forces (IDF), launching reportedly up to one hundred aircraft, to effectively preempt the Hezbollah attack, destroying up to two-thirds of the rockets and missiles that would have been launched. This will go down in Israeli military history, just like the preemptive strikes in 1967 by the IDF against Egyptian land and air forces. So once again, how good was the intelligence this time around? It seems quite clear that Israeli pilots knew the precise location of the Hezbollah rocket and missile units, which was obtained by their colleagues in the Israeli intelligence community. As such, there must have been great satisfaction in the hallways of Israeli intelligence, having provided actionable targets to their military brethren.

This intelligence saved the lives of those Israelis—both civilian and military—who might have been hit by several hundred rockets and missiles. That in and of itself is a significant success. But there is more to praise, as this Israeli intelligence coup almost certainly avoided a wider war. In fact, the preemptive strike, based on the extraordinary collection, was de-escalatory in nature. Since there was no mass casualty event in Israel (military or civilian casualties emanating from a new Hezbollah attack), a massive Israeli response, including perhaps strikes on Beirut, was avoided. The Israeli intelligence community certainly won the day by avoiding that scenario. As did the region as a whole.

Finally, Hezbollah claims it was targeting Israeli national security infrastructure, including Mossad headquarters and a building housing elements of Unit 8200, the Israeli equivalent to the US National Security Agency. I sent a message to a former Israeli government official who is a friend of mine, noting, “You know you are doing something right if the enemy is trying to kill you.” What a sign of flattery for the Israeli intelligence officers, who nearly a year ago were reeling from the catastrophic intelligence failures of October 7, 2023. The attacks that day resulted in more than 1,160 Israelis and foreigners brutally killed, smashing the aura of the Israeli intelligence community. I am sure that there remains an enormous sense of guilt within the hallways of Mossad, Israeli military intelligence, and Shin Bet—similar to what we at the CIA felt after September 11, 2001. Yet as seen from the events of the last several days, on top of the successful hunt for high-value targets, the Israeli intelligence community has pulled itself up by its bootstraps and regained its mojo. That should reassure the Israeli public and policymakers, who rely on the intelligence community as Israel’s first line of defense.


Marc Polymeropoulos is a nonresident senior fellow in the Forward Defense practice of the Atlantic Councils Scowcroft Center for Strategy and Security. He worked for twenty-six years at the CIA before retiring in July 2019 at the senior intelligence service level.

The post How the Israeli intelligence community got its mojo back appeared first on Atlantic Council.

]]>
NATO must recognize the potential of open-source intelligence https://www.atlanticcouncil.org/blogs/new-atlanticist/nato-must-recognize-the-potential-of-open-source-intelligence/ Tue, 13 Aug 2024 19:02:28 +0000 https://www.atlanticcouncil.org/?p=780661 By taking steps to use OSINT more effectively, NATO can preempt, deter, and defeat its adversaries’ efforts to expand their influence and undermine the security of member states.

The post NATO must recognize the potential of open-source intelligence appeared first on Atlantic Council.

]]>
Air Marshal Sir Christopher Harper is a former UK military representative to NATO and served as director general of the NATO International Military Staff from 2013 to 2016. He is a nonresident senior fellow with the Transatlantic Security Initiative in the Atlantic Council’s Scowcroft Center for Strategy and Security and an adviser to companies, including Accenture and Adarga, which provide AI tools for processing open-source information, including for public-sector clients.

Robert Bassett Cross is a former British Army officer and the founder and CEO of the UK-headquartered AI software developer Adarga. He is a nonresident senior fellow at the Forward Defense practice of the Atlantic Council’s Scowcroft Center for Strategy and Security and an honorary research fellow at the University of Exeter’s Strategy and Security Institute.


Writing in 1946, just a few years before NATO was founded, Director of the US Office of Strategic Services Bill Donovan knew precisely how valuable publicly available information could be.

“[E]ven a regimented press,” he wrote, “will again and again betray the national interest to a painstaking observer . . . Pamphlets, periodicals, scientific journals are mines of intelligence.”

Today, seventy-five years after the Alliance was formed, such open-source intelligence (OSINT) is more important—and more powerful—than ever. However, underinvestment in OSINT capabilities and a culture favoring classified data currently hold back member states’ intelligence-collection potential. To fully utilize the available technology to detect threats from adversaries, NATO member states must overcome these barriers to embrace open-source intelligence enabled by artificial intelligence (AI).

Understanding the threat landscape

OSINT can help leaders get a fast, up-to-date understanding of their operating environment. If you want to know who’s doing what, where, and when, then an open-source specialist can quickly tell you.

If, for example, you want to find out who’s jamming GPS systems in the Baltic region, the relevant data isn’t hard to come by. Similarly, OSINT analysts can provide insights into issues ranging from the effectiveness of Iran’s attack on Israel (and the Israeli response) to China’s current role in fueling the Russian war machine. 

In recent years, it has become increasingly clear that, in addition to insight into current and recent events, OSINT can help leaders forecast what an adversary might be planning to do weeks, months, or even years from now.

By exploiting OSINT more fully and by integrating it into the wider intelligence cycle, NATO can preempt, deter, and defeat its adversaries’ efforts to expand their influence and undermine the security of member states. Here are several ways that OSINT can be used:

  1. Across the physical domains of land, air, sea, and space, NATO can exploit publicly and commercially available data to explore an adversary’s order of battle and—more importantly—monitor changes in the strength and disposition of its military units and formations to infer its intent.
  2. In the cyber domain, NATO can leverage commercially available information to detect and counter the penetration of networks governing critical infrastructure, as well as those related to research organizations, academic institutions, and technology developers.
  3. In the information space, OSINT can help NATO identify, understand, and counter influence campaigns, specifically when it comes to the detection and attribution of disinformation and misinformation.
  4. NATO can draw on vast swaths of open-source data to infer long-term strategic intent. Every subtle change to a government’s policies, every adjustment to its economic positioning and investment strategy, every new law and regulation it enacts, every new treaty and trade agreement—all of these can help the Alliance reverse engineer an adversary’s confidential playbooks.

Given the vast quantity, complexity, and diversity of the data, it is vital that NATO employs AI to extract the maximum value from it—to enhance analysts’ abilities, accelerate the analysis cycle, and build a reliable, contextual understanding of what Donovan called “the strategy developing silently behind the mask.”

The barriers to OSINT adoption

While AI is, of course, an emerging technology, its utility is already being realized across industries and sectors outside defense. From corporate intelligence and advisory services to finance and media, more and more private-sector organizations are using AI to make sense of the information environment, drawing on an ever-expanding range of sources to manage risk, identify opportunities, and adapt to geopolitical volatility.

However, the barriers to its widespread adoption and effective exploitation in political and military circles remain considerable. A paper published in 2022 by the Royal United Services Institute (RUSI), in collaboration with the Centre for Emerging Technology and Security and the Alan Turing Institute, identified three in particular.

First, there are tradecraft barriers relating to the methodologies governing everything from the analysis of publicly available information to the evaluation and dissemination of the resulting intelligence. Second, there are resourcing barriers stemming from underinvestment in the requisite tools, technologies, data sets, and training.

The third barrier identified by the RUSI authors—and the most daunting one—is cultural. Presented with so much open-source data, analysts and decision makers tend to favor classified information and internal data sets. These sources and insights are easier to trust and are imbued with what the authors call “the perceived power of the ‘secret’ label.” 

Speaking at the Eurosatory exhibition in Paris in June, US Major General Matthew Van Wagenen, deputy chief of staff for operations at NATO, confirmed how great this cultural barrier is. Up to 90 percent of “what Western militaries are looking for,” he said, can be derived from open sources:

This is a revolution in how we look at information. The ways of discerning information through classical means and techniques, tactics, and procedures that militaries have been adapted to—that’s really an old model of doing business. The new open source that’s out there right now, and the speed of information and relevance of information is coming, this is how things need to be looked at.

It is reasonable to believe that the tradecraft and resourcing barriers can be overcome. Methodologies are evolving swiftly, as are the requisite technologies. In fact, many of the tools NATO needs to capitalize on OSINT already exist. New AI applications are coming online almost every week. But if NATO fails to overcome the cultural barrier, it risks going into the next conflict underinformed and ill-prepared.

How AI-enabled OSINT can earn NATO leaders’ confidence

The cultural barrier to AI-enabled OSINT cannot be surmounted simply by decree or directive. Nor can it be overcome by intelligence professionals alone. The technology—and the discipline—must earn the justified confidence of civilian leaders and military commanders across the international staff, the military committee, and the supporting agencies. This could happen if AI-enabled OSINT were applied first to the simplest intelligence-gathering tasks before being applied to the most complex. To borrow the terminology made famous by former US Defense Secretary Donald Rumsfeld, NATO should apply the discipline to corroborating “known knowns,” resolving “known unknowns,” and surfacing “unknown unknowns.”

Corroborating “known knowns”: NATO should start by recognizing where the skills of the human analyst currently outperform even the most sophisticated models, and where AI can best be applied to elevate these skills. This means asking the right kind of questions, and employing OSINT to corroborate what is already known and to triangulate insights gathered from well-established secret sources. In this way, NATO can begin to overcome the skepticism that’s too often associated with publicly available information and OSINT. 

Resolving “known unknowns”: With so much data to draw on, it is essential that NATO uses AI to help collate, process, and (where necessary) translate that data so it is ready for analysts to interpret. If AI-enabled OSINT can prove useful to intelligence professionals in this capacity, those professionals may be more willing to apply it to the most complex and valuable intelligence tasks of all—surfacing risks and opportunities that civilian and military leaders would otherwise struggle to identify.

Surfacing “unknown unknowns”: Perhaps the greatest contribution that AI can make to the intelligence-gathering discipline is identifying patterns and connections that are invisible to the human eye. Dedicated, AI-powered information-intelligence applications that synthesize publicly available information with proprietary data can help analysts and decision makers tease out insights they would otherwise miss.

This combination of publicly available information with classified data will enable NATO analysts to give military and political leaders a uniquely rich, nuanced, and highly contextualized understanding of the operating environment. Decision makers at every level will be able to examine intelligence from every angle, and apply their experience and imagination to infer an adversary’s intentions based on the interplay of evidence.

The critical need for human-machine teaming

The necessary tools and methodologies exist. What’s missing is the determination to get these tools into users’ hands, to supply the requisite training, and to capitalize on the integrated output derived from all sources of intelligence, open-source and otherwise.

OSINT is becoming known among some intelligence professionals as “the intelligence of first resort.” Compared with clandestine methods of information gathering and analysis, OSINT is fast, low-cost, and low-risk. But if it can be combined with those same methods then NATO’s analysts and leadership will have an enduring competitive edge, with access to the kind of strategic information that would likely be, in Bill Donovan’s words, “of determining influence in modern war.”


NATO’s seventy-fifth anniversary is a milestone in a remarkable story of reinvention, adaptation, and unity. However, as the Alliance seeks to secure its future for the next seventy-five years, it faces the revanchism of old rivals, escalating strategic competition, and uncertainties over the future of the rules-based international order.

With partners and allies turning attention from celebrations to challenges, the Atlantic Council’s Transatlantic Security Initiative invited contributors to engage with the most pressing concerns ahead of the historic Washington summit and chart a path for the Alliance’s future. This series will feature seven essays focused on concrete issues that NATO must address at the Washington summit and five essays that examine longer-term challenges the Alliance must confront to ensure transatlantic security.

The post NATO must recognize the potential of open-source intelligence appeared first on Atlantic Council.

]]>
Sailing through the spyglass: The strategic advantages of blue OSINT, ubiquitous sensor networks, and deception https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/sailing-through-the-spyglass-the-strategic-advantages-of-blue-osint-ubiquitous-sensor-networks-and-deception/ Thu, 08 Aug 2024 10:43:41 +0000 https://www.atlanticcouncil.org/?p=781627 In today’s technologically enabled world, the movements of every vessel—from nimble fishing boats to colossal aircraft carriers—can be meticulously tracked by a massive network of satellites and sensors. With every ripple on the ocean’s surface under scrutiny, surprise naval maneuvers will soon be relics of the past.

The post Sailing through the spyglass: The strategic advantages of blue OSINT, ubiquitous sensor networks, and deception appeared first on Atlantic Council.

]]>
In today’s technologically enabled world, the movements of every vessel—from nimble fishing boats to colossal aircraft carriers—can be meticulously tracked by a massive network of satellites and sensors. With every ripple on the ocean’s surface under scrutiny, surprise naval maneuvers will soon be relics of the past. The vast expanse of the world’s oceans will no longer be shrouded in mystery, but illuminated by data streams flowing from millions of eyes and ears aware of every movement from space to seabed.

Open-source intelligence (OSINT) refers to intelligence derived exclusively from publicly or commercially available information that addresses specific intelligence priorities, requirements, or gaps. OSINT encompasses a wide range of sources, including public records, news media, libraries, social media platforms, images, videos, websites, and even the dark web. Commercial technical collection and imagery satellites also provide valuable open-source data. The power of OSINT lies in its ability to provide meaningful, actionable intelligence from diverse and readily available sources.

Thanks to technological advances, OSINT can provide early warning signs of a conflict to come long before it actually breaks out. On land, the proliferation of inexpensive and ubiquitous sensor networks has rendered battlefields almost transparent, making surprise maneuvers more difficult. Through open-source data from smartphones and satellites, persistent OSINT provides early warning of mobilization and other key indicators of military maneuvers. This capability is further augmented by artificial intelligence (AI)-enhanced reconnaissance and real-time data analysis, which have proven remarkably effective in modern conflicts including in Ukraine, Azerbaijan, Gaza and Israel, and Sudan. As this paradigm extends to maritime operations, it brings unique challenges and characteristics compared to land operations.

As technology races forward, Blue OSINT stands out as a key tool in the arsenal of contemporary naval warfare during global great-power competition. Blue OSINT harnesses data from commercial satellites, social media, and other publicly available sources to specifically enhance maritime domain awareness, identify emerging threats, and inform strategic decisions.

The current state of Blue OSINT across the spectrum of conflict points to an accelerating technology-driven evolution enabling maritime security and sea-control missions. The US Navy (USN) can enhance Blue OSINT collection with its own commercially procured sensor networks and bespoke uncrewed systems to shape operational environments, prevent and resolve conflicts, and ensure accessibility of sea lines of communications.

Commercially procured sensors span a wide array of technologies, including sonar and acoustic sensors, as well as video and seismic devices that are utilized to detect activities in strategic locations. These sensors can function independently or operate from uncrewed systems, providing flexibility and adaptability in various maritime operations. For instance, uncrewed aerial systems (UAS) equipped with high-resolution cameras and radar can deliver persistent surveillance over expansive oceanic areas, while uncrewed underwater vehicles (UUVs) with sonar capabilities can monitor subsea activities, such as submarine movements and underwater installations. These uncrewed platforms enable the continuous collection of critical data, enhancing the Navy’s situational awareness and operational readiness without putting sailors at risk.

For the US Navy to best support the joint force and maintain its strategic edge, it must integrate ubiquitous sensor networks and Blue OSINT into naval strategies adapted for tomorrow’s increasingly complex maritime environment. The Navy’s multiyear Project Overmatch is a good start to developing its “network of networks” and contributing to the Joint All-Domain Command and Control (JADC2) program.

With escalating tensions in the South China Sea, conventional forces are stretched thin and face asymmetric threats such as the People’s Liberation Army Navy (PLAN)’s undersea sensing arrays and China’s maritime militia forces. Integrating Blue OSINT and sensor networks into the Navy’s strategies complements traditional naval power, while allowing intelligence missions to be conducted at lower risk and cost. Moreover, the open-source nature of this information enhances the Navy’s ability to share information and collaborate with allies and partners while bypassing cumbersome security classification issues. By relying on easily shareable information, the Navy can better synchronize efforts with partner navies, making command of the sea a more coordinated and viable endeavor.

The impact of evolving open-source intelligence on warfare

Feature OSINT Traditional Intelligence
Source of data Commercial satellites, social media, public sources HUMINT, SIGINT, classified sources
Coverage Global, real-time updates, highly accessible Selective, based on specific operational requirements
Cost Low cost, leveraging existing commercial infrastructure High cost, involving extensive human and technical resources
Risk Low risk, minimal direct exposure Higher risk, involves clandestine operations
Data volume Extremely high, necessitates AI and advanced analytics Moderate to high, manageable with traditional methods
Ease of sharing High, fewer classification issues Low, often restricted by security classifications
Data warning Effective, provides pre-conflict indicators Effective, but often limited by operational scope
Deception tactics Requires advanced techniques to counteract Relies on traditional counterintelligence and technical methods
Collaboration Enhances collaboration with allies using open data Limited, restricted sharing due to classification
Operational impact Supports continuous monitoring and quick response Supports deep, targeted insights into adversaries

The table above provides a comparison between OSINT and traditional intelligence methods, highlighting the strengths and weaknesses of each approach. OSINT offers global, real-time updates at a lower cost by leveraging existing commercial infrastructure. This approach presents a lower risk, as it involves minimal direct exposure and facilitates easier information sharing due to fewer classification issues.

On the other hand, traditional intelligence methods such as human intelligence (HUMINT) and signals intelligence (SIGINT) provide selective, targeted insights based on specific operational requirements. These methods often involve higher costs and risks due to the need for extensive human and technical resources, as well as the nature of clandestine operations. While traditional intelligence can offer deep, targeted insights, it is often limited by operational scope and security classification issues, making information sharing more challenging.

In the maritime domain, these distinctions are particularly significant. The concept of Blue OSINT integrates these principles specifically for naval operations, emphasizing the need for continuous monitoring and rapid-response capabilities.

Blue OSINT and persistent maritime monitoring

In the pre-conflict stage, global satellite coverage and social media provide a wealth of data that can map maritime activity with unprecedented detail. Nonprofit organizations like Global Fishing Watch use commercial satellite constellations to track ships and monitor maritime activity. Increased affordability and accessibility of satellite technology have enabled nongovernmental and commercial entities to contribute to maritime domain awareness in new ways. For instance, maritime radar emissions—once the exclusive domain of military and intelligence satellites—are now easily observable and “tweetable,” allowing for vessel identification to be accomplished more easily when actors execute deceptive techniques. Similarly, platforms like X (formerly Twitter) host numerous “ship spotting” accounts, where enthusiasts post photos and updates of vessels passing through strategic chokepoints and major straits, further enriching the available data.

Through persistent monitoring and large-scale data analysis, Blue OSINT can be used to significantly mitigate the challenge of monitoring large exclusive economic zones (EEZs). It offers a cost-effective alternative to traditional patrols, allowing these navies to adopt a more targeted approach when deploying their limited resources. By embracing Blue OSINT, naval forces can enhance their surveillance and response capabilities without a heavy financial burden, ensuring that these forces remain agile and effective in their maritime operations. Additionally, data streams from ubiquitous sensor networks can be coupled with Blue OSINT collection to give naval intelligence experts near-endless amounts of data in support of complex reconnaissance operations, without placing sailors and special operators at increased risk to collect it.

In addition to myriad opportunities for intelligence collection, using Blue OSINT presents technological challenges for the US Navy. The sheer volume of data generated by ubiquitous sensor networks and Blue OSINT tools necessitate substantial investments in software and analytic tools to manage and interpret this information effectively. Intelligence professionals must sift through endless amounts of data to identify actionable insights. Even the most skilled analysts need software and computer processing that can help organize and parse raw data.

To address these challenges, the US Navy and other maritime forces are ramping up investments in commercially procured sensor networks and cutting-edge analytic tools. In June 2024, the National Geospatial-Intelligence Agency issued its first-ever commercial solicitation for unclassified technology to help track illicit fishing in the Pacific. Such investments aim to access, exploit, and process the massive amounts of data generated, a key step to achieving comprehensive maritime domain awareness. Better software and analytic tools can help maximize the potential of Blue OSINT and sensor networks, ensuring that intelligence analysts can better inform decision-makers at the speed of relevance.

Strategic deployment of distributed sensors

While Blue OSINT provides valuable insights into chokepoints and shipping lanes, it does not yet offer comprehensive coverage of the open ocean. Its effectiveness is greater in populated and coastal areas, where the density of electronic devices and human activity is significantly higher than on the high seas. Moreover, OSINT data can often be easily manipulated, presenting challenges in ensuring the accuracy and reliability of the information gathered. For example, although ships emitting Automatic Identification System (AIS) signals can be tracked on the web, navies are aware that bad actors often tamper with their transponders in order to disguise their locations, ultimately limiting the signals’ reliability.

To bypass these limitations of open-source data, navies and intelligence agencies can enhance their Blue OSINT capabilities by augmenting them with strategically deployed clandestine sensor networks in key locations, such as harbors, straits, and other critical chokepoints. This combination of data flows allows for effective monitoring and data collection on vessel movements, communications, and adversary intentions. Additionally, other covert sensors can be hidden on the seabed or disguised on civilian vessels, like fishing boats, in regions such as the South China Sea. Using distributed sensors along with Blue OSINT data ensures continuous and comprehensive maritime situational awareness, even in areas less frequented by military assets.

However, fixed sensor networks alone are insufficient to cover the dynamic maritime environment. Deploying a mobile network of distributed sensors necessitates a diverse array of platforms and technologies. While military satellites, ships, and aircraft equipped with advanced sensors can offer intermittent coverage, they are costly and limited in number, and their findings are less easily shareable with partners and allies. To bridge these gaps, allied navies should invest in affordable and scalable solutions such as uncrewed surface vehicles (USVs), UUVs, and UASs. Outfitted with various sensors, these platforms can effectively detect and track adversary movements, ensuring that navies maintain situational awareness across the vast expanse of the Pacific Ocean and other critical regions.

Small UASs launched from naval ships can be used to rapidly surveil large swaths of sea, providing real-time data on both surface and subsurface activities. Recognizing the strategic advantage of uncrewed systems, China has taken a bold step to outpace the US Navy by developing an aircraft carrier specifically designed to launch and recover UASs, rather than sophisticated manned platforms like the J-20 fighter jet. This significant investment in a carrier solely for uncrewed vehicles by the PLAN should prompt the United States to reconsider, and potentially adjust, its future resourcing strategy. Similarly, USVs can conduct long-duration patrols at a fraction of the cost of manned ship operations, exemplified by Saildrone vessels patrolling the Indian Ocean, providing the USN a robust sensor network. UUVs, deployed from submarines or surface ships, can monitor subsea activities, such as the movement of submarines and other submersible assets.

By monitoring the air, sea, and underwater environments, uncrewed vehicles and their sensors can significantly enhance overall maritime situational awareness. However, these tools are only effective if they are integrated into a cohesive architecture that combines traditional intelligence, surveillance, and reconnaissance (ISR) with Blue OSINT data and affordable long-term leave-behind sensors. Project Overmatch exemplifies how to achieve this integration by developing a network that links sensors, shooters, and command nodes across all domains. For instance, Project Overmatch aims to leverage advanced data analytics, artificial intelligence, and secure communications to create a unified maritime operational picture, enabling faster and more informed decision-making. By incorporating these elements, the US Navy can ensure that uncrewed vehicles and their sensors are effectively utilized to maintain operational superiority in the maritime domain.

Moreover, the low-signature nature of some of these sensors increases the odds that they can operate undetected by adversaries, providing a strategic advantage. By deploying sensors in unexpected locations, and disguising them as civilian assets in some cases, navies can gather intelligence without alerting potential threats to their presence.

Blue OSINT and sensor networks in conflict

While Blue OSINT collection and distributed sensor networks can easily collect data in uncontested waters, they have immediate applications to modern maritime conflict as well. For instance, in the event of a cross-strait invasion by the People’s Republic of China (PRC), the transparency provided by Blue OSINT would make it difficult for navies to maneuver undetected. Satellites and social media continuously monitor naval piers, strategic chokepoints, and even some open ocean areas, making it increasingly difficult to achieve tactical surprise. Historical instances—such as Japan’s attack on Pearl Harbor, the D-Day invasion, or the successful surprise dash to transit the English Channel by the German fleet during World War II—would be much harder to achieve in the modern era due to the pervasive nature of Blue OSINT.

In the context of a potential Taiwan invasion, Blue OSINT would likely be used to detect and closely follow Chinese naval activities, including the movement of amphibious assault ships and submarines. OSINT analysts frequently examine satellite imagery of Chinese shipyards and military installations, which could provide early indications of mobilization.

However, relying solely on satellite imagery and AIS for Blue OSINT is insufficient. Multi-intelligence capabilities are essential to provide a comprehensive assessment. For instance, in 2020, two commercial firms collaborated to use radio frequency and synthetic aperture radar collection to detect Chinese illegal, unregulated, and unreported fishing near the Galapagos EEZ. This open-source technique revealed the ability to identify fishing vessels that turned off their AIS to cross into the EEZ. In a future conflict with China, the same methodology of combining multiple Blue OSINT sources could be used to identify and track vessels of the People’s Armed Forces Maritime Militia (PAFMM). This would bypass the AIS vulnerabilities that the PAFMM traditionally exploits to avoid detection, while also revealing its intentions as directed by the PLAN.

The Russo-Ukraine conflict revealed how OSINT can thwart surprise maneuvers and provide crucial targeting data deep behind enemy lines. However, it also underscores the limitations of OSINT in sparsely populated environments, such as the open ocean. For example, in December 2023, as missiles flew over the Red Sea, 18 percent of global container-ship capacity was rerouted. While civilian mariners and commercial shipping significantly contribute to Blue OSINT during peacetime, their absence in a high-risk conflict scenario would shift the burden more heavily onto satellite and uncrewed systems.

Deception and stealth

While the US Navy can take advantage of these technologies, its adversaries can, and almost certainly will, do the same. The US Navy and its allies must develop countermeasures to mitigate the risks posed by sensor networks while also leveraging its benefits. One approach is to invest in advanced deception tactics designed to mislead adversaries. These include the use of decoys, electronic warfare, and signal spoofing to create false targets and confuse enemy sensors. The Navy has been quietly developing these tools to obscure its true movements and intentions, ultimately confounding adversaries and making it harder for them to accurately target US forces.

In addition to deception, the United States and its allies need to enhance their naval stealth capabilities to evade adversaries’ distributed sensor networks. This involves not only minimizing the electromagnetic signatures of their vessels, but also employing innovative designs and operational tactics to reduce their radar cross-sections and avoid detection.

Distributed sensors in conflict

The ability to complement Blue OSINT with distributed sensors will be a decisive factor in near-term conflict dynamics. Just as frontline units in Ukraine are detected and targeted by cheap drones and stationary sensors, naval forces can be identified and pinpointed by similar systems at sea. Distributed sensors can provide continuous monitoring and data collection, ensuring that navies can maintain situational awareness and respond swiftly to emerging threats.

Three pillars are necessary to distribute sensors effectively across the ocean.

First, large conventional fleets play a critical role in maritime strategy. These fleets must be capable of extended operations and diverse missions, providing the backbone of naval presence, power projection, sea lines of communication, and, ultimately, sea control. During the COVID-19 pandemic, the US Navy demonstrated its endurance with record-length deployments, showcasing an advantage that could be significant in future maritime campaigns.

Second, organic reconnaissance drones are essential. Each destroyer and aircraft carrier should be equipped with its own fleet of multi-domain drones to conduct surveillance and gather intelligence. Currently, US carrier strike groups rely on land-launched surveillance drones, which are vulnerable and limited in number. Integrating organic drones into each vessel would enhance situational awareness and operational flexibility, allowing for more effective and autonomous intelligence-gathering capabilities.

Third, large fleets of affordable USVs and UUVs can deploy sensors across the ocean, increasing sensor hours at sea and improving maritime domain awareness. The first Replicator tranche is equipping forces with thousands of attritable systems to turn the Taiwan Strait into “an unmanned hellscape,” demonstrating the strategic value of uncrewed systems in contested waters. Moreover, the Navy is experimenting with diverse types of uncrewed platforms, aiming to create a distributed fleet architecture that is even more lethal than today’s carrier-centric fleet. These unmanned systems provide a cost-effective means to enhance surveillance and reconnaissance capabilities across vast oceanic areas, ensuring that the Navy can maintain a strategic advantage in both peacetime and conflict scenarios.

Recommendations

To maximize the efficacy of maritime domain awareness, it is crucial to integrate data from both Blue OSINT and ubiquitous sensor networks. While these two systems of data collection are largely distinct, their combined use can significantly enhance the accuracy and comprehensiveness of intelligence assessments and naval warfare.

  1. Leverage Blue OSINT. Significant investment in artificial intelligence and advanced analytics is necessary to manage and interpret the endless amounts of data generated by open-source intelligence. By fostering a coordinated approach to maritime security, Blue OSINT can facilitate easier information sharing with allies and partners, but only if its utilization is preplanned. Collaborative pathways for Blue OSINT data collection, processing, and analysis must take shape early in the concept and planning phases. This collaborative effort will significantly enhance collective situational awareness and operational effectiveness, making it easier for navies to synchronize their efforts. Additionally, complementing Blue OSINT with traditional intelligence collection such as HUMINT and SIGINT provides a comprehensive threat assessment. By integrating these capabilities, navies can more easily attain a well-rounded understanding of adversary actions.
  2. Commercially procure distributed sensing capabilities and networks. The US Navy must invest in Replicator-style unmanned platforms that can affordably deploy sensors across maritime battlefields, similar to the use of small UAS for land reconnaissance. These commercially procured distributed sensing platforms will significantly enhance the Navy’s ability to continuously and comprehensively monitor vast areas, improving overall maritime domain awareness.
  3. Recognize a new maritime operating environment. The US Navy must prepare for protracted missions away from easily monitored ports and chokepoints while penetrating adversary-controlled, denied waters. This mission set requires a robust logistical framework capable of supporting extended deployments in remote and contested waters. By developing sophisticated tactics to deceive and confuse distributed sensor networks, the Navy can minimize its visibility to adversaries and maintain strategic surprise. This necessitates investing in advanced deception technologies such as electronic warfare, signal spoofing, and decoys to create false targets and obscure true movements. Additionally, enhancing the stealth capabilities of vessels through innovative designs and operational practices will further ensure that naval forces can evade detection and operate effectively in a sensor-saturated environment. By embracing these realities, the Navy can sustain its operational effectiveness and strategic advantage across the competition continuum.

Conclusion

In an era of distributed sensing networks and Blue OSINT, adaptation is not just about leveraging technology but also about evolving operational doctrines to meet the challenges of contemporary maritime conflicts. By integrating Blue OSINT capabilities, deploying distributed sensors, and countering (and employing) deception, naval forces can maintain an asymmetric advantage in the increasingly visible and contested maritime domain.

The success of modern naval operations hinges on the ability to swiftly adapt to technological advancements and evolving threats. Navies must transcend beyond traditional methods and embrace innovative strategies to remain agile and effective. This demands a concerted effort from all levels of naval leadership, from policymakers to forward operators, to implement these changes.

On the unforgiving sea, only those who rapidly transform to the era of Blue OSINT will avoid the abyss, with the rest risk sinking into obsolescence as adversaries gain decisional advantage. Navies that fail to adjust to the realities of Blue OSINT and sensor networks risk ending up like the Russian Black Sea Fleet: at the bottom of the ocean.

Authors

Guido L. Torres is a nonresident senior fellow with the Atlantic Council’s Forward Defense Program and the executive director of the Irregular Warfare Initiative.

Austin Gray is co-founder and chief strategy officer of Blue Water Autonomy. He previously worked in a Ukrainian drone factory and served in US naval intelligence.

Related content

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Sailing through the spyglass: The strategic advantages of blue OSINT, ubiquitous sensor networks, and deception appeared first on Atlantic Council.

]]>
Polymeropoulos on a Cipher Brief podcast about Havana Syndrome https://www.atlanticcouncil.org/insight-impact/in-the-news/polymeropoulos-cipher-brief-havana-syndrome-podcast/ Mon, 20 May 2024 15:50:30 +0000 https://www.atlanticcouncil.org/?p=767552 On May 20, Forward Defense nonresident senior fellow Marc Polymeropoulos spoke on a Cipher Brief podcast titled “Is Russia Attacking U.S. Government Employees Using High-Energy Weapons?” about Havana Syndrome.

The post Polymeropoulos on a Cipher Brief podcast about Havana Syndrome appeared first on Atlantic Council.

]]>

On May 20, Forward Defense nonresident senior fellow Marc Polymeropoulos spoke on a Cipher Brief podcast titled “Is Russia Attacking U.S. Government Employees Using High-Energy Weapons?” about Havana Syndrome.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Polymeropoulos on a Cipher Brief podcast about Havana Syndrome appeared first on Atlantic Council.

]]>
Eftimiades quoted in Nikkei Asia https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-quoted-in-nikkei-asia/ Wed, 08 May 2024 13:49:44 +0000 https://www.atlanticcouncil.org/?p=763206 Nicholas Eftimiades was quoted in Nikkei Asia in an article about suspected Chinese spies in Germany and the UK.

The post Eftimiades quoted in Nikkei Asia appeared first on Atlantic Council.

]]>

On April 28, Forward Defense nonresident senior fellow Nicholas Eftimiades was quoted in Nikkei Asia in an article about suspected Chinese spies in Germany and the UK. Eftimiades was quoted as saying, “They are attempting to drive a wedge between Europe and the United States, implementing a divide-and-conquer strategy.” He was also quoted warning about a  “possibility of retaliation — even arbitrary arrests of Europeans in China.”

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades quoted in Nikkei Asia appeared first on Atlantic Council.

]]>
Polymeropoulos cited in The Spectator “Is Havana Syndrome real?” https://www.atlanticcouncil.org/insight-impact/in-the-news/polymeropoulos-havana-syndrome-spectator/ Sun, 05 May 2024 17:47:23 +0000 https://www.atlanticcouncil.org/?p=763406 On May 5, Forward Defense nonresident senior fellow Marc Polymeropoulos was cited in a Spectator article by John Foreman about Havana Syndrome.

The post Polymeropoulos cited in The Spectator “Is Havana Syndrome real?” appeared first on Atlantic Council.

]]>

On May 5, Forward Defense nonresident senior fellow Marc Polymeropoulos was cited in a Spectator article by John Foreman about Havana Syndrome.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Polymeropoulos cited in The Spectator “Is Havana Syndrome real?” appeared first on Atlantic Council.

]]>
Eftimiades published in intelNews on Chinese espionage https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-published-in-intelnews-on-chinese-espionage/ Fri, 03 May 2024 15:55:00 +0000 https://www.atlanticcouncil.org/?p=774553 Nicholas Eftimiades published an article titled "Tradecraft observations on the Reichenbach/Fischer espionage case" in intelNews.

The post Eftimiades published in intelNews on Chinese espionage appeared first on Atlantic Council.

]]>

On May 3, Forward Defense nonresident senior fellow Nicholas Eftimiades published an article titled “Tradecraft observations on the Reichenbach/Fischer espionage case” in intelNews, detailing the alleged Chinese agents’ export of sensitive military technology from Germany.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades published in intelNews on Chinese espionage appeared first on Atlantic Council.

]]>
Eftimiades on Spectator TV https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-on-spectator-tv/ Thu, 02 May 2024 00:15:03 +0000 https://www.atlanticcouncil.org/?p=761284 Nicholas Eftimiades was interviewed by the UK's Spectator TV. He discussed China's recent espionage activities throughout Europe.

The post Eftimiades on Spectator TV appeared first on Atlantic Council.

]]>

On April 29, Forward Defense nonresident senior fellow Nicholas Eftimiades was interviewed by the UK’s Spectator TV. Referencing China’s recent espionage activities throughout Europe, Eftimiades asserted that “this is the largest scale series of intelligence activities we have seen in modern history.”

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades on Spectator TV appeared first on Atlantic Council.

]]>
Great power competition is back. What does that mean for US special operations forces? https://www.atlanticcouncil.org/blogs/new-atlanticist/great-power-competition-is-back-us-special-operations-forces/ Fri, 19 Apr 2024 17:41:57 +0000 https://www.atlanticcouncil.org/?p=758210 With their wide array of capabilities, US special operations forces can play a central role in strategic competition.

The post Great power competition is back. What does that mean for US special operations forces? appeared first on Atlantic Council.

]]>
After 9/11, US special operations forces (USSOF) became well known for direct-action missions that captivated the public’s imagination and demonstrated unparalleled tactical success. The highly publicized raids, precision strikes, and elimination of terrorist threats solidified USSOF’s reputation as the tip of the spear in the US military’s arsenal.

In recent years, however, the global security environment has changed. Adversaries such as Russia and China are using a broad spectrum of diplomatic, informational, military, and economic tactics to challenge the US-led order and achieve their global aims. This return of strategic competition has drawn attention away from the surgical, direct-action operations so prominent during the height of the war on terror, and toward confronting the sophisticated strategies of near-peer adversaries.

So what does this mean for special operations forces?

USSOF will continue to have a central role in the era of renewed strategic competition—but only if there is a broader appreciation and application of USSOF’s capabilities, which extend far beyond just raids and precision strikes. Too often at present, however, USSOF’s distinct capabilities and expertise are overlooked or misunderstood among the broader national security community.

Some of these operations will require applying the operational tactics USSOF focused on since 9/11 to new challenges.

In the face of an evolving and increasingly complex global threat environment, USSOF represents a uniquely versatile component of the US Joint Force. It possesses an array of capabilities that, if fully leveraged, could significantly enhance US force posture. To do so, USSOF must shift its mindset and planning toward strategic competition. There must also be a concerted effort from the services and the Joint Force to integrate USSOF’s unique capabilities more effectively, and the broader defense community must take steps to make the most of the multifaceted value that USSOF brings to the table.

To begin with, USSOF must extend its reach into non-kinetic operations and expand its irregular warfare approach to address the advanced strategies of adversaries such as China and Russia. Some of these operations will require applying the operational tactics USSOF focused on since 9/11 to new challenges. For example, USSOF’s well-honed capabilities for navigating denied and niche environments, including underground operations—an important asset in past counterterrorism missions—are now vital for filling strategic gaps in unconventional warfare scenarios. The salience of this capability is evident, for example, if an adversary uses complex tunnel networks, and it represents just one aspect of USSOF’s highly specialized tactics, techniques, and procedures that can be transitioned to new strategic roles.

This transition will also require adapting USSOF’s strength in new ways. Some of this is already underway—for example, modernizations in naval capabilities are set to boost USSOF’s undersea warfare proficiency, which will help counter rivals such as China in contested spaces. USSOF should continue to prepare for the challenges posed by strategic competition by enhancing its cyber and space capabilities, investing in emerging fields such as artificial intelligence, and bolstering civil-affairs expertise for functioning in extreme and complex operating environments. Clear and decisive communication between the US assistant secretary of defense for special operations and low-intensity conflict and the United States Special Operations Command is vital to define the strategic contributions of special operations within the Department of Defense.

Yet embracing these changes also presents challenges, particularly for USSOF to define and measure its own success. The often-preventive nature of USSOF’s missions, which are aimed at deterring adversaries and shaping their behavior, requires a nuanced approach to evaluating effectiveness. Establishing clear objectives and metrics for strategic competition will be essential, enabling USSOF to quantify its successes and adapt its strategies accordingly.

At the same time, USSOF must maintain its proficiency in essential ongoing tasks, such as combating violent extremist organizations, countering terrorism, and managing weapons of mass destruction. Doing so is necessary so that the United States avoids strategic distractions, such as a preventable terrorist attack.

USSOF works extensively in the information domain, pushing back against propaganda and disinformation from adversaries.

As USSOF adapts its mindset and planning to meet the challenges posed by strategic competition, the Joint Force and the broader interagency must find ways to understand and maximize USSOF’s capabilities. To do so, decision makers across the Joint Force must properly recognize the full range of USSOF’s potential roles, particularly before conflict breaks out.

Unfortunately, some of these potential roles are under-resourced and underleveraged. For example, USSOF’s civil affairs and psychological operations capabilities, though currently underutilized, are essential for strategic competition. The sole brigade responsible for civil affairs is tasked with everything from economic analysis to liaising with civilian government agencies on the ground. With sufficient resources, it could expand its civil-military cooperation in volatile areas, support local governance, and respond to increasingly frequent natural disasters. Notably, United States Marine Forces Special Operations Command’s linguistic and cultural expertise, as demonstrated in long-term operations in the Philippines, highlights the value of investing more in these capacities, especially in strategic areas such as the Indo-Pacific.

Other roles for USSOF are better funded but are still underappreciated across the Department of Defense. USSOF works extensively in the information domain, pushing back against propaganda and disinformation from adversaries. According to General Richard Clarke, former commander of US Special Operations Command, commanders he visited on deployment spent about 60 percent of their time working in the information space. Such work will likely continue, since Russia and China show a growing interest in using information warfare to try to counter US strategic objectives worldwide. Despite this, unfilled billets in the Army’s Special Operations military information support operations were recently cut. This decision signals a troubling undervaluation of these vital capabilities.

If the potential capabilities that USSOF brings to strategic competition are better understood, then these capabilities are more likely to be supported, developed, and implemented in ways that will help shape the strategic environment effectively. Moreover, the capabilities will need to be integrated into a cohesive strategy across the Joint Force, coordinating USSOF’s presence within all seven geographic combatant commands and interagency partners. Doing so would allow USSOF’s capabilities to bridge the divides between different combatant command zones, which could improve the overall US strategic posture in competitive regions and facilitate improved intelligence sharing.

By enhancing USSOF’s capabilities and recognizing its value in strategic competition, the interagency and Department of Defense can ensure it effectively continues to protect US interests and contribute to global stability. Thus equipped, USSOF will remain adept at confronting modern conflict dynamics and asserting US international strategic priorities.


Alyxandra Marine is an assistant director with the Forward Defense program at the Atlantic Council. The recommendations from this piece are explained in further detailed in Stealth, speed, and adaptability: The role of special operations forces in strategic competition.

The post Great power competition is back. What does that mean for US special operations forces? appeared first on Atlantic Council.

]]>
Polymeropoulos coauthored for Politico about intelligence sharing and combatting transnational terrorist groups https://www.atlanticcouncil.org/insight-impact/in-the-news/polymeropoulos-intelligence-sharing-terrorism-politico/ Tue, 02 Apr 2024 14:52:25 +0000 https://www.atlanticcouncil.org/?p=755101 On April 2, Forward Defense nonresident senior fellow Marc Polymeropoulous coauthored “The Surprising Intelligence Community Outreach to Russia” for Politico about combatting the threat posed by transnational terrorist groups like ISIS-K. He warns that the United States must be careful when engaging with other nations for intelligence sharing and basic counterterrorism exchanges, as such outreach […]

The post Polymeropoulos coauthored for Politico about intelligence sharing and combatting transnational terrorist groups appeared first on Atlantic Council.

]]>

On April 2, Forward Defense nonresident senior fellow Marc Polymeropoulous coauthored “The Surprising Intelligence Community Outreach to Russia” for Politico about combatting the threat posed by transnational terrorist groups like ISIS-K.

He warns that the United States must be careful when engaging with other nations for intelligence sharing and basic counterterrorism exchanges, as such outreach can sometimes morph into more issues that intelligence professionals must face.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Polymeropoulos coauthored for Politico about intelligence sharing and combatting transnational terrorist groups appeared first on Atlantic Council.

]]>
Polymeropoulos quoted in USA Today about the “Havana Syndrome” and the US intelligence community https://www.atlanticcouncil.org/insight-impact/in-the-news/polymeropoulos-havana-syndrome/ Mon, 01 Apr 2024 14:24:54 +0000 https://www.atlanticcouncil.org/?p=754365 On April 1, Forward Defense Nonresident Senior Fellow Marc Polymeropoulos reacted to a ’60 Minutes’ report that named the Russian military intelligence unit behind the mysterious “Havana Syndrome,” neurological symptoms that US diplomats and spies have reported suffering from for nearly a decade.

The post Polymeropoulos quoted in USA Today about the “Havana Syndrome” and the US intelligence community appeared first on Atlantic Council.

]]>

On April 1, Forward Defense Nonresident Senior Fellow Marc Polymeropoulos reacted to a ’60 Minutes’ report that named the Russian military intelligence unit behind the mysterious “Havana Syndrome,” neurological symptoms that US diplomats and spies have reported suffering from for nearly a decade.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Polymeropoulos quoted in USA Today about the “Havana Syndrome” and the US intelligence community appeared first on Atlantic Council.

]]>
Polymeropoulos spoke with The Insider on suffering from “Havana Syndrome” https://www.atlanticcouncil.org/insight-impact/in-the-news/polymeropoulos-testimony-havana-syndrome/ Sun, 31 Mar 2024 19:56:54 +0000 https://www.atlanticcouncil.org/?p=754565 On March 31, Forward Defense Nonresident Senior Fellow Marc Polymeropoulos spoke with The Insider on his suffering from “Havana Syndrome” after his 26 year career as an operations officer with the Central Intelligence Agency (CIA).

The post Polymeropoulos spoke with The Insider on suffering from “Havana Syndrome” appeared first on Atlantic Council.

]]>

On March 31, Forward Defense Nonresident Senior Fellow Marc Polymeropoulos spoke with The Insider on his suffering from “Havana Syndrome” after his 26 year career as an operations officer with the Central Intelligence Agency (CIA).

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Polymeropoulos spoke with The Insider on suffering from “Havana Syndrome” appeared first on Atlantic Council.

]]>
Groen writes in The Cipher Brief about cryptocurrency and national security https://www.atlanticcouncil.org/insight-impact/in-the-news/groen-digital-battlefield-criminal-terrorism-cipher-brief/ Tue, 26 Mar 2024 16:50:00 +0000 https://www.atlanticcouncil.org/?p=752397 Michael Groen writes about combatting illicit actors and nation states with blockchain intelligence on the digital battlefield.

The post Groen writes in The Cipher Brief about cryptocurrency and national security appeared first on Atlantic Council.

]]>

On March 26, Forward Defense Nonresident Senior Fellow Michael Groen coauthored an article for The Cipher Brief titled “Preparing for a Digital Battlefield: National Security and Cryptocurrency” about combatting illicit actors and nation states with blockchain intelligence. He emphasized that sanctions enforcement and counterterrorism success must include digital tools and techniques to investigate, seize, and disrupt transactions in evolving domains to protect national security.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Groen writes in The Cipher Brief about cryptocurrency and national security appeared first on Atlantic Council.

]]>
Vinograd on CBS “Face the Nation” about the recent ISIS terrorist attack in Moscow, US border security, and more https://www.atlanticcouncil.org/insight-impact/in-the-news/vinograd-cbs-face-the-nation-intelligence-vetting-architecture/ Sun, 24 Mar 2024 19:41:36 +0000 https://www.atlanticcouncil.org/?p=752220 Samantha Vinograd speaks about increasing resources for vetting architecture and intelligence sharing to improve national security.

The post Vinograd on CBS “Face the Nation” about the recent ISIS terrorist attack in Moscow, US border security, and more appeared first on Atlantic Council.

]]>

On March 24, Forward Defense Nonresident Senior Fellow Samantha Vinograd appeared on CBS “Face the Nation” with Margaret Brennan discussing the recent terrorist attack carried out by ISIS-K in Moscow and southern US border security. She also spoke about the criticality of supplying resources for vetting architecture, intelligence sharing, and enhancing information arrangements with international partners.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Vinograd on CBS “Face the Nation” about the recent ISIS terrorist attack in Moscow, US border security, and more appeared first on Atlantic Council.

]]>
Eftimiades on NucleCast by ANWA Deterrence Center https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-on-nuclecast-by-anwa-deterrence-center/ Wed, 20 Mar 2024 19:47:30 +0000 https://www.atlanticcouncil.org/?p=749687 Eftimiades was interviewed on NucleCast by ANWA Deterrence Center, where he discussed  China's whole of society approach to espionage and the methods that they use to implement this approach.

The post Eftimiades on NucleCast by ANWA Deterrence Center appeared first on Atlantic Council.

]]>

On March 12, Forward Defense nonresident senior fellow Nicholas Eftimiades was interviewed on “NucleCast,” hosted by the ANWA Deterrence Center. He discussed China’s whole-of-society approach to espionage and the methods that Chinese actors use to implement this approach.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades on NucleCast by ANWA Deterrence Center appeared first on Atlantic Council.

]]>
Polymeropoulos cited on RawStory about concerns of Trump politicizing intelligence https://www.atlanticcouncil.org/insight-impact/in-the-news/polymeropoulos-trump-politicizing-intelligence/ Mon, 18 Mar 2024 15:52:15 +0000 https://www.atlanticcouncil.org/?p=750967 Marc Polymeropoulos notes that there will be negative effects for allies' information sharing if Trump continues to politicize intelligence.

The post Polymeropoulos cited on RawStory about concerns of Trump politicizing intelligence appeared first on Atlantic Council.

]]>

On March 18, Forward Defense Nonresident Senior Fellow Marc Polymeropoulos was cited about the negative effects that Trump’s politicization of intelligence would have on gathering and sharing information, particularly with American allies.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Polymeropoulos cited on RawStory about concerns of Trump politicizing intelligence appeared first on Atlantic Council.

]]>
Will the US crack down on TikTok? Six questions (and expert answers) about the bill in Congress. https://www.atlanticcouncil.org/blogs/new-atlanticist/will-the-us-crack-down-on-tiktok-six-questions-and-expert-answers-about-the-bill-in-congress/ Wed, 13 Mar 2024 23:42:14 +0000 https://www.atlanticcouncil.org/?p=747735 The US House has just passed a bill to force the Chinese company ByteDance to either divest from TikTok or face a ban in the United States.

The post Will the US crack down on TikTok? Six questions (and expert answers) about the bill in Congress. appeared first on Atlantic Council.

]]>
The clock is ticking. On Wednesday, the US House overwhelmingly passed a bill to force the Chinese company ByteDance to divest from TikTok, or else the wildly popular social media app would be banned in the United States. Many lawmakers say the app is a national security threat, but the bill faces an uncertain path in the Senate. Below, our experts address six burning questions about this bill and TikTok at large.

1. What kind of risks does TikTok pose to US national security?

Chinese company ByteDance’s ownership of TikTok poses two specific risks to US national security. One has to do with concerns that the Chinese Communist Party (CCP) could use its influence over the Chinese owners to use TikTok’s algorithm for propaganda purposes. Addressing this security concern is tricky due to legal protections for freedom of expression. The other risk, and the one addressed through the current House legislation, has to do with the ability of the CCP to use Chinese ownership of TikTok to access the massive amount of data that the app collects on its users. This could include data on everything from viewing tastes, to real-time location, to information stored on users’ phones outside of the app, including contact lists and keystrokes that can reveal, for example, passwords and bank activity.

Sarah Bauerle Danzman is a resident senior fellow with the Economic Statecraft Initiative in the Atlantic Council’s GeoEconomics Center.

This debate is not over free speech or access to social media: The question is fundamentally one of whether the United States can or should force a divestment of a social media company from a parent company (in this case ByteDance) if the company can be compelled to act under the direction of the CCP. We have to ask: Does the CCP have the intent or ability to compel data to serve its interests? There is an obvious answer here. We know that China has already collected massive amounts of sensitive data from Americans through efforts such as the Office of Personnel Management hack in 2015. Recent unclassified reports, including from the Office of the Director of National Intelligence, show the skill and intent of China to use personal data for influence. And the CCP has the legal structure in place to compel companies such as ByteDance to comply and cooperate with CCP requests.

Meg Reiss is a nonresident senior fellow at the Scowcroft Strategy Initiative of the Atlantic Council’s Scowcroft Center for Strategy and Security.

2. Are those risks unique to TikTok?

TikTok is not an unproblematic platform, and there are real and significant user risks that could pose dangers to safety and security, especially for certain populations. However, focusing on TikTok ignores broader vulnerabilities in the US information ecosystem that put Americans at risk. An outright ban of TikTok as currently proposed—particularly absent clearer standards for all platforms—would not meaningfully address these broader risks and would in fact potentially undermine US interests in a much more profound way.

As our recent report outlines in detail, a ban is unlikely to achieve the intended effect of meaningfully curbing China’s ability to gather sensitive data on Americans or to conduct influence operations that harm US interests. It also may contribute to a global curbing of the free flow of data that is essential to US tech firms’ ability to innovate and maintain a competitive edge.

Kenton Thibaut is a senior resident China fellow at the Atlantic Council’s Digital Forensic Research Lab.

Some have argued that TikTok, while on the aggressive end of the personal data collection spectrum, collects similar data to what other social media companies collect. However, the US government would counter with two points: First, TikTok has a history of skirting data privacy rules, such as those limiting data collection on children and those that prevent the collection of phone-specific identifiers called MAC numbers, and therefore the company cannot be trusted to handle sensitive personal data in accordance with the law. And second, unlike other popular apps, TikTok is ultimately beholden to Chinese regulations. This includes the 2017 Chinese National Intelligence Law that requires Chinese companies to hand over a broad range of information to the Chinese government if asked. Because China’s legal system is far more opaque than the United States’, it is unclear if the US government or its citizens would even know if the Chinese government ever asked for this data from TikTok. While TikTok’s management has denied supplying the Chinese government with such data, insider reports have uncovered Chinese employees gaining access to US user data. In other words, the US government has little reason to trust that ByteDance is keeping US user data safe from the CCP.

—Sarah Bauerle Danzman

3. What does the House bill actually do?

There are two important, related bills. The one that passed the House today is the Protecting Americans from Foreign Adversary Controlled Applications Act, which forces divestment. It is not an outright ban, and it is intended to address the real risk of ByteDance—thus TikTok—falling under the jurisdiction of China’s 2017 National Intelligence Law, which compels Chinese companies to cooperate with the CCP’s requests. However, divestment doesn’t completely solve for the additional potential risks of the CCP using TikTok in a unique or systemic way for data collection, algorithmic tampering (e.g. what topics surface or don’t surface to users), or information operations (e.g. an influence campaign unique to TikTok as opposed to on other platforms as well). Second, the Protecting Americans’ Data from Foreign Adversaries Act, which cleared a House committee last week, more directly addresses a broader risk of blocking the Chinese government’s access to the type of data that TikTok and many other social media platforms collect on the open market. The former without the latter is an incomplete approach to protecting Americans’ data from the CCP—and even the two combined falls short of a federal data privacy standard.

Graham Brookie is vice president and senior director of the Digital Forensic Research Lab.

There is no question China seeks to influence the American public and harvests large amounts of data on American citizens. As our recent report illuminates however, the Chinese state’s path to these goals depends very little on TikTok.

Today’s actions in the House underscore the disjointed nature of the US approach to governing technology. Rather than focus on TikTok specifically, it would be both legally and geopolitically wiser to pass legislation that sets standards for everyone, and not just one company. That could mean setting standards for what actions or behavior by any social media company would be unacceptable (for example on the use of algorithms or collection and selling of data). Or Congress could focus on prohibiting companies that are owned by states proven to have conducted hostile actions toward US digital infrastructure to operate in the United States. That would certainly include TikTok (and many other companies). This bill takes a halfway approach, both tying itself explicitly to TikTok owner ByteDance and hinting that it could apply to “other social media companies.”

Rose Jackson is the director of the Democracy and Tech Initiative at the Digital Forensic Research Lab.

The recently passed House bill, if it were to become law, would create a pathway to force the divestment of Chinese ownership in TikTok or ban the app from app stores and web hosting sites. Unlike previous attempts by the Trump administration to ban the app outright or force a divestment through the Committee on Foreign Investment in the United States, the Protecting Americans from Foreign Adversary Controlled Applications Act would not just affect TikTok. Instead, the legislation would create a process through which the US government could designate social media apps that are considered to be under the control of foreign adversaries as national security threats. Once identified as threats, the companies would have 180 days to divest from the foreign ownership or be subject to a ban.

—Sarah Bauerle Danzman

4. What would be some of the global ripple effects of a TikTok ban?

The United States has always opposed efforts by authoritarian nations seeking to build “great firewalls” around themselves. This model of “cyber sovereignty” sees the open, interoperable, and free internet as a threat, which is why countries like China already have a well-funded strategy to leverage global governance platforms to drive the development of a less open and more authoritarian-friendly version. A TikTok ban would ironically benefit authoritarian governments as they seek to center state-level action (over multi-stakeholder processes) in internet governance. TikTok should not lead the United States to abandon its longstanding commitment to the values of a free, open, secure, and interoperable internet.

A ban could generate more problems than it would solve. What the United States should consider instead is passing federal privacy laws and transparency standards that apply to all companies. This would be the single most impactful way to address broader system vulnerabilities, protect US values and commitments, and address the unique risks related to TikTok’s Chinese ownership, while avoiding the potential significant downsides of a ban. 

Kenton Thibaut

5. What do you make of TikTok’s response, particularly in pushing its users to flood Capitol Hill with calls?

Members of Congress were rightfully alarmed by TikTok’s use of its platform to send push notifications encouraging users to call their representatives. However, Uber and Lyft used this exact same tactic in California when trying to defeat legislation that would have required it to provide benefits to its drivers. If we try to solve “TikTok” and not the broader issue TikTok is illuminating, we will keep coming back to these same issues over and over again. 

—Rose Jackson

6. How is China viewing this debate?

The CCP has a tendency to throw a lot of spaghetti at the wall in an attempt to make its arguments, in this case that the divestment of TikTok from its Chinese parent company ByteDance is unnecessary. When the CCP has justified the internment of Uyghurs, it has thrown out everything from defending its repression based on terrorist beliefs across the population to claiming that it was just helping with social integration and developing work programs. The CCP has already made claims that the divestment would cause investors to lose faith in the US market and that it shows a fundamental weakness and abuse of national security. Expect many different versions of these arguments and more. But all the anticipated pushback will be focused on diverting the public argument away from the fundamental concern: The Chinese government can, under law, force a Chinese company to share information. 

—Meg Reiss

The post Will the US crack down on TikTok? Six questions (and expert answers) about the bill in Congress. appeared first on Atlantic Council.

]]>
Eftimiades on Think JSOU on the China’s espionage methodology https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-on-think-jsou-on-the-chinas-espionage-methodology/ Mon, 04 Mar 2024 16:50:26 +0000 https://www.atlanticcouncil.org/?p=730171 Nicholas Eftimiades discusses the role of intelligence operations in the strategic competition between the United States and China.

The post Eftimiades on Think JSOU on the China’s espionage methodology appeared first on Atlantic Council.

]]>

On February 20, Forward Defense nonresident senior fellow Nicholas Eftimiades was interviewed on Joint Special Operations University’s webinar, Think JSOU. He discussed China’s espionage methodology from his 2020 book, Chinese Espionage Operations and Tactics.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades on Think JSOU on the China’s espionage methodology appeared first on Atlantic Council.

]]>
Eftimiades in iNews on Chinese espionage https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-in-inews-on-chinese-espionage/ Wed, 31 Jan 2024 19:22:19 +0000 https://www.atlanticcouncil.org/?p=730170 Nicholas Eftimiades discusses the role of intelligence operations in the strategic competition between the United States and China.

The post Eftimiades in iNews on Chinese espionage appeared first on Atlantic Council.

]]>

On January 31st, Forward Defense nonresident senior fellow Nicholas Eftimiades was quoted in iNews discussing Chinese espionage and the West’s inability to counter it.

We’re under siege. Everywhere you look, something different is happening

Nicholas Eftimiades

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades in iNews on Chinese espionage appeared first on Atlantic Council.

]]>
Dean quoted in the Australian Financial Review on protecting AUKUS technology https://www.atlanticcouncil.org/insight-impact/in-the-news/dean-quoted-in-the-australian-financial-review-on-protecting-aukus-technology/ Tue, 23 Jan 2024 18:47:30 +0000 https://www.atlanticcouncil.org/?p=735039 On January 22, IPSI nonresident senior fellow Peter Dean was quoted in an Australian Financial Review article, where he explained that Australian private sector security arrangements are insufficient to protect sensitive AUKUS technology.

The post Dean quoted in the Australian Financial Review on protecting AUKUS technology appeared first on Atlantic Council.

]]>

On January 22, IPSI nonresident senior fellow Peter Dean was quoted in an Australian Financial Review article, where he explained that Australian private sector security arrangements are insufficient to protect sensitive AUKUS technology.

The post Dean quoted in the Australian Financial Review on protecting AUKUS technology appeared first on Atlantic Council.

]]>
Eftimiades in SpyTalk on Chinese soldier training with US contractors https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-in-spytalk-on-chinese-soldier-training-with-us-contractors/ Mon, 22 Jan 2024 23:51:36 +0000 https://www.atlanticcouncil.org/?p=730172 Nicholas Eftimiades discusses the role of intelligence operations in the strategic competition between the United States and China.

The post Eftimiades in SpyTalk on Chinese soldier training with US contractors appeared first on Atlantic Council.

]]>

On January 19, Forward Defense nonresident senior fellow Nicholas Eftimiades was quoted in SpyTalk discussing the failure of US intelligence to detect PLA military training happening inside the US by unwitting former Navy SEALS and Army Special Forces who operate as contractors.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades in SpyTalk on Chinese soldier training with US contractors appeared first on Atlantic Council.

]]>
Gericke featured on episode of NucleCast podcast https://www.atlanticcouncil.org/insight-impact/in-the-news/gericke-featured-on-episode-of-nuclecast-podcast/ Wed, 17 Jan 2024 19:17:43 +0000 https://www.atlanticcouncil.org/?p=735064 On January 16, IPSI nonresident senior fellow Brad Gericke spoke on an episode of NucleCast, a podcast produced by the Advanced Nuclear Weapons Alliance Deterrence Center. He discussed the situation leading up to Russia’s invasion of Ukraine and the perspective of the intelligence community during this time. 

The post Gericke featured on episode of NucleCast podcast appeared first on Atlantic Council.

]]>

On January 16, IPSI nonresident senior fellow Brad Gericke spoke on an episode of NucleCast, a podcast produced by the Advanced Nuclear Weapons Alliance Deterrence Center. He discussed the situation leading up to Russia’s invasion of Ukraine and the perspective of the intelligence community during this time. 

The post Gericke featured on episode of NucleCast podcast appeared first on Atlantic Council.

]]>
The sentencing of a US Navy sailor is a window into Chinese espionage. Here’s how the US should respond. https://www.atlanticcouncil.org/blogs/new-atlanticist/the-sentencing-of-a-us-navy-sailor-is-a-window-into-chinese-espionage-heres-how-the-us-should-respond/ Sat, 13 Jan 2024 17:09:30 +0000 https://www.atlanticcouncil.org/?p=724859 China’s intelligence services recognize that national security information does not have to be classified to provide them with value.

The post The sentencing of a US Navy sailor is a window into Chinese espionage. Here’s how the US should respond. appeared first on Atlantic Council.

]]>
The United States and its allies and partners are under constant threat from pervasive efforts by China to collect intelligence, though this rarely makes it into the public eye. This week provided a clear reminder of this threat. On January 8, US Navy sailor Wenheng Zhao, who pled guilty in October 2023 in the Central District of California to one count of conspiring with a foreign intelligence officer and one count of receiving a bribe, was sentenced to twenty-seven months in prison and ordered to pay a $5,500 fine.

Zhao was one of two active duty US servicemembers indicted in August 2023 for providing sensitive US military information to China. The second, Jinchao Wei, was indicted for violating an espionage statute and multiple export violations in the Southern District of California. According to the indictment, he was granted US citizenship while the alleged illegal activities were taking place. (Wei is, of course, presumed innocent until proven guilty in a court of law.)

These two cases are playing out as tensions remain high between the United States and China, even after the November 2023 meeting between US President Joe Biden and Chinese leader Xi Jinping. In response to these court cases, there will be an understandable temptation for the United States to react by doing something to address Chinese espionage, and perhaps even pressure for systemic changes to the US counterintelligence approach. But big, sudden changes often create new and potentially greater vulnerabilities. Instead, policymakers should respond carefully and deliberately by seizing this moment to manage counterintelligence and security risks more effectively over the long term.

This can be done by decreasing the probability of future similar events from occurring, while avoiding creating new risks. Specifically, the response should consider focusing on prevention via training, enhanced information-sharing with allies and partners, and a shift to a more holistic risk-based personnel security approach for all US military members.

Intelligence collection doesn’t always mean stealing classified secrets

These two cases suggest that China’s intelligence services recognize that national security information does not have to be classified to provide them with value.  

Although both Zhao and Wei reportedly had secret-level security clearances, they were not assigned to particularly sensitive military occupational specialties, and there are no indications within the indictments that they passed classified information to Beijing’s intelligence services.

Wei was assigned to the USS Essex amphibious assault ship, which operates as a “Lightning carrier,” a platform for fifth generation F-35B Lightning strike aircraft. He allegedly used his phone to take photos that he provided to China’s intelligence services, while also providing information regarding potential vulnerabilities of the USS Wasp class of US Navy ship.

Zhao reportedly provided Chinese intelligence with information regarding the electrical system for a storage facility at a base in Okinawa housing a Ground/Air Task-Oriented Radar system. This radar system is used for expeditionary warfare that supports Marines in a contested or potentially contested maritime area—the kind of warfare that would matter in a conflict in the Western Pacific.

Given China’s resources, these were low-cost operations relative to the information allegedly received and a high return on investment to enhance Beijing’s hard power. As compensation for their alleged activities, Wei reportedly received between $10,000 and $15,000, while Zhao received the equivalent of almost $15,000.  

Three new steps to bolster counterintelligence and security

While these cases shed light on national security risks for the United States and its allies and partners, they also present the opportunity to justify new options for Washington to respond. That response should not, for example, be to limit the opportunities for foreign nationals to serve honorably in the US military or take measures that could damage recruitment and retention. Rather, it should take careful, measured steps to reinforce the foundations of counterintelligence and security. There are three steps policymakers should take next:

1. Focus more on prevention relative to treatment

In the medical community, doctors think of solutions in terms of prevention and treatment. For national security, the United States must do both, but in this instance, prevention—via training—should be the focus.

Specifically, the Department of Defense should enhance its counterintelligence threat awareness and reporting training program. This can be done by increasing the frequency of the training, presenting the information in different ways, and requiring a signed acknowledgement of responsibility from the training recipient. Such prevention measures would require additional resources for the Department of Defense counterintelligence and security system, but it would be worth the cost since the enhanced training requirements would decrease risk and potential costs overall.

2. Mobilize allies and partners to work together on counterintelligence

While protecting the integrity of the criminal justice process, the United States should consider sharing as much information as possible with its allies and partners about the methods that China’s intelligence services use to conduct their operations, particularly US allies and partners in the Indo-Pacific, since they are likely being targeted using similar methods. 

Specifically, the US counterintelligence community should host periodic events with its allies and partners to exchange information regarding how Beijing’s intelligence services target military members. This will help educate their military personnel regarding the evolving threat, including the types of cover used to approach potential targets. In the case of Zhao, the Chinese intelligence officer reportedly portrayed himself to Zhao as a maritime economic researcher, who needed information in order to “inform investment decisions.”

3. Establish a more holistic approach to personnel security that better integrates counterintelligence

Finally, the Department of Defense should consider enhancing the current security clearance-based system with a more holistic, risk-based personnel security approach. This would include those US military members who do not require access to classified information.

How might this work? There are various policies and systems already in place for personnel security and information security, especially for individuals who hold top secret security clearances and those who work in sensitive compartmented information facilities (SCIFs). Those important safeguards for security clearance holders should remain, but there are currently disconnects between security considerations (Do the duties of a position require working with sensitive information?) and counterintelligence findings (What information might China or other countries want?). The goal, then, should be to more closely integrate security and counterintelligence. Such an approach would fuse counterintelligence information regarding the evolving capabilities and intentions of foreign intelligence services with information about the duties of the position.

The risks of national security information being provided to foreign intelligence services have always existed and can never be eliminated, so the objective should be to optimally manage those risks. This could best be accomplished by investing in training, increasing sharing with allies and partners, and shifting to a more holistic risk-based personnel security approach for all US military members. 

Given the long-term and dynamic challenges of US-China strategic competition, now is the time to adapt US counterintelligence and security policy to effectively meet those challenges posed by China’s intelligence collection efforts.


Andrew Brown is a nonresident fellow with the Atlantic Council’s Indo-Pacific Security Initiative, where he specializes in defense and intelligence issues. He was previously a criminal investigator with the Department of Defense and was assigned to the Office of the Director of National Intelligence (ODNI).

The views expressed in this article are the author’s and do not reflect those of the Department of Defense or ODNI.

The post The sentencing of a US Navy sailor is a window into Chinese espionage. Here’s how the US should respond. appeared first on Atlantic Council.

]]>
Hinata-Yamaguchi quoted in NK News on trilateral information sharing https://www.atlanticcouncil.org/insight-impact/in-the-news/hinata-yamaguchi-quoted-in-nk-news-on-trilateral-information-sharing/ Wed, 20 Dec 2023 20:18:43 +0000 https://www.atlanticcouncil.org/?p=726830 On December 19, IPSI nonresident senior fellow Ryo Hinata-Yamaguchi was quoted in NK News on US-Japan-ROK trilateral sharing of information on North Korean missile launches. 

The post Hinata-Yamaguchi quoted in NK News on trilateral information sharing appeared first on Atlantic Council.

]]>

On December 19, IPSI nonresident senior fellow Ryo Hinata-Yamaguchi was quoted in NK News on US-Japan-ROK trilateral sharing of information on North Korean missile launches. 

The post Hinata-Yamaguchi quoted in NK News on trilateral information sharing appeared first on Atlantic Council.

]]>
Panikoff interviewed by Scripps News on Israel’s intelligence failure on Hamas attack https://www.atlanticcouncil.org/insight-impact/in-the-news/panikoff-interviewed-by-scripps-news-on-israels-intelligence-failure-on-hamas-attack/ Thu, 07 Dec 2023 20:44:42 +0000 https://www.atlanticcouncil.org/?p=694277 The post Panikoff interviewed by Scripps News on Israel’s intelligence failure on Hamas attack appeared first on Atlantic Council.

]]>

The post Panikoff interviewed by Scripps News on Israel’s intelligence failure on Hamas attack appeared first on Atlantic Council.

]]>
Panikoff quoted in CBC, The National on significance of Hamas terror attack https://www.atlanticcouncil.org/insight-impact/in-the-news/panikoff-quoted-in-cbc-the-national-on-significance-of-hamas-terror-attack/ Thu, 07 Dec 2023 20:44:38 +0000 https://www.atlanticcouncil.org/?p=694288 The post Panikoff quoted in CBC, The National on significance of Hamas terror attack appeared first on Atlantic Council.

]]>

The post Panikoff quoted in CBC, The National on significance of Hamas terror attack appeared first on Atlantic Council.

]]>
Advancing US-Colombia cooperation on drug policy and law enforcement https://www.atlanticcouncil.org/in-depth-research-reports/report/advancing-us-colombia-cooperation-on-drug-policy-and-law-enforcement/ Thu, 30 Nov 2023 13:00:00 +0000 https://www.atlanticcouncil.org/?p=705700 Consumption and price of the drug has remained stable in the United States in recent years. However, the current trend of falling coca leaf and cocaine prices in Colombia present a natural incentive for coca growers to find alternative forms of income, which could mean a higher rate of success for alternative development programs.

The post Advancing US-Colombia cooperation on drug policy and law enforcement appeared first on Atlantic Council.

]]>
A report by the Atlantic Council’s US-Colombia Advisory Group; honorary co-chaired by Senator Ben Cardin (D-MD) and Senator Bill Hagerty (R-TN)

With Geoff Ramsey and Isabel Chiriboga

Executive summary

On September 7, 2023, the Petro administration presented a new strategy to combat the illicit drug trade in Colombia—at a time when illicit coca cultivation is at an all-time high. The strategy’s emphasis on rural development and on offering viable economic alternatives for illicit crop growers, as well as changing counternarcotics priorities in Washington, provide a set of new opportunities for US-Colombia collaboration.

The United States and Colombia have a thirty-year track record of collaboration on this issue. Yet there is still a long road ahead, especially considering the growing concerns over the proliferation of organized crime in Colombia and the region writ large. In this context, progress on US-Colombia counternarcotics cooperation will require a delicate balance between reducing large-scale coca cultivation and building the capacity of security services to disrupt organized criminal networks, as well as investing in the rural communities most affected by this phenomenon.

At the same time, there is a growing recognition in the United States that the illicit drug trade is a shared responsibility primarily fueled by demand. Consumption and price have remained stable in the United States in recent years. However, the current trend of falling coca leaf and cocaine prices in Colombia present a natural incentive for coca growers to find alternative forms of income, which could mean a higher rate of success for alternative development programs and crop-substitution efforts if combined with a comprehensive law enforcement strategy.

The United States and Colombia should continue to collaborate closely to address the problems arising from the supply and demand for illicit drugs in this global context. This is crucial considering the emergence of new drug markets in West Africa and Europe, as well as the connections of certain trafficking organizations to fentanyl production. These dynamics, as well as a lack of state presence and the absence of economic alternatives in many parts of rural Colombia, have created longstanding challenges for both countries. Moving forward, it is crucial that both nations align their strategies to make the most impactful use of US assistance. The recommendations presented here are meant to bolster the approach to a decades-old problem.

US-Colombia Advisory Group recommendations

1. Enhance international cooperation efforts to dismantle organized crime groups and bolster interdiction operations.

Under Colombian law, any individual arrested by a Colombian authority at sea must be presented to a judicial officer within forty-eight hours. In practice, this means that offshore patrol vessels (OPVs) must leave their station. During that time, there is a gap in maritime coverage. The United States can support Colombia by offering essential equipment and training to incorporate advanced technology into OPVs. This could involve leveraging video processing techniques to facilitate due process during apprehensions at sea, thus negating the need for the vessel to return to port, while ensuring the protection of the rights of the accused and full compliance with Colombian law.

2. Define precise and inclusive guidelines for the manual eradication of “industrial” plantations, while working to develop additional metrics to measure progress.

In replacing coca and other illicit crops with other industrial-scale agricultural yields, several factors should be considered. These include the type of industrial crops best suited for coca-growing areas, the presence of an external market for large-scale production, and the fulfilment of sanitary and phytosanitary (SPS) standards overseas so that these products can have a guaranteed market access. To comply with these requirements, the Colombian government should promote public and private alliances to produce industrial-scale crops with SPS standards approved.

3. Strengthen coordination efforts between national and local governance on rule of law and state presence in conflict-torn communities.

The Petro administration should enhance coordination efforts between the national government and local authorities. While the current drug and security strategies outline fundamental areas for progress, they can better incorporate perspectives from local government at the level of cities and municipalities. These include persistent budgetary concerns exacerbated by growing migration pressures and the need for greater coordination on the implementation of nationwide policies.

4. Expand and strengthen US-led capacity-building programs for the prevention and detection of money laundering and financial crimes, with a focused emphasis on cyber-based illicit transactions.

Certain sectors, including banking, gold mining, legal advisory, and real estate are particularly vulnerable to money laundering. To address this, Colombian law enforcement, military forces, and intelligence units should enhance existing partnerships with their US counterparts to significantly upscale training and capacity-building with an emphasis on cyber-based illicit transactions. Special attention should be given to small financial cooperatives and credit providers, which are at a higher risk of unwittingly facilitating illegal transactions.

5. Advance the implementation of a holistic bilateral counternarcotic agenda through a careful balance of effective drug policies.

The United States and Colombia should prioritize policies that will mitigate the escalating violence and security challenges Colombia faces. This includes enhanced cooperation efforts on real-time intelligence sharing on drug trafficking including routes, money laundering, and key individuals, and promoting advanced technologies for surveillance, interdiction, and data analytics to combat traffickers. Once the security situation is under control cooperation should focus on making those conditions sustainable through long-term social programs.

6. Work with affected communities to develop an environmentally sustainable approach to transition to legal crop cultivation while mitigating further environmental damage.

The United States could be a key partner in accompanying the Colombian government in shaping the preservation of the Amazon, as it will require restructuring a portion of Colombia’s debt to allocate the saved funds toward initiatives focused on forest preservation, sustainable land use, and community development. To achieve this, both countries can begin by collaborating on a detailed framework that outlines specific conservation targets and reforestation goals to then decide on the allocation of saved debt funds toward a combination of projects, particularly in areas with coca cultivation.

7. Advocate for the creation of a multilateral trust fund that can provide sustained funding for crop substitution and alternative development programs to curb the growing illicit drug-production trend.

Colombia’s new anti-drug strategy carries an estimated cost exceeding $21 billion over the next decade. To secure international support and incentivize donors to contribute to the long-term success of crop substitution and an alternative development program, we propose the establishment of a trust fund led by a recognized international financial institution. Given that the World Bank has a proven track record of efficiently mobilizing resources through trust funds,1 it may be best suited to leverage its extensive convening power on both the international stage and within individual countries.

About the US-Colombia Advisory Group

Since its founding in 2017, the Advisory Group has been co-chaired by Senators Roy Blunt (R-MO) and Ben Cardin (D-MD). This year, upon Senator Blunt’s retirement, Senator Bill Hagerty (R-TN) assumes the honorary chairmanship alongside Senator Cardin.

Senators Cardin and Hagerty are both members of the Senate Foreign Relations Committee, where, in addition to other assignments, Senator Cardin serves as Chairman and Senator Hagerty as Ranking Member of the Subcommittee on State Department & USAID Management, International Operations, & Bilateral International Development. The two senators bring additional regional and global expertise to their honorary co-chairmanship: Senator Cardin is a member of the Subcommittee on Western Hemisphere, Transnational Crime, Civilian Security, Democracy, Human Rights, & Global Women’s Issues; and Senator Hagerty is a member of the Subcommittee on East Asia, The Pacific, & International Cybersecurity Policy.

In 2023-2024, the Advisory Group will provide a concrete plan on how to navigate the potential changes in US-Colombia relations. A new administration in Colombia represents a unique opportunity to work with an increasingly diverse set of actors in the public, private, and civil society sectors to deepen US-Colombia economic and diplomatic ties. The Advisory Group will advance concrete recommendations where the United States and Colombia can advance long-lasting peace and socio-economic prosperity that mutually benefits each country.


About the writers

Geoff Ramsey is a senior fellow at the Atlantic Council’s Adrienne Arsht Latin America Center. Ramsey is a leading expert on US policy towards Venezuela and has traveled regularly to the country for the last decade. Before joining the Atlantic Council, Ramsey directed the Venezuela program at the Washington Office on Latin America where he led the organization’s research on Venezuela and worked to promote lasting political agreements aimed at restoring human rights, democratic institutions, and the rule of law. Prior to that, he carried out research and reporting on security and human-rights issues in Colombia, Uruguay, and Brazil with InSight Crime and as a consultant for the Open Society Foundations. His work has been published or cited in Foreign Policy, the New York Times, the Wall Street Journal, the Washington Post, the Economist, and other major media outlets. Ramsey earned a master’s degree in international affairs from the American University School of International Service, as well as a bachelor of arts in international studies with a minor in Spanish from American University.

Isabel Chiriboga is a program assistant at the Atlantic Council’s Adrienne Arsht Latin America Center, where she contributes to the center’s work on Colombia, Ecuador, Peru and Chile. She also helps steward the Center’s Advisory Council. During her time at the Atlantic Council, she has supported the work of the US-Colombia Advisory Group, the US-Chile Integration Program and the center’s programming around the International Monetary Fund and World Bank meetings. Her work has been published in Foreign Policy, Miami Herald, The National InterestGlobal Americans and the New Atlanticist. Prior to her time at the Atlantic Council, Chiriboga worked as a research assistant at the London School of Economics’ Department of International Relations conducting research on the impact of land inequality in Argentina’s democratization. Prior to that, she worked at the embassy of Ecuador in Washington, where she supported the trade agreement negotiations process between Ecuador and the United States. Originally from Ecuador, Chiriboga has lived in the United States, Spain, and the United Kingdom. She has a bachelor’s degree in international economics and international affairs from Trinity University. Chiriboga also completed a year-long study abroad program at the London School of Economics.  

About the Center Director

Jason Marczak is the Vice President and Senior Director of the Atlantic Council’s Adrienne Arsht Latin America Center, joining the center in 2013 for its launch. He has more than twenty years of expertise in regional economics, politics, and development, working with policymakers and private-sector leaders to shape public policy. Marczak has also been an adjunct professor at the George Washington University’s Elliott School of International Affairs since 2016. Among his previous positions, he served as director of policy at Americas Society/Council of the Americas in New York City and co-founder of Americas Quarterly magazine. Marczak is a frequent English- and Spanish-language contributor to major media outlets, and a sought-after speaker, and has testified before the US Congress on key regional developments. He holds a bachelor’s degree from Tufts University and a master’s degree in international affairs and economics from the Johns Hopkins University Paul Nitze School of Advanced International Studies.


US-Colombia Advisory Group

We are beyond grateful to our US-Colombia Advisory Group members for their passion, commitment, expertise, and leadership. Members who provided crucial input and have decided to have their names associated with this report are listed below.

Honorary Co-Chairs

The Hon. Ben Cardin
US Senator (D-MD)
United States

The Hon. Bill Hagerty
US Senator (R-TN)
United States

Members

Alejandro Mesa

Ambassador Anne Patterson

Ambassador Carolina Barco

Ambassador Kevin Whitaker

Ambassador P. Michael McKinley

Ambassador Paula Dobriansky

Ambassador Rand Beers

Ambassador Roger Noriega

Ambassador William Brownfield

Angela Tafur

Cynthia Arnson

Felipe Ardila

Josefina Klinger

Juan Esteban Orduz

Kristie Pellecchia

Minister Maria Claudia Lacouture

Minister Mabel Torres

Minister Mauricio Cardenas

Michael Shifter

Muni Jensen

Stephen Donehoo

Steve Hege

Acknowledgments

We would like to thank Adrienne Arsht for her generous support, without which the work of this Advisory Group would not have been possible.

Foremost, thank you to Senator Bill Hagerty (R-TN) and Senator Ben Cardin (D-MD) for their leadership as honorary co-chairs of this group. It is always a true pleasure and honor to work with them and to see how successful bipartisan efforts come to fruition. Thank you to Robert Zarate, Nick Checker, Lucas Da Pieve, Michael Manucy, Tom Melia, Brandon Yoder, Stephanie Oviedo, and Aidan Maese-Czeropski for facilitating the unwavering cooperation of our honorary co-chairs.

Isabel Chiriboga, Adrienne Arsht Latin America Center (AALAC) program assistant, was an instrumental force behind this project from start to finish. She played a key role in coordinating the Advisory Group, drafting the report, and organizing multiple strategy sessions. We also thank Enrique Millán-Mejía, AALAC consultant, who provided crucial expertise, important feedback, and logistical support for this project, and Lucie Kneip for her research and editorial support throughout the publication process. The success of this project is also thanks to the leadership of Jason Marczak and Geoff Ramsey, who worked to convene the Advisory Group and whose passion for a prosperous US-Colombia strategic partnership is reflected in this brief.

For decisive input, thorough research, and as an exceptional adviser on the topic we thank Ambassador Kevin Whitaker. For their precise editorial assistance and flexibility, we thank Cate Hansberry and Mary Kate Aylward and Beverly Larson. We would also like to extend our thanks to Nancy Messieh, Andrea Ratiu, and Romain Warnault for their design of another Adrienne Arsht Latin America Center publication.

The Adrienne Arsht Latin America Center broadens understanding of regional transformations and delivers constructive, results-oriented solutions to inform how the public and private sectors can advance hemispheric prosperity.

The post Advancing US-Colombia cooperation on drug policy and law enforcement appeared first on Atlantic Council.

]]>
Jo quoted in BBC on suspension of ROK-DPRK military pact https://www.atlanticcouncil.org/insight-impact/in-the-news/jo-quoted-in-bbc-on-suspension-of-rok-dprk-military-pact/ Fri, 24 Nov 2023 21:30:52 +0000 https://www.atlanticcouncil.org/?p=715601 On November 22, IPSI nonresident senior fellow Bee Yun Jo was quoted in a BBC article on South Korea’s partial suspension of a 2018 military pact with North Korea following Pyongyang’s recent spy satellite launch. On November 23, Jo was quoted in another BBC article on North Korea’s promise to fully suspend the pact, explaining […]

The post Jo quoted in BBC on suspension of ROK-DPRK military pact appeared first on Atlantic Council.

]]>

On November 22, IPSI nonresident senior fellow Bee Yun Jo was quoted in a BBC article on South Korea’s partial suspension of a 2018 military pact with North Korea following Pyongyang’s recent spy satellite launch. On November 23, Jo was quoted in another BBC article on North Korea’s promise to fully suspend the pact, explaining that “because North Korea was not adhering to the agreement in the first place, the possibility of limited collision has always been there.”

The post Jo quoted in BBC on suspension of ROK-DPRK military pact appeared first on Atlantic Council.

]]>
Rich Outzen joins WION News on Gaza information war https://www.atlanticcouncil.org/insight-impact/in-the-news/rich-outzen-joins-wion-news-on-gaza-information-war/ Wed, 15 Nov 2023 14:14:08 +0000 https://www.atlanticcouncil.org/?p=720213 The post Rich Outzen joins WION News on Gaza information war appeared first on Atlantic Council.

]]>

The post Rich Outzen joins WION News on Gaza information war appeared first on Atlantic Council.

]]>
Roberts featured as guest on San Francisco Experience podcast https://www.atlanticcouncil.org/insight-impact/in-the-news/roberts-featured-as-guest-on-san-francisco-experience-podcast/ Fri, 20 Oct 2023 19:06:30 +0000 https://www.atlanticcouncil.org/?p=715529 On October 19, IPSI/GCH nonresident senior fellow Dexter Tiff Roberts spoke on an episode of the San Francisco Experience podcast, where he discussed the recent meeting of the Five Eyes intelligence chiefs in Silicon Valley. He explained that this unprecedented meeting was a response to a massive push in Chinese espionage to steal cutting-edge technology. […]

The post Roberts featured as guest on San Francisco Experience podcast appeared first on Atlantic Council.

]]>

On October 19, IPSI/GCH nonresident senior fellow Dexter Tiff Roberts spoke on an episode of the San Francisco Experience podcast, where he discussed the recent meeting of the Five Eyes intelligence chiefs in Silicon Valley. He explained that this unprecedented meeting was a response to a massive push in Chinese espionage to steal cutting-edge technology. With the PRC ramping up its espionage efforts against tech companies, he explained that this meeting was a warning call to these companies to put anti-espionage protections in place immediately. 

The post Roberts featured as guest on San Francisco Experience podcast appeared first on Atlantic Council.

]]>
Cartin quoted in Politico on Huawei use in Germany https://www.atlanticcouncil.org/insight-impact/in-the-news/cartin-quoted-in-politico-on-german-huawei-use/ Mon, 16 Oct 2023 19:35:53 +0000 https://www.atlanticcouncil.org/?p=707689 On October 15, IPSI nonresident senior fellow Josh Cartin was quoted in a Politico article on continued attempts by the United States to convince Germany to curb its use of Huawei technology. Cartin explained that “having a Chinese company that is strongly susceptible to the [Communist Party of China] leading the globe in a foundational […]

The post Cartin quoted in Politico on Huawei use in Germany appeared first on Atlantic Council.

]]>

On October 15, IPSI nonresident senior fellow Josh Cartin was quoted in a Politico article on continued attempts by the United States to convince Germany to curb its use of Huawei technology. Cartin explained that “having a Chinese company that is strongly susceptible to the [Communist Party of China] leading the globe in a foundational technology was not only a security problem, but a major economic problem.”  

The post Cartin quoted in Politico on Huawei use in Germany appeared first on Atlantic Council.

]]>
Atkins on Industrial Cybersecurity Pulse podcast https://www.atlanticcouncil.org/insight-impact/in-the-news/atkins-on-industrial-cybersecurity-pulse-podcast/ Sat, 14 Oct 2023 20:54:08 +0000 https://www.atlanticcouncil.org/?p=707772 On October 13, IPSI nonresident senior fellow Victor Atkins spoke on an episode of the Industrial Cybersecurity Pulse Cybersecurity Awareness Month podcast series. He discussed issues such as patching organizational and personal cyber vulnerabilities, IT/OT integration, and emerging technologies such as AI and machine learning. Atkins noted that with the increasing automation of critical infrastructure […]

The post Atkins on Industrial Cybersecurity Pulse podcast appeared first on Atlantic Council.

]]>

On October 13, IPSI nonresident senior fellow Victor Atkins spoke on an episode of the Industrial Cybersecurity Pulse Cybersecurity Awareness Month podcast series. He discussed issues such as patching organizational and personal cyber vulnerabilities, IT/OT integration, and emerging technologies such as AI and machine learning. Atkins noted that with the increasing automation of critical infrastructure sectors from communications to shipping, the target for cyberattacks is increasing; however, he explained, private-sector threat intelligence entities are increasing opportunities to discover and respond to these threats. 

The post Atkins on Industrial Cybersecurity Pulse podcast appeared first on Atlantic Council.

]]>
Nusairat in ISPI: Jordan: internal security first  https://www.atlanticcouncil.org/insight-impact/in-the-news/nusairat-in-ispi-jordan-internal-security-first/ Fri, 13 Oct 2023 21:35:23 +0000 https://www.atlanticcouncil.org/?p=693916 The post Nusairat in ISPI: Jordan: internal security first  appeared first on Atlantic Council.

]]>

The post Nusairat in ISPI: Jordan: internal security first  appeared first on Atlantic Council.

]]>
Wechsler mentioned in Formiche on the Israel-Hamas war https://www.atlanticcouncil.org/insight-impact/in-the-news/wechsler-mentioned-in-formiche-on-the-israel-hamas-war/ Tue, 10 Oct 2023 18:28:46 +0000 https://www.atlanticcouncil.org/?p=689737 For the American think tanker, there are a number of questions — from the future of the Strip to new fronts, from regional integration to domestic politics — that Israel is asking itself in deciding the timing and methods of the counter-offensive against Hamas

The post Wechsler mentioned in Formiche on the Israel-Hamas war appeared first on Atlantic Council.

]]>

For the American think tanker, there are a number of questions — from the future of the Strip to new fronts, from regional integration to domestic politics — that Israel is asking itself in deciding the timing and methods of the counter-offensive against Hamas

From a purely military point of view, Hamas lost the war the moment it decided to start it. Israel is a far superior power, and in the aftermath of the terrorist attacks by Hamas, the Israeli public appears deeply shocked, incredibly united and firmly resolute in the work to be done.

William F. Wechsler

The post Wechsler mentioned in Formiche on the Israel-Hamas war appeared first on Atlantic Council.

]]>
Eftimiades in South China Morning Post and The Wire China https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-in-south-china-morning-post-and-the-wire-china/ Tue, 10 Oct 2023 17:48:19 +0000 https://www.atlanticcouncil.org/?p=691564 Nicholas Eftimiades discusses the role of intelligence operations in the strategic competition between the United States and China.

The post Eftimiades in South China Morning Post and The Wire China appeared first on Atlantic Council.

]]>

On October 7, Forward Defense nonresident senior fellow Nicholas Eftimiades was quoted in South China Morning Post discussing the role of intelligence operations in the strategic competition between the United States and China.

He was also quoted in The Wire China, highlighting the geopolitical implications of commercial competition over communications satellites.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades in South China Morning Post and The Wire China appeared first on Atlantic Council.

]]>
Donovan quoted by Energy Intelligence on US response to Russia’s LNG https://www.atlanticcouncil.org/insight-impact/in-the-news/donovan-quoted-by-energy-intelligence-on-us-response-to-russias-lng/ Thu, 28 Sep 2023 20:28:39 +0000 https://www.atlanticcouncil.org/?p=688606 Read the full article here.

The post Donovan quoted by Energy Intelligence on US response to Russia’s LNG appeared first on Atlantic Council.

]]>
Read the full article here.

The post Donovan quoted by Energy Intelligence on US response to Russia’s LNG appeared first on Atlantic Council.

]]>
Cynkin interviewed by Yonhap News on intelligence approaches to Russia-North Korea partnership https://www.atlanticcouncil.org/insight-impact/in-the-news/cynkin-interviewed-by-yonhap-news-on-intelligence-approaches-to-russia-north-korea-partnership/ Tue, 19 Sep 2023 17:32:00 +0000 https://www.atlanticcouncil.org/?p=685112 On September 17, IPSI nonresident senior fellow Thomas Cynkin was quoted in Yonhap News. Cynkin suggested that the United States may benefit from declassifying and disclosing more information related to trade activity between North Korea and Russia, as it did with intelligence on Russian military action prior to the invasion of Ukraine. He explained that […]

The post Cynkin interviewed by Yonhap News on intelligence approaches to Russia-North Korea partnership appeared first on Atlantic Council.

]]>

On September 17, IPSI nonresident senior fellow Thomas Cynkin was quoted in Yonhap News. Cynkin suggested that the United States may benefit from declassifying and disclosing more information related to trade activity between North Korea and Russia, as it did with intelligence on Russian military action prior to the invasion of Ukraine. He explained that this approach could help prevent North Korea from acquiring Russian military technology by creating international pressure on Russia to uphold international nonproliferation laws. 

The post Cynkin interviewed by Yonhap News on intelligence approaches to Russia-North Korea partnership appeared first on Atlantic Council.

]]>
Warrick in The Hill on the Foreign Intelligence Surveillance Act https://www.atlanticcouncil.org/insight-impact/in-the-news/warrick-in-the-hill-on-the-foreign-intelligence-surveillance-act/ Mon, 04 Sep 2023 18:51:41 +0000 https://www.atlanticcouncil.org/?p=680692 Thomas S. Warrick discusses renewing section 702 of the Foreign Intelligence Surveillance Act

The post Warrick in The Hill on the Foreign Intelligence Surveillance Act appeared first on Atlantic Council.

]]>

On September 3, Forward Defense nonresident senior fellow Thomas S. Warrick published an article in The Hill on the importance of renewing section 702 of the Foreign Intelligence Surveillance Act.

Before Dec. 31, Congress should renew, with reforms, section 702 of the Foreign Intelligence Surveillance Act, which authorizes targeted collection of communications by foreign terrorists and other foreign adversaries.

Thomas S. Warrick

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Warrick in The Hill on the Foreign Intelligence Surveillance Act appeared first on Atlantic Council.

]]>
How modern militaries are leveraging AI https://www.atlanticcouncil.org/in-depth-research-reports/report/how-modern-militaries-are-leveraging-ai/ Mon, 14 Aug 2023 13:00:00 +0000 https://www.atlanticcouncil.org/?p=663286 Tate Nurkin and Julia Siegel explore the implications of incorporating artificial intelligence into military operations and the challenges of the US Department of Defense's adoption of human-machine teaming.

The post How modern militaries are leveraging AI appeared first on Atlantic Council.

]]>

Table of contents

The importance of human-machine teaming and key insights

Modern militaries must embrace HMT or risk conceding military edge to competitors effectively leveraging AI and autonomy.

Machines are becoming ubiquitous across the twenty-first-century battlespace, and modern militaries must embrace human-machine teaming (HMT) or risk conceding military edge to competitors effectively leveraging artificial intelligence (AI) and autonomy.1 This report investigates the implications of the increasing incorporation of AI into military operations with a particular focus on understanding the parameters, advantages, and challenges to the US Department of Defense’s (DOD’s) adoption of the concept of HMT.2

Key takeaways

Looking through the lens of three military applications for HMT, the authors arrive at the following conclusions.

  • HMT has the potential to change warfare and solve key operational challenges: AI and HMT could potentially transform conflict and noncombat operations by increasing situational awareness, improving decision-making, extending the range and lethality of human operators, and gaining and maintaining advantage across the multi-domain fight. HMT can also drive efficiencies in many supporting functions such as logistics, sustainment, and back-office administration, reducing the costs and timelines of these processes and freeing up humans to carry out higher-value tasks within these mission areas.
  • DOD must expand its definitions for HMT: Definitions of HMT should be expanded to include the breadth of human interactions with autonomous uncrewed systems and AI agents, including those that have no physical form (e.g., decision support software). Extending the definition beyond interactions between humans and robots allows DOD to realize the wide-ranging use cases for HMT—ranging from the use of lethal weapon systems and drone swarms in high-intensity warfare to leveraging algorithms to fuse data and realize virtual connections in the information domain.
  • HMT development and employment must prioritize human-centric teaming: AI development is moving at an impressive pace, driving potential leaps ahead in machine capability and placing a premium on ensuring the safety, reliability, and trustworthiness of AI agents. As much attention must be dedicated to developing the competencies, comfort levels, and trust of human operators to effectively exploit the value of HMT and ensure humans stay at the center of human-machine teams.
  • DOD must move from the conceptual to the practical: HMT as a concept is gaining momentum within some elements of the DOD enterprise. Still, advocates for increased AI and HMT adoption stress the need to move the conversation from the conceptual to the practical—transitioning capability development into the real-time testing and employment of HMT capabilities, as has been demonstrated by the Navy’s experimentation with AI through Task Force 59—to better articulate and demonstrate the operational advantages HMT can deliver.
  • Experimentation is crucial to building trust: Iterative, real-world experimentation in which humans develop new operational concepts, test the limits of their machine teammates, and better understand their breaking points, strengths, and weaknesses of machines in a range of environments will play a key role in speeding HMT adoption. This awareness is also essential to human operators as they develop the trust in their AI teammates required to effectively capitalize on the potential of HMT.
  • DOD must address bureaucratic challenges to AI adoption: DOD’s risk-averse culture and siloed bureaucracy is slowing acquisition, experimentation, and adoption of HMT concepts and capabilities. Increasing the agility and flexibility of the acquisition process for HMT capabilities, iterative experimentation, incentives to take on risks, and digital literacy across the force are necessary to overcome these adoption challenges.
The Legged Squad Support System is experimental technology being tested by the Marine Corps Warfighting Lab. It is programmed to follow an operator through terrain, carrying heavy loads like water and food. Credit: US Marine Corps, Matthew Callahan: https://www.dvidshub.net/image/1445811/meeting-ls3-marines-experiment-with-military-robotics.

Definitions and components of HMT

HMT refers to the employment of AI and autonomous systems alongside human decision-makers, analysts, operators, and watchkeepers. HMT combines the capabilities of intelligent humans and machines in concert to achieve a military outcome. At its core, HMT is a relationship with four equally important elements:

  • Human(s): An operator (or operators) that provides inputs for and tests machines, as well as leverages their outputs;
  • Machine(s): Ranging from an AI and machine learning (ML) algorithm to a drone swarm, the machine holds a degree of agency to make determinations and supports a specified mission; and
  • Interaction(s): The way in which the human(s) and machine(s) interface to meet a shared mission.
  • Interface(s): The mechanisms and displays through which humans interact with machines.

Back to top

Applications of human-machine teaming

HMT is most frequently envisioned narrowly as the process of humans interacting with anywhere from one to several hundred or more autonomous uncrewed systems. In its most basic form, this vision of HMT is not new: Humans have collaborated with intelligent machines for decades—with early machine talents epitomized in 1997 by supercomputer Deep Blue defeating world champion Gary Kasparov in a game of chess—and militaries have long tested concepts to move the needle in this critical capability. The recent impressive pace of development in AI as well as in robotics, however, is driving increased consideration of the new capabilities, efficiencies, and advantages these technologies can enable.

The “loyal wingman” concept is a frequently cited example of this manifestation of HMT in which a human pilot controls the tasking and operations of a handful of relatively inexpensive, modular, attritable autonomous uncrewed aerial systems (UAS). These wingman aircraft can fly forward of the crewed aircraft to carry out a range of missions, including electronic attack or defense, intelligence, surveillance, and reconnaissance (ISR), or strike, or as decoys to attract fire away from other assets and “light up” enemy air defenses.

Interest in this manifestation of HMT has increased not just in the United States but also in most modern militaries. In addition to the United States, Australia, China, Russia, the United Kingdom, Turkey, and India all have at least one active loyal wingman development program, while the sixth-generation fighter efforts Global Combat Air Programme (United Kingdom, Italy, Japan), Next Generation Air Dominance programs (US Air Force and Navy), and Future Combat Air System (Germany, France, Spain) involve system of systems concepts of airpower that stress both HMT and machine-machine teaming.

As important as this category of HMT is and will continue to be to emerging military capabilities, discussion of HMT should include the full breadth of human interaction with AI agents (which learn from and make determinations based on their environments, experiences, and inputs), including the overwhelming majority of interactions that occur with algorithms that possess no physical form. Project Maven is one example of how DOD and now the National Geospatial-Intelligence Agency use this category of HMT to autonomously detect, tag, and trace objects or humans of interest from various forms of media and collected intelligence, enabling human analysts and operators to prioritize their areas of focus.

HMT can provide multiple layers of overlapping advantages to the United States and its allies and partners.

Beyond imagery analysis and target identification, nonphysical manifestations of HMT can support a range of important tasks such as threat detection and data processing and analysis. It is essential to military efficacy in operational environments marked by significant increases in speed, complexity, and available data. They also can generate efficiencies in logistics and sustainment, training, and back-office administrative tasks that reduce costs and timelines for execution.

By combining the processing power and decision support capabilities of AI with the social intelligence and judgment of humans and, in some cases, the force-multiplying effects of uncrewed systems with different degrees of autonomy, HMT can provide multiple layers of overlapping advantages to the United States and its allies and partners, including those high-level advantages listed in Figure 1.

Figure 1: High-level description of three layers of HMT value.

These values are already being acknowledged and recognized in some parts of DOD, though they are likely to intensify or expand as technologies and concepts associated with HMT progress. Source: Tate Nurkin. Images from Microsoft Icons database.

DOD recognition of the current and future multilayered value of HMT as part of broader efforts to “accelerate the adoption of AI and the creation of a force fit for our time” has increased. Still, several persistent challenges to adoption of AI and HMT endure throughout the Pentagon. To accelerate and deepen HMT adoption, the DOD must commit to an approach that aligns development efforts and private sector engagement, creating flexibility for acquisition officials to scale HMT solutions across the defense enterprise. This approach must be complemented by:

  • Continued and increased focus on building trust between humans and machine partners;
  • Leading in establishing best practices and norms around ethics and safety;
  • Aggressive and iterative experimentation; and
  • Clear and consistent messaging

These elements are crucial to realizing the value and advantages HMT can deliver across the multi-domain future fight.

Back to top

Demonstrating advantage through use cases

Use cases serve as a means of better understanding how HMT can provide value and lead to advantage in and across several missions and environments. Certainly, practitioners have seen or experienced use cases in various settings—including through war games and analysis of the ongoing war in Ukraine—and the slow nature of HMT adoption may call into question the utility of use cases. Still, highlighting the varied and, in certain instances, underappreciated applications of HMT can help demonstrate the different contexts in which HMT acts as a force multiplier and how this capability can support the US military in meeting the demands of the modern battlefield.

However, changing the perceptions of HMT across a large organization such as DOD is an iterative task and requires the frequent reinforcement of its value, especially as the technologies and concepts supporting HMT create new or enhanced opportunities. The three use cases discussed below are far from inclusive—our workshops and research explored several other compelling use cases—but the authors chose them because they reflect the layered value of HMT in serving missions and meeting operational threats and challenges being urgently considered by defense planners, as described in Table 1.3

Table 1: A high-level review of the advantages of each of the case studies discussed in this briefing.

Use cases of HMTKey advantages
A2/AD conflictThe use of masses of expendable and attritable systems to penetrate A2/AD environments, sustain forces, and extend the range of effects from crewed platforms operating outside A2/AD cordons.

Finding, fixing, and tracking key nodes and threats in a data-rich environment.

Providing situational awareness at the edge.
Sense-making and targetingEnhancing situational awareness and threat detection through data processing and fusion improves situational awareness and threat detection and ensures decisions are made at the speed of relevance.

Finding connections that human analysts and operators did not know were present.

Supporting humans in target identification and prioritization across domains.

Improving precision of effects by recommending to human decision-makers the most applicable kinetic or non-kinetic weapon to engage targets.
Presence, prioritization, and deterrenceExtending the range of high-value crewed assets through the use of ISR meshes that incorporate several uncrewed systems.

Identifying anomalies and disruptions in activity patterns across geographically dispersed theaters.

Prioritizing threats and ensuring efficient resource allocation based on AI-driven assessments.

Aggressive and iterative experimentation in real-world environments builds trust between operators and their machine partners.

Anti-access and area-denial (A2/AD): Coping with mass, range, and attrition

Determining how to conduct operations in an A2/AD environment is a clear priority for defense planners. This is especially the case in the Indo-Pacific, where the military modernization effort of the People’s Republic of China has emphasized utilizing pervasive multi-domain sensors and a surfeit of kinetic and non-kinetic strike assets to establish cordons in which US and allied forces are highly vulnerable to enemy fires and, in the worst-case scenario, unable to operate effectively.

HMT will not mitigate all risks of operating against robust A2/AD systems, though it can help US and allied forces better manage these risks in several ways, including in processing and analyzing large and complex datasets to support better and faster human decision-making.

Teaming uncrewed systems, crewed assets, and human operators

Reducing risk to human operators does not mean eliminating this risk, and the use of attritable uncrewed aerial systems (UAS) and uncrewed surface vehicles (USVs) will still incur costs.

The use of attritable and expendable uncrewed systems, in conjunction with crewed assets and human controllers and decision-makers, can achieve several important objectives in the A2/AD context. Most notably, these smaller, less expensive, generally modular systems can be used to saturate A2/AD systems, identify enemy defenses, and force adversaries to expend their deep stores of munitions—all while extending the operating range of higher-value crewed and uncrewed assets and reducing the risks to crewed assets and their human operators.

The use of attritable and expendable uncrewed systems, in conjunction with crewed assets and human controllers and decision-makers, can achieve several important objectives in the A2/AD context.Attritable or reusable systems are those that are considerably lower cost than higher-end uncrewed systems such as the MQ-9 Reaper.4 Most notably, these smaller, less expensive, generally modular systems can be used to saturate A2/AD systems, identify enemy defenses, and force adversaries to expend their deep stores of munitions—all while extending the operating range of higher-value crewed and uncrewed assets and reducing the risks to crewed assets and their human operators.

To that end, reducing risk to human operators does not mean eliminating this risk, and the use of attritable uncrewed aerial systems (UAS) and uncrewed surface vehicles (USVs) will still incur costs. Moreover, even attritable systems and their payloads can be worth several million dollars. New calculations of value as well as increased capacity to reconstitute systems must keep pace with expected levels of attrition to ensure the right sizing of HMT-enabling force structures.

Sense-making and decision support: Enhanced situational awareness and improved decision-making at the pace of relevance

The A2/AD environment also serves as an example of how machines can support humans in the crucial and increasingly demanding task of sense-making—the art of interpreting and fusing data for enhanced decision-making.

Sense-making in A2/AD environments

A2/AD environments will be characterized by an abundance of complex datasets and both signal and noise across domains including in the electromagnetic spectrum. The amount of data available to operators will be overwhelming. Multi-domain sensors and surveillance and strike assets will be actively operating and engaging with both friendly and adversary forces, creating a need for AI agents to help process and filter data and feed relevant information back to the warfighter. The result will be to improve the quality and speed at which human operators filter data and then fix and track critical nodes in adversary A2/AD systems. This high-level A2/AD example reveals one context in which AI-enabled data fusion and processing of complex datasets can increase situational awareness and speed up decision-making. But the applications of this sense-making are impressively broad, including in increasing the speed and precision of identifying targets, determining appropriate kinetic or non-kinetic weapons to use to strike the target, and ensuring precision of effects.

Targeting: Joint all-domain command and control (JADC2)

Marine Corps Forces Cyberspace Command observe computer screens in the cyber operations center at Fort Meade. Credit: US Marine Corps, Jacob Osborne, https://www.315aw.afrc.af.mil/News/Photos/igphoto/2002752944/.

DOD’s “connect everything” JADC2 effort offers another example of how HMT can be applied to support improved targeting and speeding up sensor-to-shooter processing. As a January 2022 Congressional Research Service report observed, “JADC2 intends to enable commanders to make better decisions by collecting data from numerous sensors, processing the data using AI algorithms to identify targets, then recommending the optimal weapon—both kinetic and non-kinetic—to engage the target.” While JADC2 is still largely a concept rather than an architecture for future military operations, the US military is already using AI to help find and track possible targets or entities of interest on the battlefield. In September 2021, Secretary of the US Air Force Frank Kendall acknowledged that the Air Force had “deployed AI algorithms for the first time to a live operational kill chain” to provide “automated target recognition.” Kendall noted that by doing so, the Air Force hoped to “significantly reduce the manpower-intensive tasks of manually identifying targets—shortening the kill chain and accelerating the speed of decision-making.”

AI in the intelligence field

Sense-making through human-machine teams is also shaping the future of disciplines such as intelligence analysis and mission planning (see sidebar below), in which AI-enabled data fusion, pattern and anomaly detection, and research and analysis support are helping analysts manage and exploit the explosion in available sources and data. Tasks that would take days for humans to perform can now be performed in hours, allowing humans to concentrate on the most relevant pieces of information derived from large datasets. For example, through the war in Ukraine, the Ukrainian Armed Forces are already using natural language processing tools that leverage AI to translate and analyze intercepted Russian communications, saving analysts time and allowing them to focus on key messages and intelligence. The use of AI is not only speeding up analysis but also demonstrating value in bringing “unknown knowns”—observed but ignored or forgotten connections, insights, and information—to the attention of an analyst and articulating the value or quality of information to the human decision-maker.5

Large language models for intelligence and planning activities

The release of Chat GPT-4 in March 2023 has led to discussion of how DOD can leverage similar large language model (LLM) tools to support intelligence activities. There is understandable concern that the current sophistication of LLMs and their tendency to “hallucinate”—make up information that is incorrect—would make extensive use or reliance on these tools premature, or even counterproductive.

However, experimentation with LLMs would be useful in better understanding where and how these tools can add value, especially as they become more reliable. An April 2023 War on the Rocks article detailed how the US Marine Corps’ School of Advanced Warfighting is using war games to explore how LLMs can assist humans in military planning. These systems were used to provide, connect, and visualize different layers of information and levels of analysis—such as strategic-level understanding of regional economic relationships and more-focused analysis of dynamics in a specific country—which planners then used to refine possible courses of action and better understand the adversary’s system.

Tasks that would take days for humans to perform can now be performed in hours, allowing humans to concentrate on the most relevant pieces of information derived from large datasets.

In January 2023, the Intelligence Advanced Research Projects Activity (IARPA), situated within the Office of the Director of National Intelligence, announced a program known as REASON (Rapid Explanation, Analysis, and Sourcing Online). The program will use AI-enabled software to improve human-authored intelligence assessment products. The software reviews human-authored reporting and automatically generates recommendations for additional sources the human may not be aware of or did not use and also offers suggestions of how to improve the analytical quality of the report, performing the role of an autonomous red-team reviewer. This program offers a step in the right direction, demonstrating one of many ways in which AI can help humans make connections between data and sources and improve analysis and decision-making.6

Presence, prioritization, and deterrence: Coping with distance and complexity

The US military faces significant, varied, and frequently dispersed challenges across its geographic combatant commands. Take, for example, US Indo-Pacific Command (INDOPACOM). INDOPACOM covers more of the globe than any other combatant command and is home to the DOD’s “pacing challenge” of China, a range of potential military and geopolitical hot spots, several US allies and partners, and a growing list of security challenges. While differing in its prioritization, US Central Command (CENTCOM) is similarly complex in nature. CENTCOM covers nearly 4 million square miles, an area that includes key waterways and shipping lanes, active conflicts, ethnic and sectarian violence, and a diverse set of threats to regional security and US national interests.

HMT offers a solution to meet an increasingly sophisticated threat landscape while operating with insufficient resources.

The Central Command area of responsibility. Source: US Central Command

While each command faces unique problem sets, the size and complexity of today’s security challenges are straining the limited number of forces available to deter, identify, assess, or respond to a fast-moving threat or crisis in a timely manner. HMT offers a solution to meet an increasingly sophisticated threat landscape while operating with insufficient resources.

Exporting Task Force 59: A sandbox for AI experimentation and integration

In September 2021, CENTCOM’s 5th Fleet established Task Force 59—the Navy’s testing ground for unmanned systems and AI—to experiment with teaming human operators and both smart robots and AI agents to increase presence across the region, provide persistent and expanded maritime domain awareness (MDA), and prioritize threats for in-demand crewed and high-value assets.

Task Force 59’s experimentation efforts combine AI and uncrewed systems—particularly USVs but also vertical take-off and landing UAS, which are valuable in expanding the coverage of the Navy’s ISR networks in the region—and are further amplified by cooperation with partners and allies. In comments at the February 2023 International Defence Conference in Abu Dhabi, 5th Fleet Commander Vice Admiral Brad Cooper explained that each of the small USVs with which Task Force 59 is experimenting can extend the range of ISR networks by thirty kilometers, meaning that even a modest investment in smart uncrewed systems can deliver a significant increase in MDA.7

A MANTAS T-12 unmanned surface vessel operates alongside a US Coast Guard patrol boat during exercise New Horizon, which was Task Force 59’s first at-sea evolution since its establishment. Credit: US Central Command https://www.centcom.mil/MEDIA/IMAGERY/igphoto/2002880797/.

AI agents then process the millions of data points collected by the uncrewed systems to create an understanding of normal patterns of life, which, in turn, serves as a baseline for AI agents to identify anomalies that require further investigation by human operators and watchkeepers. In doing so, human-machine teams can cultivate a deeper understanding of the operational environment, moving toward a predictive model in which the DOD can possibly anticipate and prevent future threats and prioritize allocation of limited resources to areas that AI agents determined are most vulnerable to disruption.

Building on the success of the Navy’s Task Force 59, both the Army and Air Force components of CENTCOM have stood up task forces to experiment with emerging technology and HMT concepts. The Army component, Task Force 39, was established in November 2022 to advance experimentation in counter-small UAS solutions that can be scaled not just within CENTCOM environments but across the DOD. The Air Force’s Task Force 99 was stood up in October 2022 as an operational task force to pair unmanned and digital technologies to improve air domain awareness in much the same way that Task Force 59 seeks to improve MDA by expanding presence and anticipating emergent threats. Lieutenant General Alexus Grynkewich, commander of CENTCOM’s Air Force component, stated in February 2023 that the objective is “not just tracking objects in the air, but maybe finding things that could be on the ground about to be launched into the air and how those could be a threat to us.”

The applicability of this HMT approach is not limited to CENTCOM; indeed, it is now being adopted in other commands. In April 2023, the US Navy announced the expansion of its experimentation with unmanned and AI tools into US Southern Command’s 4th Fleet to increase MDA awareness in a region with its own particular dynamics, threats, and MDA requirements. Notably, 4th Fleet is taking a different approach to adoption of HMT lessons and new HMT capabilities, deciding to integrate them into its command and staff structure rather than through the standing up of a discrete task force. While these task forces provide valuable models for quickly bringing off-the-shelf technologies to the warfighter, the challenge rests in scaling these solutions across services and domains (and the defense enterprise at large).

Back to top

Pathways to HMT adoption at scale and pace

The pace of AI and HMT technology development has exceeded the capacity of the DOD to adopt these technologies at scale. To more fully realize the advantages of HMT, DOD must:

  • Address several cultural, bureaucratic, and organizational challenges;
  • Ensure continued focus on HMT ethics, safety, and agency;
  • Embrace rapid and realistic experimentation of HMT; and
  • Develop the human component and enhance trust in their machine teammates.

Culture, acquisition, and melting the “frozen middle”

Organizational and cultural constraints radiate across the DOD, affecting the way the enterprise acquires and adopts the technologies, concepts, and capabilities necessary to enable HMT. Innovation and adoption are hindered by DOD’s “frozen middle”—layers of relatively senior military and civilian personnel within DOD bound by an underlying set of inherited assumptions, incentives, and instincts that are resisting the adaptive, collaborative practices necessary for adoption of HMT concepts and capabilities at pace and scale. These organizational layers and bureaucratic proclivities have a cascading effect as they embed in a DOD acquisition system. According to former Secretary of Defense Mark Esper and former Secretary of the Air Force Deborah Lee James, co-chairs of the Atlantic Council’s Commission on Defense Innovation Adoption, the effect is slowing adoption by requiring multiple levels of review “because incentives do not exist to be bold and to move fast.”

Organizational “tribalism” also has an enervating effect on the DOD’s acquisition of key technologies and adoption of HMT-relevant capabilities. Examples of cross-service and cross-command collaboration do exist. Workshop participants highlighted joint projects on AI transparency between service laboratories and the ability of the US Special Operations Command, as a functional command, to work across regions and services. Far more frequently, though, disjointed development and vendor engagement and procurement efforts have been the norm. To achieve the necessary momentum for adoption across DOD—and, most importantly, the salutary outcomes of this adoption—requires an increased willingness to share and subsequently align research, information, development efforts, acquisition models, and best practices across the department and, particularly, the services.

In June 2022, David Tremper, director for electronic warfare in the Office of the Under Secretary of Defense for Acquisition and Sustainment, provided an example of how DOD siloes slow adoption of HMT-enabling capabilities. Tremper highlighted an incident in which the Navy developed an electronic warfare algorithm that was of interest to the Army, though transfer of the algorithm could not take place without a memorandum of understanding (MoU) between the two service’s labs. It took nine months for the lab that developed the algorithm to approve the transfer, and, after eighteen months, the MoU was determined to be inadequate to support the algorithm migration. According to Tremper, “one service just lawyered up against the other . . . and prevented a critical capability . . . from going from one service to another service.” This example highlights the hurdles blocking the services from learning and gaining from one another’s strides in HMT; the cross-service applicability of HMT solutions is critical to avoid a service unnecessarily depleting its resources in a field where its sister service has already paved the way.

An officer places an XRS-150 X-ray generator in front of a simulated downed unmanned aerial system. Credit: US Air National Guard, Brigette Waltermire https://www.dvidshub.net/image/6485647/379th-esfs-and-eod-team-up-counter-uas-training.

To melt this frozen middle and reduce cultural and organizational obstacles to HMT adoption, the DOD must center its efforts around three high-level aims. First, acquisition reform is a necessary and foundational step. The ability to develop, build, and acquire advanced platforms and systems with longer development times remains important to achieving DOD missions. There is also growing and urgent demand for the technologies and capabilities enabling HMT, such as software and lower-cost uncrewed systems, across the Pentagon. The program-centric system used to acquire and develop many advanced platforms—with the development of requirements, budgets, and capabilities completed individually for hundreds of programs—is not optimized for the rapid acquisition of the innovative technologies and capabilities developed by traditional defense suppliers and the commercial sector.

While the objective of this report is not to provide a comprehensive set of recommendations for acquisition reform, two principles are useful in guiding this reform: 1) the need for increased flexibility and agility within the acquisition process, enabling response to changing technologies and requirements; and 2) new incentives that stimulate an enhanced degree of risk tolerance.8

Second, among the workforce setting requirements for and working alongside machine teammates, a lack of understanding surrounding HMT and its applications is slowing adoption. The human element of this equation must be adequately prioritized through recruitment, retention, and training programs. Specifically, DOD must provide its personnel with opportunities to enhance digital literacy and understanding of the technologies, concepts, and applications of HMT capabilities within not just the acquisition force and those that set requirements but also among many senior decision-makers.

The human element of this equation must be adequately prioritized through recruitment, retention, and training programs.

Third, DOD should work to press the limits of existing authorities for “quick wins” in support of rapid acquisition and experimentation, similar to the Task Force 59 model. According to Schuyler Moore, CENTCOM’s chief technology officer, one of the key lessons of command innovation efforts is “that [CENTCOM] can actually work with the existing [authorities] fairly flexibly” and officers must consider “whether or not the authority exists or whether it’s simply never been tried before.9 Officers must be incentivized to use their own ingenuity as a tool for testing new HMT capabilities and demonstrating operational successes.

The human component: Trust and training

Building and calibrating appropriate levels of human trust in AI teammates is essential to HMT adoption across the DOD. This discussion typically begins with several actions designed to ensure the reliability—that is, the trustworthiness—of AI agents, such as establishment and implementation of effective best practices for the design, rigorous testing, iterative experimentation, and deployment of AI-enabled machines. Enhancing data security is another frequently cited component of building trust: Humans cannot trust algorithms if they lack faith in the integrity of the data being processed or used to train the algorithm.

Limitations in AI transparency (i.e., how machines perceive the environments they are in) and explainability (i.e., how machines come to decisions) pose another challenge. While not prohibitive to the employment of HMT in many missions and contexts, reducing the “black box” nature of AI outputs will have a positive impact on the capacity for humans to trust their machine teammates and, in turn, on the pace of adoption for the range of HMT applications.

Increased experimentation—in terms of frequency, rigor, and realism—can enhance the human operator’s understanding of how an AI agent reached a certain conclusion. The DOD must embrace accelerated experimentation across a diverse set of scenarios and use cases. By asking humans to “try to break the technology,” operators and analysts can develop a better understanding of the limits, strengths, and weaknesses of their AI-enabled teammates as well as any possible unexpected behaviors. Rapid and aggressive experimentation in conditions that replicate real-world operational conditions has been a regularly highlighted feature of Task Force 59’s success to date, though there is concern that this practice has not been adopted broadly across DOD.

Human trust in machines, however, is only one part of the discussion of the human component of HMT. At least as much attention should be focused on building up the competencies and confidence of humans to effectively engage with and employ their machine partners. Humans will require just as much preparation and training as their machine teammates to become effective team leaders and to ensure that the value of human-machine teams is realized. In a worst-case scenario, adequate human training will help avoid a circumstance in which ineffectual human engagement with machines (the inability to recognize a hallucinating machine, for example) or unnecessary interference with machine operations could lead to mistakes that carry deleterious tactical, operational, or strategic outcomes. One salient example is seen in the Marine Corps experimentation with LLMs. Experiment organizers noted that the tendency of these models to hallucinate means “falsification is still a human responsibility” and that “absent a trained user, relying on model-produced outputs risks confirmation bias,” risking the potential of individuals “prone to [acting] off the hallucinations of machines.”

Project Convergence is the joint force experimenting with speed, range, and decision dominance to achieve overmatch and inform the Joint Warfighting Concept and Joint All Domain Command and Control. Credit: Army Futures Command, https://www.dvidshub.net/image/7502734/project-convergence-2022-2-yorks-experimanal-company.

This is especially the case in situations in which a general-purpose machine or set of machines is interacting with multiple humans rather than just one human controller. Protocols for determining who is in control, whose priorities are executed, and how to manage contradictory instructions become essential.

Ethics, agency, judgment, and reliability: Maintaining leadership and retaining relevance

DOD efforts to maintain leadership at home and internationally in establishing AI and HMT ethics and safety guidelines should be viewed as a process to follow rather than an end state to be achieved.

Pathways to adoption of HMT at speed and scale do not solely rely on the DOD doing things radically differently or applying new incentives and structures. Rather, they can build on the momentum of ongoing initiatives.

The DOD has already expended commendable energy in understanding and addressing questions of ethics, safety, alignment, and agency—all of which emerged as acute areas of interest and concern during the project workshops. The DOD, in collaboration with other parts of the US government, has been proactive in articulating its positions on key questions of ethics and safety around AI development and use for military purposes since first adopting principles for AI ethics in February 2020. In February 2023, at the conclusion of the Responsible AI in the Military Domain conference, the US Department of State released a “Political Declaration on Responsible Military Use of Artificial Intelligence and Autonomy” as the foundation for the establishment of international norms and standards for the development and use of military AI. The document includes twelve best practices that emphasize concepts such as safe and secure development, extensive testing, and human control and oversight, among others, that endorsing states should implement.

These principles and best practices as well as current laws, policies, and regulations provide a useful foundation for resolving critical questions about agency, such as:

  • Which component of the human-machine teams makes decisions under what circumstances?
  • When might the machine’s judgment supersede that of the commander?
  • What implications will these answers have on recruitment, reskilling, and retention of talent?
  • How does the United States avoid or mitigate tactical events and AI/HMT mistakes that have significant strategic consequences?
  • How do we judge the possible risk of AI-enabled decision-making in kill chains relative to the current and demonstrated risk of human error in these decisions?
A Hyundai Rotem HR-Sherpa uncrewed ground vehicle on display at the International Defence Exhibition & Conference in Abu Dhabi in February 2023. The image behind and above the vehicle demonstrates one operational concept in which a human operator controls and works in tandem with the Sherpa. Training and trust are required to ensure that these concepts are designed and executed in ways that effectively exploit the advantages of HMT. Credit: Tate Nurkin.

Still, as technologies, concepts, applications, and competitions evolve, new questions are likely to be raised. Old practices may need to be iteratively revisited to ensure that adoption efforts remain relevant, current, and appropriate. DOD efforts to maintain leadership at home and internationally in establishing AI and HMT ethics and safety guidelines should be viewed as a process to follow rather than an end state to be achieved.

Understanding knock-on effects of HMT incorporation

DOD adoption of HMT into military operations will elicit responses from competitors and lead to changing risks, competitions, opportunities, and doctrine. For example, the use of HMT-enabled UAS swarms could shift targeting priorities from forward-deployed machines to the human controllers and decision-makers situated well behind contested environments. Another example can be found in the use of an AI-enabled machine to patrol a contested border, which could reduce immediate risk to human life and, as a result, reduce risks of rapid escalation. However, immediate loss of life may not be the only escalation pathway perceived by an adversary. If destroying autonomous systems is lower stakes than firing on humans, how many downed UASs would the United States tolerate? Alternatively, what if the AI-enabled machine recommends or makes a bad decision that leads to an unprovoked loss of life in the adversary state?

The United States and its allies should intensify examination of these types of what-if scenarios associated with HMT adoption. First, to preempt arguments that DOD has not thought through the long-term implications of HMT employment, and then to determine the most efficacious concepts of use and prepare for possible future risks. A combination of iterative tabletop, seminar-style, and live war games and model-based simulations would be especially useful in identifying and preparing for longer-term implications of HMT. These exercises could then inform live testing of HMT concepts and capabilities.

Shaping the narrative around military applications of HMT

Mixed feelings and misperceptions about the DOD’s use of AI and uncrewed systems persist within the defense enterprise and the US polity and society more broadly. Despite an increase in the number of young personnel who are considered to be more intuitively inclined to technological adoption, pockets of stubbornness and contrarianism, and efforts to protect institutional equities, remain throughout the force. In addition, some social and political perspectives on HMT may be skewed by fears of fully autonomous weapons systems and singularities in which AI overcomes human control with devastating consequences. Identifying and managing the variety of strategic, operational, social, and philosophical concerns about accelerating HMT adoption will necessitate a coherent and consistent campaign to shape the narrative around military AI use and HMT. This narrative should stress:

  • The demonstrated and prospective advantages HMT will provide to warfighters and decision-makers, and the budgetary efficiencies that could be gained through deeper adoption of HMT;
  • The measures DOD is taking to ensure the safe and ethical development and use of AI and to build humans’ trust in machines; and
  • The centrality of human agency to human-machine teams.
Army researchers publish a paper suggesting how future soldiers will communicate in complex and autonomous environments. Credit: Army Research Laboratory, T’Jae Ellis, https://www.dvidshub.net/image/6611058/evaluating-human-agent-team-performance.

Back to top

Summary of recommendations and conclusion

The United States’ AI strides are not occurring in a vacuum; if the Pentagon is slow to adopt HMT at scale, it risks conceding military edge to strategic competitors like China that view AI as a security imperative.

HMT offers several advantages to twenty-first-century militaries. As such, the DOD must invest sufficient time and resources to address the challenges to adoption discussed above. Catalyzing HMT adoption will necessitate a combination of new ideas, procedures, and incentives, as well as intensification of promising ongoing adoption acceleration efforts, especially related to the following areas:

  • Developing an enterprise-wide approach to HMT adoption that builds on and provides sufficient money and authority to the establishment of centralized structures such as the Chief Digital and Artificial Intelligence Office to ensure that requirements, capability, infrastructure, and strategy development as well as procurement and vendor engagement are mutually reinforcing across the DOD.
  • Rapid, iterative, and aggressive experimentation in settings that replicate the challenges of a real-world operational environment will facilitate adoption by helping humans test and understand the breaking points of HMT technologies. Different levels of experimentation can also build human trust in their AI teammates necessary to optimize HMT value.
  • Melting the “frozen middle” through reforms that increase incentives for moving quickly, align DOD and congressional reform priorities, and reinforce efforts to ensure an enterprise-wide—rather than service-by-service or command-by-command—approach to HMT adoption. The Atlantic Council Commission on Defense Innovation Adoption has developed several specific recommendation sthat apply to the acquisition and adoption of HMT capabilities.10
  • Articulating and demonstrating the multilayered value of HMT in gaining advantage over competitors and potential adversaries in a future operational environment characterized by significantly increased pace of operations, amount of available data, and complexity of threats.
  • Continuing to lead on issues of agency and ethics by prioritizing the ethical and responsible development and use of trustworthy AI and keeping humans—and human judgment—at the center of human-machine teams. The US government and private sector should revisit and update guidelines around agency and ethics to reflect contemporaneous technology development trends and capabilities.
  • Development of strategic messages that highlight the value and safety of HMT for consumption by DOD and congressional stakeholders as well as American society more broadly.

The United States’ AI strides are not occurring in a vacuum; if the Pentagon is slow to adopt HMT at scale, it risks conceding military edge to strategic competitors like China that view AI as a security imperative. Machines and AI agents are becoming ubiquitous across the twenty-first-century battlespace, and the onus is on DOD to demonstrate, communicate, and realize HMT’s value to achieving future missions and national objectives.

Back to top

Acknowledgements

To produce this report, the authors conducted a number of interviews and workshops. Listed below are some of the individuals consulted and whose insights informed this report. The analysis and recommendations presented here are those of the authors alone and do not necessarily represent the views of the individuals consulted. Moreover, the named individuals participated in a personal, not institutional, capacity. 

  • Maj Ezra Akin, USMC, technical PhD analyst, Commandant’s Office of Net Assessment
  • Samuel Bendett, adjunct senior fellow, Technology and National Security Program, Center for a New American Security
  • August Cole, nonresident senior fellow, Forward Defense, Scowcroft Center for Strategy and Security, Atlantic Council
  • Owen J. Daniels, Andrew W. Marshall fellow, Center for Security and Emerging Technology, Georgetown University
  • Phil Freidhoff, vice president for human centered design projects, 2Mi
  • Dr. Gerald F. Goodwin, senior research scientist, personnel sciences, US Army Research Institute for the Behavioral and Social Sciences
  • Dr. Neera Jain, associate professor, School of Mechanical Engineering, Purdue University
  • LCDR Marek Jestrab, USN, senior US Navy fellow, Forward Defense, Scowcroft Center for Strategy and Security, Atlantic Council
  • Zak Kallenborn, policy fellow, Schar School of Policy and Government, George Mason University
  • Harry Kemsley OBE, president, government and national security, Janes Group
  • Dr. Margarita Konaev, nonresident senior fellow, Forward Defense, Scowcroft Center for Strategy and Security, Atlantic Council
  • Justin Lynch, nonresident senior fellow, Forward Defense, Scowcroft Center for Strategy and Security, Atlantic Council
  • Dr. Joseph Lyons, principal research psychologist, Air Force Research Laboratory
  • Brig Gen Patrick Malackowski, USAF (ret.), director, F-16, conventional weapons, and total force, Lockheed Martin Corporation
  • Col Michelle Melendez, USMC, senior US Marine Corps fellow, Forward Defense, Scowcroft Center for Strategy and Security, Atlantic Council
  • Rob Murray, nonresident senior fellow, Forward Defense, Scowcroft Center for Strategy and Security, Atlantic Council
  • Dr. Julie Obenauer-Motley, senior national security analyst, Johns Hopkins University Applied Physics Lab
  • John T. Quinn II, head, futures branch, concepts and plans division, Marine Corps Warfighting Lab
  • Dr. Laura Steckman, program officer, trust and influence, Air Force Office of Scientific Research

Back to top

Sponsored By

Lockheed Martin

This report was generously sponsored by Lockheed Martin Corporation. The report is written and published in accordance with the Atlantic Council Policy on Intellectual Independence. The authors are solely responsible for its analysis and recommendations. The Atlantic Council and its donors do not determine, nor do they necessarily endorse or advocate for, any of this report’s conclusions.

About the authors

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

1    This paper uses the term human-machine teaming (HMT) to signify both the teaming of human operators with semiautonomous machines (sometimes referred to as manned-unmanned teaming) and interactions between humans and AI agents that do not take physical form.
2    From November 2022 to June 2023, the authors held workshops and interviews with defense and national security experts and practitioners to help inform their research.
3    HMT’s relevance to the future of cognitive and information warfare, anticipatory logistics and resilient sustainment, training, and military medicine were all raised through project interviews and workshops.
4    The generally acknowledged cost range for attritable or reusable aircraft is $2 million to $20 million, though there is no consensus as to whether this cost range includes only the aircraft or also includes mission systems. While designed to be reused, the significantly lower cost of these systems in comparison to high-value uncrewed systems and advanced crewed systems means that they can be placed into contested environments in advance of more-expensive platforms with a considerably reduced risk to force structure cost, especially if paired with in-theater means of reconstituting these systems. Expendable systems are even lower cost than attritable systems and are most often designed for a single use. Loitering munitions are one category of expendable uncrewed systems.
5    Phone interview with Harry Kemsley, president of Government and National Security, Janes, January 31, 2023.
6    Phone interview with Harry Kemsley, president of Government and National Security, Janes, January 31, 2023.
7    One of the authors, Tate Nurkin, attended the conference on February 19, 2023, and moderated the panel in which these comments were made
8    In April 2023, the Atlantic Council’s Commission on Defense Innovation Adoption released its interim report, which offers actionable recommendations to engender these changes. Lofgren et al., Atlantic Council Commission on Defense Innovation Adoption Interim Report.
9    “US Central Command Chief Technology Officer Schuyler Moore and Innovation Oasis Winner Sgt. Mickey Reeve Press Briefing,” US Central Command”.
10    Lofgren et al., Atlantic Council Commission on Defense Innovation Adoption Interim Report

The post How modern militaries are leveraging AI appeared first on Atlantic Council.

]]>
Bayoumi in The Globe and Mail and Canadian Forces College discussing Canada’s need for an updated national security strategy https://www.atlanticcouncil.org/insight-impact/in-the-news/bayoumi-in-the-globe-and-mail-discussing-canadas-need-for-an-updated-national-security-strategy/ Thu, 03 Aug 2023 17:30:59 +0000 https://www.atlanticcouncil.org/?p=669893 Imran Bayoumi authors an article for The Globe and Mail discussing Canada's imperative for an updated National Security Strategy.

The post Bayoumi in The Globe and Mail and Canadian Forces College discussing Canada’s need for an updated national security strategy appeared first on Atlantic Council.

]]>
original source

On August 3, Scowcroft Strategy Initiative Assistant Director Imran Bayoumi authored a Globe and Mail piece arguing for the need to update Canada’s National Security Strategy to accompany the recent creation of a National Security Council. Not only will an updated strategy help define what the present government perceives as a threat, Bayoumi argues, but it can also serve as a much-needed guide for resource allocation between the various agencies responsible for national defense and intelligence activities. The article was featured on Canadian Forces College’s Spotlight on Military News and International Affairs.

The most recent Canadian national security strategy was released in 2004, and it is a document now vastly out of touch with the current threat environment. That strategy posited terrorism as the primary threat facing Canada, a previously accurate but now outdated notion. An updated national security strategy must touch on the current threats affecting Canada’s security, such as great-power competition, Russia’s war in Ukraine, and China’s repeated interference in Canadian politics.

Imran Bayoumi

The post Bayoumi in The Globe and Mail and Canadian Forces College discussing Canada’s need for an updated national security strategy appeared first on Atlantic Council.

]]>
Cheverton in War on the Rocks on enhancing allied defense cooperation https://www.atlanticcouncil.org/insight-impact/in-the-news/cheverton-in-war-on-the-rocks-on-enhancing-allied-defense-cooperation/ Mon, 24 Jul 2023 18:59:02 +0000 https://www.atlanticcouncil.org/?p=672564 Deborah Cheverton identifies the three main areas in US defense strategy to improve integrated deterrence and US-allied cooperation.

The post Cheverton in War on the Rocks on enhancing allied defense cooperation appeared first on Atlantic Council.

]]>

On July 24, Forward Defense visiting senior fellow Deborah Cheverton co-authored a commentary in War on the Rocks identifying three areas of reform for US-allied defense cooperation: information sharing, export and technology controls, and joint strategic planning.  The authors discussed how integrated deterrence can be enhanced by better coordination in these areas, especially through flagship initiatives like AUKUS.  

Without bold action by military leaders, the administration, and Congress, the “allies and partners” strand of the National Defense Strategy will remain a bumper-sticker slogan rather than a real source of advantage in the strategic competition with U.S. adversaries

Deborah Cheverton

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Cheverton in War on the Rocks on enhancing allied defense cooperation appeared first on Atlantic Council.

]]>
Putin’s biggest mistake was believing Ukrainians were really Russians https://www.atlanticcouncil.org/blogs/ukrainealert/putins-biggest-mistake-was-believing-ukrainians-were-really-russians/ Tue, 18 Jul 2023 17:53:43 +0000 https://www.atlanticcouncil.org/?p=665093 Vladimir Putin insists Ukrainians and Russians are "one people" and appears to have genuinely believed his invading army would be welcomed. It is now clear this was a catastrophic miscalculation, writes Roman Solchanyk.

The post Putin’s biggest mistake was believing Ukrainians were really Russians appeared first on Atlantic Council.

]]>
Vladimir Putin’s decision to launch the full-scale invasion of Ukraine was based on a series of disastrous miscalculations. The most significant of these was his belief that Ukrainians are really Russians. Putin has long insisted Ukrainians and Russians are “one people” who have been artificially separated by the fall of the USSR. For Putin, this separation has come to symbolize the perceived historical injustice of the Soviet collapse, which he has previously described as the “greatest geopolitical catastrophe” of the twentieth century. In February 2022, he set out to correct this alleged “injustice,” once and for all.

Putin’s fundamental misreading of Ukraine is now plain to see. Far from welcoming Russia’s invasion, the Ukrainian nation united and rose up in resistance. What was anticipated by the Kremlin as a brief and victorious military campaign has instead become the biggest European war since World War II. But if the scale of Putin’s blunder is obvious, it is important to note that he is far from the only Russian harboring such delusions. Russia’s elites and Russian society as a whole tend to assume everything that needs to be known (or is worth knowing) about Ukraine and Ukrainians has long been known and requires no further inquiry. This helps to explain why until fairly recently, there were hardly any academic or analytical centers in Russia devoted specifically to Ukrainian studies.

Today’s Russian attitudes toward Ukraine reflect centuries of imperial Russian and Soviet nationality policy. In the former case, Ukrainians (and Belarusians) were officially viewed as components of a larger, supranational “all-Russian people” that also included the Russians themselves. Meanwhile, for most of the Soviet period, the Ukrainian, Belarusian, and Russian republics were seen as the Slavic core and foundation for another supranational entity, the “Soviet people.”

The similarity between the imperial and Soviet views is unmistakable, albeit with one dissonant nuance: Soviet nationality policy, while doing all it could to erase Ukrainian national identity, at the same time officially recognized the Ukrainian Soviet Socialist Republic as a state entity and Ukrainians as a separate nationality. Putin has been highly critical of Lenin for this approach, and has claimed the Bolshevik leader was personally responsible for “creating” Ukraine. This line of thinking reached what may be seen as its logical conclusion with Putin’s insistence that Ukrainians and Russians are “one people.” By denying the existence of a separate Ukrainian national identity, Putin brought the legitimacy of Ukrainian statehood into question and set the stage for the current war.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

Russian misconceptions about Ukraine are in part due to the simplistic notion that ethnic Russians and Russian-speakers in Ukraine, as well as those who express an affinity for Russian culture or share Russia’s antagonism toward the EU, NATO, and the West in general, all fall within the same “pro-Russian” category. Likewise, Many Russians have been all too ready to assume that any Ukrainian expressing nostalgia for the Soviet era is waiting to be “liberated” by Moscow. These misconceptions have been echoed by numerous commentators in the West, who have similarly treated evidence of favorable Ukrainian attitudes toward modern Russia or the Soviet past as indications of a desire for some form of Russian reunion.

In reality, being “pro-Russian” is understood one way in Ukrainian cities like Donetsk, Kramatorsk, or Mariupol, and quite differently in Moscow, Omsk, or Tomsk. During the initial stages of Russian aggression against Ukraine in April 2014, the Kyiv International Institute of Sociology conducted a wide-ranging poll in the eight southeastern Ukrainian provinces (excluding Crimea) targeted by the Kremlin. This revealed that 70 percent of respondents were against separation from Ukraine and unification with Russia, while just 15 percent were in favor.

If separation from Ukraine was not on their wish list, what did they in fact want? A relative majority of 45 percent preferred the decentralization of power and greater rights for their region; another 25 percent favored a federated Ukraine, while only 19 percent were happy with the existing relationship with Kyiv. Other surveys conducted at around the same time yielded similar findings.

Unsurprisingly, Russia’s full-scale invasion has further shaped Ukrainian attitudes toward issues of national identity. Today, the people of Ukraine are more consolidated as a political nation than at any time since regaining independence more than thirty years ago. According to the Razumkov Centre, 94 percent of respondents in a May 2023 survey expressed pride in their Ukrainian citizenship; 74 percent expressed feelings of patriotism and love for their country; and 71 percent were ready to come to its defense, either with weapons in hand or as participants in volunteer support groups.

Meanwhile, negative attitudes toward Russia and Russian citizens have skyrocketed. At the end of 2019, only 20 percent of Ukrainians held negative attitudes toward Russians; six months after the start of the full-scale Russian invasion in September 2022, 80 percent of respondents asserted that they would not allow Russians into Ukraine. In terms of attitudes toward Russia, the turnaround has been even more drastic. In early February 2022, about a week before the Russian invasion, 34 percent of Ukrainians held positive views of Russia. That number dropped to just two percent three months later, with 92 percent saying they viewed the country in a negative light.

With the war clearly going badly for the Kremlin, there could now be a glimmer of hope for some reality-based adjustments to Russian illusions about Ukraine. Russian MP Konstanin Zatulin, who is well known for championing the plight of Russian “compatriots” abroad and promoting aggressive policies toward Ukraine, has recently questioned the wisdom of denying Ukrainian identity. “I would be happy if there was no Ukraine, but if we continue to constantly repeat that there is no Ukraine and no Ukrainians,” this will only strengthen their resistance on the battlefield, he noted at a June 2023 forum in Moscow.

Zatulin’s comments hint at growing recognition in Russia that widely held beliefs about Ukraine’s indivisibility from Russia are both inaccurate and unhelpful. However, resistance to the entire notion of Ukrainian statehood is so deeply ingrained in Russian society that it may take generations before the attitudes underpinning the current war are no longer dominant.

Roman Solchanyk is author of “Ukraine and Russia: The Post-Soviet Transition” (2001). He has previously served as a senior analyst at the Radio Free Europe/Radio Liberty Research Institute and the RAND Corporation.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Putin’s biggest mistake was believing Ukrainians were really Russians appeared first on Atlantic Council.

]]>
Garlauskas and Culver Panelists for VOA Show https://www.atlanticcouncil.org/insight-impact/in-the-news/garlauskas-and-culver-panelists-for-voa-show/ Thu, 06 Jul 2023 17:38:17 +0000 https://www.atlanticcouncil.org/?p=665777 On June 30, Markus Garlauskas and Global China Hub Nonresident Senior Fellow John Culver were the guests for Voice of America’s Washington Talk panel discussion show, which focuses on North and South Korean audiences and is often watched by the US Korea analysis and policy community. The discussion focused on the new North Korea intelligence […]

The post Garlauskas and Culver Panelists for VOA Show appeared first on Atlantic Council.

]]>

On June 30, Markus Garlauskas and Global China Hub Nonresident Senior Fellow John Culver were the guests for Voice of America’s Washington Talk panel discussion show, which focuses on North and South Korean audiences and is often watched by the US Korea analysis and policy community. The discussion focused on the new North Korea intelligence estimate, other North Korea developments and various Korea-China issues. The show aired in the region and was posted on YouTube on July 1.

The post Garlauskas and Culver Panelists for VOA Show appeared first on Atlantic Council.

]]>
Garlauskas on the Capital Cable https://www.atlanticcouncil.org/insight-impact/in-the-news/garlauskas-on-the-capital-cable/ Fri, 30 Jun 2023 17:31:19 +0000 https://www.atlanticcouncil.org/?p=665769 On June 29, Markus Garlauskas was the guest for the Center for Strategic and International Studies’ Capital Cable talk show. The moderator, retired US Ambassador Mark Lippert, introduced the show by highlighting Garlauskas’ New Atlanticist piece on the new North Korea intelligence estimate. The discussion that followed addressed a wide range of defense and security […]

The post Garlauskas on the Capital Cable appeared first on Atlantic Council.

]]>

On June 29, Markus Garlauskas was the guest for the Center for Strategic and International Studies’ Capital Cable talk show. The moderator, retired US Ambassador Mark Lippert, introduced the show by highlighting Garlauskas’ New Atlanticist piece on the new North Korea intelligence estimate. The discussion that followed addressed a wide range of defense and security issues related to Korea.

The post Garlauskas on the Capital Cable appeared first on Atlantic Council.

]]>
Reading between the lines of the new North Korea intelligence estimate https://www.atlanticcouncil.org/blogs/new-atlanticist/reading-between-the-lines-of-the-new-north-korea-intelligence-estimate/ Wed, 28 Jun 2023 22:38:20 +0000 https://www.atlanticcouncil.org/?p=660176 The US intelligence community has just released its National Intelligence Estimate on North Korea, a watershed analysis. But more is worth adding to the discussion.

The post Reading between the lines of the new North Korea intelligence estimate appeared first on Atlantic Council.

]]>
June 22 marked a watershed moment for analysis of North Korea. For the first time in over a decade, the US intelligence community publicly released a National Intelligence Estimate (NIE) on North Korea, titled “North Korea: Scenarios for Leveraging Nuclear Weapons Through 2030.” Completed in January 2023, this NIE is more than thirty years more recent than all the previously released North Korea NIEs, which date back to the 1980s or before.

The new NIE lays out three pathways through 2030 for how North Korean leader Kim Jong Un’s strategy could evolve as his nuclear weapons capabilities improve. The NIE concludes that the by far most likely pathway is for Kim to leverage his nuclear capability for “coercion, potentially including non-nuclear lethal attacks, aimed at advancing the North’s goals.” It also delineates two additional low-likelihood pathways: North Korea could employ an offensive strategy to dominate the Korean Peninsula through the use of force, or it could turn to a defensive strategy, in which nuclear weapons are used solely as a deterrent. According to the estimate, Kim is most likely to continue pursuing coercion because he will be “confident that his growing nuclear capabilities will deter any unacceptable retaliation or consequences” but that he would not actually attack with them unless he “believes his regime is in peril.”

As a former National Intelligence Officer for North Korea who led the development of NIEs, I see this document as monumental in my particular niche, but some additional context is needed to understand why. Since the 1950s, NIEs have been the US intelligence community’s most authoritative written judgments on national security issues, developed through a collaborative process led by the Office of the Director of National Intelligence’s National Intelligence Council (NIC) and its predecessor organizations. This new NIE is a tantalizing glimpse of the US intelligence community’s larger strategic intelligence picture on North Korea, even as it necessarily represents only the tip of the iceberg of a much longer classified document.

What is perhaps most remarkable about the latest NIE is that it highlights very recent key intelligence community judgments about North Korea. This is a major and unusual step, given that this practice was largely halted after the declassification of key judgments in the 2007 NIE on Iran’s nuclear program caused a number of public controversies. It also marks a change from how the intelligence community has generally approached public assessments of North Korea. Though US intelligence leaders have openly described North Korea as a “hard target,” they have generally been guarded in their assessments of Pyongyang’s capabilities and how they know what they know. With a few exceptions (many of them during the “fire and fury” period of 2017) most of the intelligence community’s publicly released assessments have been small portions of the larger Annual Threat Assessment provided to Congress. 

Given this history, and the fact that the NIE does not address the possibility that North Korea will give up its nuclear weapons, it could have been withheld on the unfair grounds that it could be interpreted as an implicit rebuttal to the longstanding US policy of negotiating the denuclearization of North Korea. It is therefore a testament to the sincerity of Director of National Intelligence Avril Haines’s commitment to transparency that this NIE was released. 

Even with its notable and welcome transparency, however, it does not give a full picture of the strategic North Korea nuclear challenge. There are (at least) three areas that are worth adding to the discussion.

First, China. The NIE’s analysis related to Beijing is guarded and subtle, particularly compared to how much intelligence leaders openly focus on the threat. While Washington publicly and loudly grapples with the premise that the United States and the People’s Republic of China (PRC) will likely be in a heightened state of military confrontation or outright war over Taiwan before 2030, these key judgments do not explicitly address the possibility, much less explore the massive implications this has for Korea. The declassified NIE does warn, among other factors, that an offensive strategy would “become more likely” if Kim believed he could “maintain China’s support” or “if [Kim] concluded that [an] international crisis presented a last chance to accomplish revisionist goals.” As current National Intelligence Officer Sydney Seiler acknowledged to me last week, the need to consider North Korea’s potential to escalate during a Taiwan crisis is a “no brainer.” That the key judgments omit this subject is neither surprising nor troubling to me as a former NIO. I know how hard it is to keep this document’s scope manageable and the challenges of considering hypotheticals piled upon hypotheticals. However, readers should keep in mind that the risk of North Korea using its nuclear weapons, or taking the offensive in general, could be much greater in the event of a US-PRC conflict.

Second, South Korea. Specifically, it is important to recognize Seoul’s potential to field its own nuclear arms. If Kim pursues a strategy of coercion, as the NIE judges he most likely will, and “may be willing to take greater conventional military risks, believing that nuclear weapons will deter an unacceptably strong US or South Korean response,” the value of South Korean nuclear capability to counter such threats would fuel the already-strong South Korean public sentiment for the country to acquire nuclear weapons. It would, however, be impolitic to warn that April’s Washington Declaration, wherein South Korean President Yoon Suk Yeol pledged to forgo nuclear weapons, may not last beyond the end of his constitutional single term in 2027. The window between a decision for nuclear weapons and operational capability would be a logical time for a preventive attack, a concrete example of the general “now or never crisis” the NIE cites as a driver for an offensive.  

Third, military and policy prescriptions. These are outside the remit of the NIC and violate intelligence analysis tradecraft standards, so it makes sense that they are not included in the NIE. However, several logical strategic-level policy and military recommendations could be derived from this estimate’s judgments. At least three come to mind immediately:

  • First, the United States should not politically recognize North Korea as a de facto or de jure legitimately nuclear-armed state in the hope that this would lead it to be a defensively focused “responsible” power, given how unlikely this is to happen. 
  • Second, the United States and South Korea should ensure that their primary efforts in deterrence of North Korea are focused on the most likely threat. US and allied efforts at deterrence should not be content with just deterring an “all-out” military offensive or nuclear strikes. They should also counter as much as possible the sort of incremental creeping coercive escalation that could either fatally undermine the security of South Korea and the US position in the region over time or could spin out of control into an escalating conflict. 
  • Third, the United States and South Korea should recognize that, though it is not the most likely scenario, they must be prepared to fight a nuclear war with North Korea. Washington and Seoul must contend with the unpleasant reality that there is a plausible set of conditions, particularly in the context of a hypothetical US-PRC war or a South Korean decision for nuclear arms, that could lead North Korea to undertake an offensive use of nuclear weapons. 

Though this NIE is neither the first nor the last word on the implications of North Korea’s growing nuclear capabilities, it is a huge step forward for public and classified policy debates. The NIE provides the intellectual foundation to prepare for a long struggle with an increasingly well-armed and coercive North Korea, instead of abandoning the principle of denuclearizing North Korea in a vain attempt to secure peace or embarking on the reckless path of embracing preventive war in fear that Kim will strike first. The NIE demarcates the field in which the United States and its allies must be prepared to play a high-stakes game—a contest in which the PRC’s aggression and South Korea’s own nuclear weapons could have game-changing consequences.


Markus Garlauskas served as the national intelligence officer for North Korea, leading the US intelligence community’s strategic analysis of North Korea from 2014 to 2020. He is the director of the Indo-Pacific Security Initiative at the Scowcroft Center for Strategy and Security of the Atlantic Council, and tweets at @Mister_G_2.

The post Reading between the lines of the new North Korea intelligence estimate appeared first on Atlantic Council.

]]>
Russian War Report: Wagner attempts to draft gamers as drone pilots https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-wagner-drafts-gamers/ Thu, 22 Jun 2023 18:12:27 +0000 https://www.atlanticcouncil.org/?p=658059 Russian PMC Wagner Group is encouraging gamers to apply to serve as drone pilots in the war against Ukraine while Ukrainian forces advance on the eastern front.

The post Russian War Report: Wagner attempts to draft gamers as drone pilots appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report

Security

Ukrainian counteroffensive sees advances in Zaporizhzhia and eastern Ukraine

Wagner attempts to draft gamers as UAV pilots

Tracking narratives

Deripaska blames hackers after his website briefly takes credit for potential war crime

Rumors of alleged death of popular pro-Kremlin war correspondent gain traction on Twitter

Ukrainian counteroffensive sees advances in Zaporizhzhia and eastern Ukraine

On June 19, Ukrainian forces launched counteroffensive actions in at least three areas and appear to have made gains in Zaporizhzhia and eastern Ukraine. The Telegram channel of Russian military blogger WarGonzo reported that Ukrainian forces continued attacks northwest, northeast, and southwest of Bakhmut and advanced near Krasnopolivka. Ukrainian Deputy Defense Minister Hanna Maliar announced that over the past week Ukrainian troops advanced up to seven kilometers in the direction of Zaporizhzhia and retook 113 square kilometers of territory. Russian Telegram channels also reported that fighting was ongoing south and southwest of Orikhiv on June 19. Zaporizhzhia and Donetsk oblasts continue to be the most active areas of the frontline, as the Ukrainian army attempts to advance in the directions of Novodarivka, Pryutne, Makarivka, Rivnopil, Novodanylivka, and Robotyne.

On June 17, the Russian Ministry of Defense claimed that Ukrainian forces conducted ground attacks west and south of Kreminna. It also stated that the Russian army had repelled Ukrainian attacks on the Avdiivka-Donetsk sector. Meanwhile, Ukrainian forces continued operations around Velyka Novosilka near the border between Donetsk and Zaporizhzhia oblasts. 

According to Ukrainian forces, Russian forces conducted offensive actions in Donetsk and Luhansk oblasts. The Ukrainian military reported forty-five combat engagements with Russian forces near Yampolivka, Torske, Hryhorivka, Spirne, Avdiyivka, Krasnohorivka, Marinka, Pobieda, Novomykhailivka, and Donetsk’s Dibrova and Orikhovo-Vasylivka. According to Ukraine, the Russian army continued to shell villages in the direction of Marinka, Zaporizhzhia, Kherson, Lyman, and Kupiansk. Ukraine also alleged that Russian forces launched Kalibr cruise missiles from a submarine in the Black Sea and Shahed drones from the eastern coast of the Sea of Azov.

On June 20, Kyrylo Budanov, chief of the Main Directorate of Intelligence for the Ministry of Defense of Ukraine, alleged that Russian troops mined the Zaporizhzhia nuclear power plant’s cooling pond, which is necessary for the safe operation of the plant. According to Budanov, if Russia triggers an explosion, there is a “high probability that there will be significant problems.” Budanov did not provide any evidence to support the allegation, and the statement cannot be independently verified at this time. If true, however, it would put the nuclear plant at greater risk of a significant accident. The power plant complex, Europe’s largest, has been under occupation since February 2022.

On January 22, the governor of Russian-occupied Crimea accused Ukraine of targeting a bridge that connects the peninsula to Kherson Oblast, near the village of Chonhar. In a Telegram post, Vladimir Sal’do alleged that Ukraine struck the bridge with “British Storm Shadow missiles,” creating a hole in the middle of the bridge.

As fierce hostilities continue in eastern and southern Ukraine, there are signs of a new wave of arrests in Russia, including of people with ties to Ukraine. On June 20, Russian state media outlet RIA Novosti announced that a woman of Ukrainian origin was detained in Saransk and charged with treason.

Ruslan Trad, resident fellow for security research, Sofia, Bulgaria

Wagner attempts to draft gamers as UAV pilots

A June 19 Telegram post from Russian opposition news outlet Verstka claimed that Wagner Group is encouraging gamers to apply to serve as unmanned aerial vehicle pilots in the war against Ukraine. The media outlet reported that no prior military experience was required to apply for the position. Posts from Wagner emerged on Vkontakte the same day, inviting gamers with experience in “manipulating joysticks in flight simulators” to enroll.

Wagner ad recruiting gamers as UAV pilots. (Source: VK)
Wagner ad recruiting gamers as UAV pilots. (Source: VK)

Verstka, which contacted a Wagner recruiter as part of its reporting, stated that the campaign aims to recruit soldiers to pilot “copters and more serious machines.” In this particular context, “copters” (коптеры) is a reference to commercial drones that are sold to the public and have been widely used in the war against Ukraine. A May 19 investigation published by the Organized Crime and Corruption Reporting Project found that Chinese manufacturers have reportedly continued to provide Russian armed forces with DJI drones through third parties in Kazakhstan. 

Verstka also noted that in 2022, the Russian defense ministry attempted to recruit gamers with a targeted ad campaign that invited them to play “with real rules, with no cheat codes or saves.”

Valentin Châtelet, research associate, Brussels, Belgium

Deripaska blames hackers after his website briefly takes credit for potential war crime

The Russian-language website of Russian industrialist and US-sanctioned oligarch Oleg Deripaska briefly displayed an article appearing to take credit for deporting Ukrainian children to Russian-occupied Crimea in partnership with Kremlin official Maria Lvova-Belova, who is already facing an International Criminal Court arrest warrant for allegedly deporting children. 

Yaroslav Trofimov, chief foreign affairs correspondent at the Wall Street Journal, noted the article’s appearance and disappearance in a June 15 tweet. Trofimov shared screengrabs of the article, which by that time had already been deleted from Deripaska’s Russian-language website, deripaska.ru. A complete copy of the article can be found at the Internet Archive.

Later in the article, it added, “Separately, the Fund and personally Oleg Vladimirovich [Deripaska] express their gratitude to Maria Lvova-Belova and her project ‘In Hands to Children,’ which not only provided methodological materials, but also found an opportunity to send employees for psychological work with affected babies.” In March 2023, the ICC issued an arrest warrant for Lvova-Belova and Russian President Vladimir Putin, alleging they are responsible for unlawful deportation and transport of children from Russian-occupied parts of Ukraine to the Russian Federation.

In a response to Russian independent news outlet Meduza, which also covered the incident, a team of representatives for Deripaska called the article a “gross fake press-release” and blamed hackers for the article’s appearance. “The team added that Deripaska ‘unequivocally condemns the separation of children from their parents’ and that he is ‘one of the very few prominent Russian industrialists who openly criticizes the fratricidal war and consistently advocates for peace in Ukraine, as well as a reduction in global military spending,’” Meduza noted.

Eto Buziashvili, research associate, Tbilisi, Georgia

Rumors of alleged death of popular pro-Kremlin war correspondent gain traction on Twitter

Rumors are spreading online that claim Ukrainian forces killed pro-Kremlin war correspondent Semyon Pegov, who operates an influential group of social media accounts under the name Wargonzo. The rumor first spread on Twitter on June 19 following the release of a graphic video from the 73rd Naval Center of Operations documenting how Ukrainian special forces unit had shot Russian soldiers in trenches. On June 19, Pegov’s Twitter account disregarded the allegations as fake. Wargonzo’s Telegram account has continued to operate as usual.

DFRLab analysis conducted with the social media monitoring software Meltwater Explore revealed that the most retweeted tweet came from the pro-Ukraine Twitter account @GloOouD, which stated, “LOOKS LIKE RUSSIAN TERRORISTS AND WAR REPORTER SEMEN PEGOV WAS KILLED BY UKRAINIAN SPECIAL FORCES.” The account shared a screenshot of a low-quality video frame depicting a red-bearded man that bears resemblance to Pegov.

Screenshot of @GloOouD’s tweet suggesting that Semyon Pegov was killed by Ukrainian special forces. (Source: @GloOouD/archive)
Screenshot of @GloOouD’s tweet suggesting that Semyon Pegov was killed by Ukrainian special forces. (Source: @GloOouD/archive)

The DFRLab confirmed that the video frame depicting Pegov’s look-alike was extracted from the graphic video posted posted by the 73rd Naval Center of Operations. The video’s metadata indicates the clip was created on June 18, 2023, at 22:16:07 GMT+0300. However, the video shows events occurring in daylight.

Pegov’s most recent public appearance was on June 13 during a meeting between Putin and Russian war correspondents. The Kremlin-controlled Channel One Russia broadcast the meeting on June 18.

Comparison of the red-bearded man from the 73rd Naval Center of Operations’ video and Pegov talking at a press conference. (Source: @ukr_sof/archive, top; Perviy Kanal/archive, bottom)
 
- Nika Aleksejeva, Resident Fellow, Riga, Latvia
Comparison of the red-bearded man from the 73rd Naval Center of Operations’ video and Pegov talking at a press conference. (Source: @ukr_sof/archive, top; Perviy Kanal/archive, bottom)

Nika Aleksejeva, resident fellow, Riga, Latvia

The post Russian War Report: Wagner attempts to draft gamers as drone pilots appeared first on Atlantic Council.

]]>
The way for the US to ensure Gulf security is through partnership, not policing https://www.atlanticcouncil.org/blogs/menasource/the-way-for-the-us-to-ensure-gulf-security-is-through-partnership-not-policing/ Tue, 20 Jun 2023 17:37:59 +0000 https://www.atlanticcouncil.org/?p=657047 As the United States continues to work with the Gulf on security, expect blips. Despite that, Washington can get this partnership back on course.

The post The way for the US to ensure Gulf security is through partnership, not policing appeared first on Atlantic Council.

]]>
Earlier this month, US Secretary of State Antony Blinken traveled to Riyadh to meet with Gulf Cooperation Council (GCC) foreign ministers and the GCC secretariat. There, he mentioned how deeply the United States is invested in partnering with Gulf countries to build a brighter future for the region. In pursuit of that future, the United States should assist GCC countries with Gulf security as true partners—not as a policeman in the neighborhood.

The concept of Gulf security is not new. It was always top of mind for those who inhabited its shores. Historians have written of Russian Tsars’ desires to push south to the Gulf. This desire can be seen in the language of the purported will of Peter the Great from 1725. He advised his descendants to “approach as near as possible to Constantinople and India. Whoever governs there will be the true sovereign of the world. Consequently, excite continual wars, not only in Turkey but in Persia… Penetrate as far as the Gulf, advance as far as India.” The Carter Doctrine, outlined in US President Jimmy Carter’s State of the Union Address in January 1980, committed the United States to use military force, if necessary, to defend its national interests in the Gulf—the doctrine was a direct response to the Soviet Union’s entry into Afghanistan the year prior. 

Generations of US strategic thinkers have spoken of US opposition to threats lodged by any country aiming to control the waters or air space of the Gulf and the adjacent Arabian Sea. Those thinkers focused on what would impede the peaceful relations that the United States and its allies have enjoyed with Gulf countries—countries that have energy resources that make them important for the global economy. 

In over forty years, many realities have changed. US imports of Gulf energy supplies declined. By contrast, US exports to the region have expanded many times over. The parties and conditions that would likely pose a threat to US trade and other relationships with the Gulf are now largely located within the region. In the 1980s and early 1990s, it was the Iraq-Iran War and the Iraqi invasion of Kuwait. Recently, it has been nonstate terrorist groups and Iran. 

In addition, the countries with which the United States has friendly relations don’t depend on the United States to do the job of Gulf security for them. These countries do want Washington to be a reliable partner in support of their individual and collective defense efforts. This is also the goal of the United States. Through diplomacy and through working with the US private sector, Gulf countries’ militaries have been connected to military contacts with US companies and joint exercises conducted by the US Central Command. That fits what the Arab countries in the region need, and it fits what the US political system can accept. 

This takes me back to the Iranian attacks on tankers and other commercial vessels in the final years of the Iran-Iraq War. I was the US ambassador to the United Arab Emirates at the time. Together with other US envoys to the Gulf Cooperation Council (GCC) countries, I was called back to Washington in early 1987 for consultations at the US State Department. 

Interested in regular updates?

Sign up for the MENASource newsletter, highlighting pieces that follow democratic transitions and economic changes throughout the region.



  • This field is for validation purposes and should be left unchanged.

The Kuwaiti government had formally requested that the United States put its flags on Kuwaiti oil tankers in order to gain the protection of US naval warships. The Kuwaitis promised to reimburse the United States handsomely for the flagging operation and to steadfastly maintain it was merely a commercial arrangement. Kuwait wished to shun any overt military alliance with the United States; for example, it did not even welcome US Navy ship visits. Indeed, the United States only had a small contingent of warships in the Gulf at the time, homeported in Manama, Bahrain. The answer from Washington was negative. The Kuwaitis then redirected their request to the Soviet Union. 

When the group of US envoys and I gathered in the State Department, it was clear that the White House and top US politicians were still disinclined to make a major commitment to protect neutral-flag shipping in the Gulf, despite the unanimity among those of us coming from our posts in the region—we were in favor of some kind of positive response. After a half day of talks, we were told that then US President Ronald Reagan did not want to allow an opportunity for the Soviet Union to bring its military force into the Gulf. So, for that reason (however flawed it may be), Operation Earnest Will was born.

The United States committed to sending a military presence sufficient to protect neutral-flag commercial shipping without spending time quibbling over whether the GCC countries were actually neutral in the Iran-Iraq War. When I returned to Abu Dhabi, I received a warm welcome from Sheikh Zayed bin Sultan Al Nahyan, who was then the president of the United Arab Emirates (UAE), and soon after from the rulers of the UAE’s other six emirates and from Sheikh Mohammed bin Rashid Al Maktoum, the minister of defense. At the time, the UAE was a confederation that granted only limited federal powers and separated military commands across Dubai and several other northern emirates. Even without actual authority outside Abu Dhabi, a young rising star in the Abu Dhabi military command, Sheikh Mohamed bin Zayed, along with Dubai’s Sheikh Mohammed bin Rashid, eventually became key contacts for me as the United States ramped up its military presence in the Gulf. 

When I had arrived at my post in September 1986, the United States was limited to a mere four visits per year by its Navy warships and had very limited military relationships with the UAE emirates. By the time I left in October 1989, the United States had a large number of Navy ship visits, refueling and even making critical ship repairs at the large (and, at the time, new) port of Jebel Ali, as well as at established ports from Abu Dhabi to the city of Fujairah. The United States was also on its way to becoming a major supplier of military aircraft to the UAE. The rulers of the seven emirates were seeking joint military exercises as well as ship visits. Moreover, the leaders of these individual emirates had responded to the crisis of the tanker wars and various other demands by strengthening federal powers. 

Because the United States responded to the GCC countries during their time of need (the so-called Tanker War), a strategic partnership formed—one that became the foundation for cooperation to reverse the Iraqi military occupation of Kuwait in 1990. The success of Operation Desert Storm gave the United States political credibility to bring GCC countries and other Arab countries to the Madrid Conference, a peace conference geared toward reviving the Israeli-Palestinian peace process, at the end of 1991. Those talks between Israel and the United States built upon peace between Egypt and Israel negotiated with the help of the United States at Camp David in September 1978 and the peace treaty between those two former military adversaries in March 1979. Camp David, the Madrid Conference, and Israel’s growing relationships with countries ranging from the UAE in the east and Morocco in the west laid the foundation for normalization. In a shrewd move, the Trump administration labeled this growing interaction as the “Abraham Accords.” The Biden administration has continued to play a role as a convenor and mediator. 

As the Biden administration continues to play this role, it and Congress will find that the Arab countries of the GCC want to do their part when it comes to Gulf security. They are not expecting the United States to be the policeman of their neighborhood. Along with other key Arab and global leaders, they will welcome the United States as a partner in facing shared strategic interests. 

Defense coalitions have historically been tricky, requiring skill and mid-course corrections. As the United States continues to work with the Gulf on security, expect blips, such as the report of a UAE withdrawal from the Combined Maritime Forces, a US-led maritime coalition. But if the United States shows that it is ready to work together with Gulf countries, Washington can get this partnership back on course. Read more about improving Gulf security frameworks in our latest report here.

David Mack is a nonresident senior fellow with the Atlantic Council’s Middle East Programs, a former deputy assistant secretary of state for Near East affairs, and a former US ambassador to the United Arab Emirates.

The post The way for the US to ensure Gulf security is through partnership, not policing appeared first on Atlantic Council.

]]>
US-China lessons from Ukraine: Fueling more dangerous Taiwan tensions https://www.atlanticcouncil.org/in-depth-research-reports/report/us-china-lessons-from-ukraine/ Thu, 15 Jun 2023 20:31:43 +0000 https://www.atlanticcouncil.org/?p=647648 The lessons that Washington and Beijing appear to be learning from Russia's war against Ukraine could set the stage for a crisis over Taiwan in the next few years.

The post US-China lessons from Ukraine: Fueling more dangerous Taiwan tensions appeared first on Atlantic Council.

]]>
Table of contents

China’s assumptions and lessons learned
US assumptions and lessons learned
Europe’s lessons learned
Implications of conflicting lessons for deterrence
Policy recommendations
Conclusion

Acknowledgements
About the authors

The lessons that Washington and Beijing appear to be learning from Russia’s February 2022 invasion of Ukraine, and from Ukraine’s resistance and counteroffensive, could set the stage for a crisis over Taiwan in the next few years. This grim prospect is driven by the United States and China arraying themselves for a strategic rivalry since 2017 through the continuing trade war, economic decoupling, and increasing rhetorical and military positioning for confrontation over Taiwan. In light of the Chinese military’s threatening gestures, belligerent rhetoric, and other recent actions that read like they could be preparation for war, there is a danger that the successive warnings by senior US military commanders that Chinese CCP General Secretary and President Xi Jinping has already decided to use military force in the near term could become the proverbial tail wagging the dog — and could impose a logic that makes a US-China war more likely, rather than enhancing deterrence.1 Therefore, the key question for the United States and its allies is how an increasingly truculent and belligerent Chinese leadership can be incentivized to walk back from the brink. This paper examines what lessons China, the United States, and European allies have drawn from the Ukraine conflict and how such lessons have shaped these actors’ strategic assumptions. It concludes with a discussion of policy recommendations for the transatlantic community confronting the possibility of a US-China conflict over Taiwan.

China’s assumptions and lessons learned

Even as Beijing modulates its public statements in support of Moscow, China’s strategic assumptions from before the Ukraine invasion likely have not changed, and may depend on the longer-term outcome in Ukraine. That includes the prospect of an outcome that Vladimir Putin can claim as a Russian “victory,” in which Russia continues to hold territory and forecloses Ukraine’s NATO or European Union (EU) integration.

China is likely to apply the following strategic assumptions as it digests lessons learned from the Ukraine war.

According to Beijing, the United States is an adversarial, declining hegemony that will be antagonistic to China’s rise for the foreseeable future, and which will seek to foment instability within China and hostility on its periphery. In Beijing’s view, US antagonism to China is now structural and bipartisan. China’s previous self-imposed restraint, as it chose to prioritize stable US relations and drive economic reform and growth, is therefore moribund. For the Chinese Communist Party (CCP), the relatively peaceful global and regional environment that prevailed in the late bipolar Cold War and the post-Cold War period is severely challenged, as Xi told President Joe Biden in their March 18 call.“2 Economic growth and rising prosperity are still important, but diminishing, sources of regime legitimacy. Defense of the CCP system, fueled by nationalism, expanded party control, while more active cooperation with Russia and other US adversaries, such as Iran, is becoming more prominent. Xi made this explicit in his speech to China’s National People’s Congress on March 6: “Western countries led by the United States have implemented all-around containment, encirclement and suppression of China, which has brought unprecedented severe challenges to our country’s development.”3

Economic growth and rising prosperity are still important, but diminishing, sources of regime legitimacy.

Giant screen displays a live broadcast of Chinese President Xi Jinping delivering a speech during the closing ceremony of the National People’s Congress (NPC), in Beijing. (Tingshu Wang via Reuters)

Another key view in Beijing is that Russia is China’s strategic partner. This status was further elevated on the eve of Russia’s invasion of Ukraine, when Russian President Putin and Xi met in Beijing and signed a joint statement on February 4, 2022.“4 Throughout the war in Ukraine, China’s leaders have reiterated their stance, most recently during visits to Moscow by Xi and by China’s top foreign affairs official Wang Yi in early 2023.5 The two countries are unlikely to ever have a formal mutual-defense treaty, but intensified cooperation in many spheres—including military coordination, intelligence sharing, energy, and trade—will continue and even accelerate.6 Even before its invasion of Ukraine, Russia was the junior partner in the bilateral relationship, but Beijing has deep strategic interest in ensuring that Moscow—and Putin personally—remains a viable ally in blunting US power and coordinating at the United Nations. Most importantly, Beijing has a strategic need to keep Russia from internal turmoil or international setbacks that could result in the rise of a regime that is hostile to China. One of the greatest gifts to Beijing of the Sino-Russian rapprochement that started during the 1990s, and truly took off from the mid-2000s, was a passive 4,200-kilometer border that enabled China to focus military modernization on naval, rather than land, warfare for potential conflict with the United States and Japan over Taiwan, or with India or Vietnam over border and maritime sovereignty disputes, respectively. The fact that Russia had dared to commit an estimated 97 percent of its entire forces to the fight in Ukraine by mid-February 2023 and, thus, baring its far-eastern borders, is a testament to this.7

Third, in the view of China’s leadership, the EU can act as a Western counterweight to perceived US hostility to China, and Beijing has at times tweaked its approach when deemed necessary to try to stabilize its ties to Europe. The EU lacked unanimity about following Washington’s lead, or did so only slowly and with less intensity, on hostile trade action and efforts to isolate China internationally prior to Russia’s invasion. In late April, inflammatory comments from China’s ambassador to France Lu Shaye, who essentially denied the sovereignty of former Baltic states, sparked an outcry across Europe and beyond.8 Shortly thereafter, Xi held his long-awaited call with Ukrainian President Zelenskyy,9 and separately, the Chinese Government voted in favor of a UN resolution containing language that explicitly acknowledges “the aggression by the Russian Federation against Ukraine,” a sharp departure from Beijing’s previous neutral UN voting patterns on Ukraine.10 While these moves are largely symbolic and mark a slight tactical rather than a strategic shift, they underscore Beijing’s willingness to make adjustments to try to maintain favorable relations with Europe, given the value Chinese leaders place on the region as a counterbalance to the United States.

However, China’s refusal to condemn the war against Ukraine and its enabling stance toward Russia have galvanized worries, particularly in Eastern European countries, over the trustworthiness of the Chinese government.11 On January 30, Czechia’s president-elect made it a point to accept a phone call from Taiwan’s President Tsai Ing-Wen, in a stark departure from previous practice.12 US intelligence made public in February 2023 that China was considering lethal arms supplies to Russia, causing grave concern in European capitals.13 Should Beijing actually deliver arms or ammunition to Russia despite its assurances to the contrary, China’s relations with much of Europe could be stretched past the breaking point and, indeed, there are signs of worsening strain, such as the aforementioned call between the Czech president-elect and President Tsai and his intention to plan a personal meeting with her, an unprecedented step from any Western leader; the withdrawal of the Baltic states from the Chinese 17+1 format; and, following similar decisions by many other European countries, Germany’s decision after long hesitation to finally ban and remove key components delivered by Chinese telecoms firms Huawei and ZTE from its fifth-generation (5G) network.14 At the same time, German leaders have continued to reach out diplomatically to China in the hopes of avoiding a complete Cold War-style economic decoupling scenario. On the other hand, European Commission President Ursula von der Leyen’s March 30, 2023, speech on EU relations with China put the future of the shelved Comprehensive Agreement on Investment (CAI) firmly in doubt.15

How the CCP and the People’s Liberation Army (PLA) ultimately digest strategic lessons from Russia’s war on Ukraine, therefore, will depend on that conflict’s course, the longer-term effects of Western sanctions on Russia and the global economy, and myriad other aspects, including elections in the United States and Taiwan in 2024.

Beijing has deep strategic interest in ensuring that Moscow—and Putin personally—remains a viable ally in blunting US power.

Vladimir Putin and President of the People’s Republic of China Xi Jinping made statements for the media following the Russian-Chinese talks on March 21, 2023. (Mikhail Tereshenko, TASS via Russian Presidential Press and Information Office)

Beijing likely is also watching closely to see how deeply entrenched in—or distracted by—the Ukraine conflict the United States becomes, where it contributes the lion’s share of direct military aid, including key munitions and weapons platforms that are in short supply; Ukraine is currently expending US annual production of nine thousand HIMARS missiles every two months.16 As Russia continues to achieve reduced war aims in the east and south, the war seems likely to continue for the foreseeable future. It presents new opportunities for fissures in the Alliance, and reduced US strategic standing headed into US presidential elections in 2024 that are likely to be even more disruptive than previous election campaigns after former US President Donald Trump’s March 30 grand-jury indictment on business-fraud charges.17 Partly because of Washington’s massive arms support for Ukraine, its deliveries of key weapons and munitions already sold to Taiwan have been significantly delayed.18

But one momentous strategic implication of Russia’s invasion is probably already clear to Xi and the CCP. For the first time since the end of the Cold War, the prospect of major-power military conflict, and even nuclear-weapons use, is again a characteristic of the global order. Russia’s gamble in Ukraine that it could quickly defeat a non-NATO European neighbor and secure its near abroad has so far failed, but US-led Western unity and imposition of sanctions against Moscow have the earmarks of a protracted conflict that could drive new instability. If Beijing concludes that this is a characteristic of geopolitics and great-power competition in the twenty-first century, it could increase Chinese preparations for military conflict in Asia with either the United States or its proxies.

The deepening enmity of US-China strategic rivalry since 2017 has already eroded core CCP assumptions that competition would remain bounded by nuclear deterrence, deep economic integration, shared stewardship of financial stability, and cooperation on global challenges such as pandemics and climate. The Western reaction to the Russian war against Ukraine is likely to reinforce these judgments, and may be amplifying Beijing’s assessment that the United States is on a trajectory to pursue overthrow of the CCP as a strategic goal.

Even China’s February 24 “Position on the Political Settlement of the Ukraine Crisis” seemingly centers most around its affirmation of “sovereignty” as the key thing to be respected—crucially, without ever mentioning Ukraine’s sovereignty in particular, nor calling Russia’s invasion of Ukrainian sovereign territory an invasion, let alone illegal, despite this being a peace template for the Ukraine war.19 This implies the text has more to do with reaffirming China’s position on Taiwan and offering support to Russia than being an actual attempt to mediate. In calling to freeze the conflict, it would cement Russian territorial gains; ending the “unilateral” sanctions would again benefit Russia; and “promoting post-conflict reconstruction” would presumably benefit Chinese infrastructure companies. Beijing’s proposal on its face seems decidedly tilted toward Moscow or self-serving goals.

US assumptions and lessons learned

While dealing with the Russian aggression against Ukraine, the US government has not reduced its attention on the strategic challenge posed by China. At the time of the invasion, the Biden administration was aggressively focused on continuing and expanding Trump-era strategic competition with China. Even as Washington openly warned of intelligence regarding Moscow’s intentions, it continued adversarial policies and alliance building directed at China. It has since announced multiple rounds of technology restrictions on Chinese companies, and signed the CHIPS and Science Act to revitalize US semiconductor leadership.20 Moreover, the president has personally eroded US strategic ambiguity on US military commitments to Taiwan—despite National Security Council (NSC) staff “clarifications” after each repeated instance that US policy has not, in fact, changed.

While dealing with the Russian aggression against Ukraine, the US government has not reduced its attention on the strategic challenge posed by China.

President Joe Biden talks to workers as CEO of TSMC C. C. Wei and Chairman of TSMC Mark Liu look on during a visit to TSMC AZ’s first Fab (Semiconductor Fabrication Plant) in P1A (Phase 1A), in Phoenix, Arizona. (REUTERS/Jonathan Ernst)

In its National Defense Strategy (NDS) released last year, the Biden administration focused on homeland defense challenges posed by Russia and China, rather than simply on military contingencies in the Indo-Pacific or Europe.21 This sends a strong message that the world is actively contested now, and that the Department of Defense and all of the US government are not just preparing for potential kinetic conflict, but engaged already in active operations to disadvantage China—tantamount to a new Cold War. Moreover, the NDS’ emphasis on “integrated deterrence” with allies and partners will underscore the threat to China of the United States designating Taiwan as a “key non-NATO ally,” potentially breaking existing US policy barriers to a virtual defense guarantee.

The United States is likely to apply the following lessons learned from the Ukraine war as it prepares for potential future conflict with China.

The United States sees public intelligence disclosures of Russian plans to invade Ukraine since November 2021 as a major success, despite failing to deter Russia or realize major pre-war Alliance (or Ukrainian government) preparation for the attack.22 The credibility that Washington gained when Russia invaded in February helped drive the immediate post-invasion international reaction (the reverse of the 2003 Iraq weapons of mass destruction (WMD) fiasco) and resulted in even more comprehensive sanctions than were threatened pre-invasion to deter Russia. Senior US military and administration warnings of Beijing’s “2027 plans” echo US intelligence warnings about Ukraine, albeit without the same specificity and high confidence.23

Similarly for the United States, a Russian military “paper tiger” perception can be applied to the PLA in a Taiwan scenario that draws on the usual tropes.

  • “China hasn’t fought a major war since 1979” and, therefore, its military operational abilities may be more limited than expected.
  • “Amphibious invasion across 100NM Taiwan Strait is far more challenging than Russian land invasion of Eastern Ukraine,” due to the enormous inherent complexity of a Normandy-style amphibious landing and the PLA’s insufficient lift capacity for the task.
  • “Economic sanctions work, imposing a heavy burden for Moscow, thereby increasing regime insecurity, which can deter Beijing from taking action on Taiwan.”24

The key lesson Washington probably finds applicable to a Taiwan 2027 scenario is the importance of providing both conventional and non-conventional support, including intelligence sharing and equipment, in the runup to, and during, any conflict. In the case of Ukraine, Kyiv’s ability to blunt Moscow’s invasion was enabled by the strengthening of Ukraine’s resilience and resistance post-2014. While the United States and its NATO allies have not directly intervened in Ukraine, they maintain military equipment, intelligence, and economic/communications lifelines that have helped deny Russia its original war aims. Specifically, deliveries of new weapons (Javelin, Stingers, artillery/HIMARS, antiship missiles), near-real-time battlefield intelligence and targeting, and initial success in the public-relations/propaganda/information domain seemed to have blunted Russian hybrid warfare and aligned developed world/Global North opinion behind Ukraine and NATO. However, it is far from clear how well Taiwan could be resupplied in the event of a blockade, if at all. As an island nation, Taiwan has no cross-border sanctuaries for stockpiling and delivery of key military and civilian supplies. And while Russia has been restrained from striking NATO members on Ukraine’s western and southwestern borders, US bilateral allies in the Pacific have no NATO-like structure for collective defense.

A lesson the United States so far seems resistant to learning from Ukraine is that nuclear deterrence by the aggressor (Russia in the case of Ukraine, China in Taiwan) enables conventional war and blunts outside major-power intervention.25 The United States and its NATO allies are strongly united in resisting pressure from pundits to enforce a no-fly zone over Ukraine, break the Russian blockade of Ukraine’s Black Sea ports, or other ideas that could risk direct NATO-Russian war. China could very well conclude that inducing self-deterrence in Western capitals has worked well in Ukraine, and is a promising approach for Taiwan.26 On the other hand, nuclear deterrence works both ways. One could speculate how things would stand today had Ukraine been given a security guarantee akin to NATO’s Article Five in time, and whether this would not have effectively deterred a Russian attack.27 When President Biden conversely ruled out military intervention on behalf of Ukraine during the lead-up to the attack, deterrence was arguably weakened rather than strengthened. Rather than appreciating the transparency and reliability displayed by the United States, and accepting the olive branch it represents, an authoritarian aggressor might see preemptive self-constraint as a weakness to be exploited.

The more the United States talks up the prospect of a 2027 Taiwan war scenario, the more it will turn to buttressing Taiwan’s “resilience”—regardless of whether Taiwan wants this, given the island’s failure to buttress its own defense during twenty-five years of rapid PLA modernization and growing tensions on the strait.28

The more the United States talks up the prospect of a 2027 Taiwan war scenario, the more it will turn to buttressing Taiwan’s “resilience”—regardless of whether Taiwan wants this

US Senate Majority Leader Chuck Schumer (D-NY) announces that he will unveil a new package of legislation to address competition with China. (REUTERS via Craig Hudson)

So far, the drumbeat in US media, from Congress, and among some members of the current administration is to be prepared for direct US military intervention to defend Taiwan from a Chinese military attack. The United States, and its allies and partners, should assume that China would be at least as determined as Russia to wield its rapidly expanding nuclear-capable forces (and space/counterspace and cyber capabilities) to deter direct US intervention. China has stated numerous times that it would be prepared to declare a state of war today if it saw Taipei, Washington, or Tokyo violate the understandings that have preserved the peace since at least 1979. The main potential triggers for this are: Chinese perceptions that Taiwan is moving irrevocably away from the possibility of unification and toward the founding of a new state under the moniker “Taiwan” at some future point; a renewed Taiwanese effort to acquire nuclear weapons; or a return to a quasi-formal US military-security relationship with Taiwan, including through stationing US forces on the island or integrating Taiwan into the US alliance sphere through actions such as inviting it to participate in regional or bilateral military exercises or in Alliance intelligence-sharing arrangements. At the same time, China itself through its threatening actions has been doing the most to upend the understandings that constituted the peaceful status quo in the Taiwan Strait, forcing Taiwan, other regional actors such as Japan, and the United States to reposition themselves.

Europe’s lessons learned

Europe as a whole—comprising not just the EU, but also the United Kingdom, Norway, and other key non-EU states—has rather divergent regional security cultures. Former Eastern Bloc countries, for instance, have been far more alert to the risks posed by a belligerent Russia than have Western European countries that have never been under Russian occupation. European lessons learned from the Ukraine war, therefore, differ markedly in each region. For countries with a traditional Russia-friendly outlook—in particular, Germany, France, and Austria—the Ukraine war came as a shock and was met with initial disbelief and disorientation, giving way to a painful process of finding a new security paradigm.29 Other countries—such as the Nordics, Baltics, and Central and Eastern European (CEE) countries—were not as surprised, and indeed felt vindicated after decades of open disregard for their warnings.30 With the exception of Finland, most European countries discovered that their previous strategies of reaping a “peace dividend” by shrinking the armed forces and neglecting societal preparedness for crises and war had backfired.31 Collectively, Europe has learned (or is learning) five primary lessons.32

First, a real effort to bolster collective defense through tangible capabilities was urgently required, after countries paid only lip service to NATO commitments (such as the pledge to commit 2 percent of gross domestic product (GDP) to defense spending). This includes the need to ramp up production of defense goods in support of Ukraine during what could be a long struggle.33

Second, Europe learned the dangers of energy dependence on Russia. Prior to the war, Germany had dismissed concerns voiced by its eastern neighbors, the United States, and especially Ukraine that Nord Stream 2 would make Germany dependent and vulnerable to coercion, while also massively weakening Ukraine’s geopolitical situation. These warnings were proven right and have led to a painful reorientation process in Germany (dubbed the “Zeitenwende”) that is still in full swing more than a year after the war started, and is far from concluded.34 Intense debates still surround the questions of rebuilding German military capability, lethal arms supplies for Ukraine, and the future orientation of Germany’s Russia policy. As Germany is a key member state of both the EU and NATO, due to its size and geographic location, its unresolved security-political identity crisis negatively impairs both these organizations, leading to impatience—particularly among the Eastern European states—and a diminished German stance.35

China’s dubious role in the Ukraine war definitely has the potential to make China “lose Europe,” even if China refrains from delivering arms and ammunition to Russia.

German Foreign Minister Annalena Baerbock and Chinese Foreign Minister Qin Gang attend a joint press conference at the Diaoyutai State Guesthouse in Beijing, China. (Suo Takekuma/Pool via REUTERS)

Third, Europe has recognized China’s apparent role in the Ukraine war as a covert supporter and enabler of the Russian aggressor, and the consequences this realization has for the security of critical infrastructures in Europe that were built with Chinese technology.36 Rather than supporting Ukraine and using its influence on Russia to stop the war, China has bolstered Russia diplomatically and economically, stopping just short of violating Western sanctions that would endanger China’s economy, while failing to condemn the invasion and effectively calling in its February 2023 “Position” for a freezing of the conflict that would reward Russia’s aggression with territorial gains.37 Particularly among the post-socialist EU and NATO member states in the Baltics and in CEE, this has led to intense distrust of China and disillusionment regarding the official EU formula of China as a “partner, competitor and rival” of the EU.38 The final outcome of this reevaluation will largely depend on China’s further actions of support for Russia—or its refraining from such support, as it may be. Against the backdrop of negative experiences with Chinese “wolf warrior diplomats” during the pandemic, and following coercive diplomacy, China’s dubious role in the Ukraine war definitely has the potential to make China “lose Europe,” even if China refrains from delivering arms and ammunition to Russia.39 Previous Chinese Foreign Minister Wang Yi’s hostile stance during the February 2023 Munich Security Conference, and a rather aggressive first speech by China’s new Foreign Minister Qin Gang, do not seem to offer much hope in this regard.40

Moreover, Europeans have come to realize that war over Taiwan could break out, despite the risk of nuclear escalation and despite the huge economic constraints in place, and regardless of the political risk such a war would pose to China’s leaders.41 Given Putin’s complete disregard for such constraints when following through with his attack plan, Europeans have had to accept that their assumptions about the economic rationale as a deterring factor in security-political decision-making of autocratic countries can no longer be relied upon, and that military forms of deterrence are ultimately more meaningful.42 The notion that China’s even greater degree of economic dependence on the outside world than Russia’s would serve as sufficient deterrent against military adventurism, therefore, might not hold. Consequently, there has been a palpable uptick in European analyses and discussions surrounding the risk of escalation in the Taiwan Strait, possible military and economic consequences, and Europe’s role in such a scenario, while exchanges with Western and South Pacific NATO partner states have markedly increased. French President Macron’s initiative during his early April 2023 China visit of implying that Taiwan is not Europe’s problem was quickly rebutted across European capitals, and Germany’s Foreign Minister Annalena Baerbock made it a point during her subsequent China visit to name war over Taiwan a “horror scenario” that would send “shock waves” around the world and deeply affect Europe.43

Finally, European countries in general, and NATO members in particular, have a newfound appreciation of the United States as the ultimate security provider for European NATO member states. Particularly in Germany and France, the realization that a European “strategic autonomy” remains a pipe dream for the foreseeable future due to lack of capabilities, and the fact that Ukraine’s defense effort would likely not be viable without massive US support, has been an unwelcome, yet necessary, reality check.44 Finland and Sweden’s applications for NATO accession are a testament to the indispensability of the nuclear umbrella provided by US forces to frontline NATO states. Russia’s decision to withdraw from the New Strategic Arms Reduction Treaty (New START), the nuclear blackmail it employed to keep Western countries from intervening on behalf of Ukraine, and China’s massive expansion of its nuclear arsenal all run counter to European hopes of creating effective arms-control regimes and working toward nuclear threat reduction.45 Six years after the International Campaign to Abolish Nuclear Weapons (ICAN) was awarded the Nobel Peace Prize, Europeans are needing to accept that there is currently no substitute for nuclear deterrence in the face of the Russian—and, potentially, the Chinese—threat, and that the global trend points toward more nuclear-armed states in the medium term rather than successful arms reduction.46 This also implies a newfound sense of European vulnerability to exposure, should the United States become tied down in a conflict with China. All in all, Europe is still reeling from the shock of the war and the challenge it poses to long-held assumptions of economic interdependence and institutionalism as the effective and civilized way to resolve conflicts. Regardless of the war’s ultimate outcome, it is already clear that its humanitarian, economic, political, and security consequences massively complicates the way European states will calibrate their exchanges with China going forward.

Implications of conflicting lessons for deterrence

The collision of these conflicting “lessons” could result in a deterrence trap. If the US increasingly acts on its conviction that China plans to attack on its own initiative in the next few years, the United States is likely to put enormous pressure on Taiwan to prepare to become the next Ukraine, and its self-imposed restraints on security assistance will further erode. US fear of a Chinese attack would increasingly drive a deepening cycle that is bound to cross at least some of China’s red lines.

Deterrence traps, of course, usually have more than one moving part; for its part, China’s actions drive this dangerous dynamic more strongly than those of the United States. China keeps moving the red lines, conducting increasingly provocative military operations around Taiwan, creating provocative situations (such as its “blockade drill” after Speaker Nancy Pelosi’s August 2022 visit to Taiwan, which included the unprecedented shooting of ballistic missiles over the island), and intensifying efforts to choke off Taiwan’s international breathing space.47 Honduras’ switch to China leaves Taipei with only thirteen formal diplomatic partners as of April 2023, demonstrating that Beijing’s “checkbook diplomacy” threatens to flip others soon and making Taipei more reliant on the United States, Japan, and the EU to prevent greater isolation. And, crucially, if war over Taiwan ever breaks out, it will have been because China chose to use lethal force against Taiwan for the first time since 1958, not the other way around.

Upping the military ante to some degree seems necessary as long as China is changing its military posture and behaving aggressively.

An F/A-18E Super Hornet flies over the flight deck of the Navy’s only forward-deployed aircraft carrier USS Ronald Reagan in the South China Sea. (US Navy)

The key question, therefore, is what steps Washington, Taipei, and others can take to preserve a stable status quo without fueling tensions. Upping the military ante to some degree seems necessary as long as China is changing its military posture and behaving aggressively. The United States is far from alone in seeing a military threat from China, as that perception is shared within much of the region (including Japan, Australia, Vietnam, the Philippines etc.), and even Europeans are becoming increasingly worried, despite remaining relatively inattentive to the military details of China’s behavior.

The Ukraine war, therefore, offers all sides a chance to learn how such a situation can be avoided: signaling weakness and indecisiveness on the part of the West before February 24, in any case, was not helpful in avoiding the Ukraine war. In the case of China, there is no reason to assume that signaling weakness and indecisiveness will yield any better outcome. In other words, there is a chance to drive home to China the great risks of going to war, and to signal allied resolve in aiming to avoid a second scenario of the same type as that in Ukraine. However, the Ukraine example has limits when applied to Taiwan, where China’s decision to use force—either to convince Washington or Taipei to reverse actions that cross Beijing’s long-established “red lines” (formal independence, a US military alliance) or to compel unification—likely would not be as opportunistic, or as lacking in constructive strategic aims, as Moscow’s decision to invade Ukraine.

Policy recommendations

The collision of these conflicting “lessons” identified by the United States, China, and Europe could result in a deterrence trap, and China’s actions drive this dangerous dynamic more strongly than those of the United States. However, Washington, Taipei, Brussels, and others can still play important roles in preserving stability without fueling tensions.

  • Allies must analyze, and urgently address, the reasons why deterrence failed in Ukraine. A key lesson to draw from the Ukraine war should be the realization that deterrence failed for a number of reasons, including naiveté and wishful thinking; a willingness among allies to make themselves overly dependent on Russian energy supplies; a lack of resolve in showing a unified front before aggression; and disregard for basic military preparedness among most of the allies.
  • Non-kinetic scenarios might be China’s favored option for subduing Taiwan, and could be difficult to effectively address as allies. In light of the military difficulties Russia is experiencing in Ukraine, which came as a surprise to the Chinese leadership, it can be assumed that China might prefer non-military or less decisive options of coercing Taiwan if at all possible, short of a PRC perception that Taiwan has taken actions tantamount to a declaration of independence or an explicit US defense commitment. Allies should wargame and prepare for such non-kinetic scenarios, including blockades, hybrid attacks, and subversion, because a less than clear-cut case of aggression might prove far more difficult to react to as united allies than a clearly attributable violation of the United Nations (UN) Charter as in the case of the Ukraine war.
  • Information warfare over Taiwan presents a key challenge for allies. Just like Russia, China is highly effective at using information and psychological warfare to its advantage. Likeminded countries in the transatlantic and Indo-Pacific communities should identify and address, in a timely fashion, any false narratives China is spreading to sow discord among them or to shape perceptions in the Global South that are detrimental to the goal of upholding the UN Charter and the principles of the rules-based international order.
  • “Anti-colonial” and “anti-hegemonial” self-justifying narratives by aggressor states targeting audiences in the Global South should be countered more effectively. China and Russia are jointly positioning themselves as “anti-hegemonial” champions of a multipolar world order and, in some cases, are successful despite the fact that Russia is fighting to regain a former colony, or that the PRC threatens war as it seeks “reunification” over Taiwan, which it has never controlled. Transatlantic allies should, therefore, make sure to correct this self-representation by publicly addressing China’s violations of its own 2013 Friendship and Cooperation Treaty with Ukraine, signed by Xi Jinping himself, in which China reinforced the security guarantee extended to Ukraine in recognition of its voluntary relinquishment of its nuclear arms via the Budapest Memorandum (Article 2); pledged to assist Ukraine in the protection of its territorial integrity (Article 5), promised not to take any action prejudicial to the sovereignty, security or territorial integrity of Ukraine (Article 6), and is bound to hold “urgent consultations” with Ukraine to develop measures to counter a threat in case of a crisis (Article 7).48 Despite China’s obligations under this treaty, Xi didn’t reach out to Zelenskyy until more than a year after the Russian invasion began.49 Ukraine, for its part, has always upheld its treaty obligations to China.50
  • Allies should not put too much hope in a “wedge” strategy. Though some political leaders still harbor hopes of driving a wedge between China and Russia, and incentivizing China to work against Russia, there is currently no reason to believe such an approach might yield viable results. Rather, based on recent Chinese leaders’ consistent actions and rhetoric, allies should assume that Beijing continues to share Russia’s strategic vision of challenging, and fundamentally revising, the international rules-based order (as laid out in their joint statement of February 4, 2022). China can, at best, be hindered from throwing its full weight behind Russia in this war, but not weaned from Russia as long as Xi Jinping is in power, due to the countries’ mutual synergies and shared geopolitical interests.51
  • Sharing intelligence can bolster credibility and unity among allies and beyond. The US strategy of sharing intelligence prior to the Ukraine war, and the accuracy of that intelligence, was highly effective in foiling a Russian surprise attack and bolstering US credibility among allies. This approach should also be continued with regard to China’s military actions in the Western Pacific. Care should be taken, however, not to repeat the mistake of sharing unreliable assessments, as in the infamous Iraq “weapons of mass destruction” analysis, which damaged US credibility in Europe at the time.

Although NATO is chiefly concerned with the European theater, its member states represent a sizeable share of global GDP, and the economic deterrence they can provide toward China is not to be discounted.

French President Emmanuel Macron talks to other European leaders during the second day of the European Union leaders summit in Brussels, Belgium October 18, 2019. (Aris Oikonomou/Pool via REUTERS)

  • Frustrations notwithstanding, European allies make valuable contributions to security. From the US perspective, notwithstanding its predilection toward working with the United Kingdom and its existing frustrations with large EU and NATO partners Germany and France, Europe as a whole should not be discounted as a valuable security partner—including as a partner for routine engagement to better understand and track China’s capabilities and intent toward Taiwan in the military, economic, information, and political domains. In particular, the Nordic, Baltic, and many CEE states, and NATO as an organization, have proven capable of quickly drawing meaningful security-related conclusions from the Ukraine war. NATO accession by Finland, soon followed by Sweden’s, can be expected to improve NATO’s effectiveness as a whole, since at least Finland is going to be a net security provider—for instance, in a scenario of the Baltic states coming under threat. Although NATO is chiefly concerned with the European theater, its member states represent a sizeable share of global GDP, and the economic deterrence they can provide toward China is not to be discounted.

Conclusion

The lessons that Washington and Beijing appear to be learning from Russia’s February 2022 invasion of Ukraine and Ukraine’s resistance and counteroffensive, in terms of military effectiveness and deterrence, could set the stage for a crisis over Taiwan in the next few years if those lessons are not accompanied by simultaneous efforts to defuse tensions where that is possible. European allies, just like US allies in Asia, can—and should—play a key role in this. For that, it is necessary to think of Eastern Europe and the Western Pacific not as two distinct theaters, but as interlinked theaters where events in one will inevitably have repercussions in the other. In other words, despite the cost, supporting Ukraine is not a detraction from deterring China if it leads to an outcome in which Russian aggression is thwarted, as that also enhances deterrence regarding Taiwan. At the same time, when the United States is focusing more strongly on the Western Pacific, Europeans need to cease seeing this as “abandoning Europe,” and instead step up their own game to bolster the rules-based international order both at home and abroad, with the means at their disposal.

Understanding more closely why deterrence failed in Ukraine, and exploring how these lessons could be applied to enhancing deterrence, bolstering diplomatic initiatives, and, thereby, hopefully defusing tensions over Taiwan should be high on the agenda of the entire Alliance. After all, all members share the same interest, as does China: finding out how to avoid sleepwalking into a global war.

Acknowledgements

This publication was produced under the auspices of a project conducted in partnership with the Norwegian Ministry of Foreign Affairs focused on the impact of China on the transatlantic relationship.

About the authors

John K. Culver is a nonresident senior fellow with the Atlantic Council’s Global China Hub and a former Central Intelligence Agency (CIA) senior intelligence officer with thirty-five years of experience as a leading analyst of East Asian affairs, including security, economic, and foreign-policy dimensions.

Previously as national intelligence officer for East Asia from 2015 to 2018, Culver drove the Intelligence Community’s support to top policymakers on East Asian issues and managed extensive relationships inside and outside government. He produced a large body of sophisticated, leading-edge analysis and mentored widely on analytic tradecraft. He also routinely represented the Intelligence Community to senior US policy, military, academic, private-sector and foreign-government audiences.

Culver is a recipient of the 2013 William L. Langer Award for extraordinary achievement in the CIA’s analytic mission. He was a member of the Senior Intelligence Service and CIA’s Senior Analytic Service. He was also awarded the Distinguished Career Intelligence Medal.

Dr. Sarah Kirchberger is a nonresident senior fellow with the Scowcroft Center for Strategy and Security. She serves as head of Asia-Pacific Strategy and Security at the Institute for Security Policy at Kiel University (ISPK) and vice president of the German Maritime Institute (DMI). Her current work focuses on maritime security in the Asia-Pacific region, emerging technologies in the maritime sphere, Russian–Chinese military-industrial relations, China’s arms industries, and China’s naval and space development.

Before joining ISPK she was assistant professor of contemporary China at the University of Hamburg, and previously worked as a naval analyst with shipbuilder TKMS Blohm + Voss. She is the author of Assessing China’s Naval Power: Technological Innovation, Economic Constraints, and Strategic Implications (2015). Her earlier work includes a monograph on informal institutions in the Chinese and Taiwanese political systems as well as studies of reform discourses within the Communist Party of China and of Mainland Chinese perceptions of Taiwan’s post-war transformation. She completed undergraduate and graduate studies in Sinology, Political Science and Archaeology in Hamburg, Taipei, and Trier and holds an MA and a PhD in Sinology from the University of Hamburg.

The Transatlantic Security Initiative, in the Scowcroft Center for Strategy and Security, shapes and influences the debate on the greatest security challenges facing the North Atlantic Alliance and its key partners.

The Global China Hub researches and devises allied solutions to the global challenges posed by China’s rise, leveraging and amplifying the Atlantic Council’s work on China across its sixteen programs and centers.

1    John A. Tirpak, “IISS: China’s Aggressive Exercises Near Taiwan Are a ‘New Normal,’’ Air & Space Forces Magazine, February 7, 2022, https://www.airandspaceforces.com/iiss-china-aggressive-exercises-near-taiwan-new-normal/; Keoni Everington, “China Reportedly Approves Resolution to Make ‘Taiwan Separatists’ Kill List,” Taiwan News, March 7, 2023, https://www.taiwannews.com.tw/en/news/4828473; “China’s New Reservist Law: Preparing for War,” TableChina, February 9, 2023, https://table.media/china/en/opinion/chinas-new-military-service-law-preparing-for-war; Jude Blanchette and Ryan Hass, “To Deter Beijing, What the United States Says Matters,” Center for Strategic and International Studies, February 2, 2023, https://www.csis.org/analysis/deter-beijing-what-united-states-says-matters.
2    President Xi Jinping Has a Video Call with US President Joe Biden,” Ministry of Foreign Affairs of the People’s Republic of China, March 19, 2022, https://www.fmprc.gov.cn/mfa_eng/zxxx_662805/202203/t20220319_10653207.html.
3    “When Xi Jinping Visited the Members of the CPPCC Meeting, He Emphasized That the Private Economy Should Be Correctly Guided to Develop in a Healthy and High-Quality Way. Wang Huning, Cai Qiding, Ding Xuexiang and Xue Xiang Participated in the Visit and Discussion,” Xinhua, March 6, 2023, http://www.news.cn/politics/leaders/2023-03/06/c_1129417096.htm.
4    Joint Statement of the Russian Federation and the People’s Republic of China on the International Relations Entering a New Era and the Global Sustainable Development,” President of Russia, April 6, 2023, http://en.kremlin.ru/supplement/5770.
5    “Wang Yi Meets with Russian Foreign Minister Sergey Lavrov,” Ministry of Foreign Affairs of the People’s Republic of China, February 22, 2023, https://www.fmprc.gov.cn/mfa_eng/wjdt_665385/wshd_665389/202302/t20230224_11030933.html; Nectar Gan, “China’s Xi Jinping Makes ‘Journey of Friendship’ to Moscow Days after Putin’s War Crime Warrant,” CNN, March 20, 2023, https://edition.cnn.com/2023/03/20/china/china-xi-putin-russia-visit-analysis-intl-hnk-mic/index.html.
6    Michael Kofman, “The Emperors League: Understanding Sino-Russian Defense Cooperation,” War on the Rocks, August 6, 2020, http://warontherocks.com/2020/08/the-emperors-league-understanding-sino-russian-defense-cooperation/.
7    Jon Jackson, “Russia Has 97 Percent of Army Deployed in Ukraine: U.K.,” Newsweek, February 15, 2023, https://www.newsweek.com/russia-97-percent-army-deployed-ukraine-1781430.
8    Simone McCarthy, “Chinese ambassador sparks European outrage over suggestion former Soviet states don’t exist,” CNN, April 25, 2023, https://www.cnn.com/2023/04/24/china/china-ambassador-lu-shaye-baltic-soviet-states-europe-intl-hnk/index.html.
9    Simone McCarthy, “With Zelensky call, Xi Jinping steps up bid to broker peace – but does he have a plan?” CNN, April 27, 2023, https://www.cnn.com/2023/04/27/china/china-ukraine-xi-jinping-zelensky-call-analysis-intl-hnk/index.html.
10    Jorge Liboreiro, “China and India vote for UN resolution with a reference to Russia’s ‘aggression’ against Ukraine,” EuroNews, May 2, 2023, https://www.euronews.com/my-europe/2023/05/02/china-and-india-vote-for-un-resolution-with-a-reference-to-russias-aggression-against-ukra.
11    Ivana Karásková, “How China Lost Central and Eastern Europe,” Mercator Institute for China Studies, April 22, 2022, https://www.merics.org/en/short-analysis/how-china-lost-central-and-eastern-europe.
12    Stuart Lau, “New Czech President Risks China’s Rage with Call to Taiwanese Leader,” Politico, January 30, 2023, https://www.politico.eu/article/petr-pavel-czech-president-elect-taiwan-tsai-ing-wen-china-military/.
13    Sophia Barkoff, “CIA Confirms Possibility of Chinese Lethal Aid to Russia,” CBS News, February 25, 2023, https://www.cbsnews.com/news/cia-director-bill-burns-china-russia-lethal-aid/.
14    Milda Seputyte and Ott Tammik, “Latvia, Estonia Join Lithuania in Abandoning Eastern Europe-China Cooperation,” Bloomberg, August 11, 2022, https://www.bloomberg.com/news/articles/2022-08-11/baltic-states-abandon-eastern-european-cooperation-with-china?leadSource=uverify%20wall; Sarah Marsh and Andreas Rinke, “Germany Could Ban China’s Huawei, ZTE from Parts of 5G Networks—Source,” Reuters, March 7, 2023, https://www.reuters.com/technology/germany-set-ban-chinas-huawei-zte-parts-5g-networks-source-2023-03-07.
15    Speech by the President on EU-China Relations,” European Commission, March 30, 2023, https://ec.europa.eu/commission/presscorner/detail/en/speech_23_2063; Stuart Lau, “EU’s von Der Leyen Calls for Tougher Policy on China Ahead of Beijing Visit,” Politico, March 30, 2023, https://www.politico.eu/article/eus-ursula-von-der-leyen-xi-jinping-calls-for-tougher-policy-on-china-ahead-of-beijing-visit.
16    Jonathan Masters and Will Merrow, “How Much Aid Has the U.S. Sent Ukraine? Here Are Six Charts,” Council on Foreign Relations, February 22, 2023, https://www.cfr.org/article/how-much-aid-has-us-sent-ukraine-here-are-six-charts; Kinsey Lindstrom, “Army Celebrates Production of 50,000th GMLRS Rocket and Its Continued Evolution,” Defense Visual Information Distribution Service, January 12, 2021, https://www.dvidshub.net/news/386831/army-celebrates-production-50000th-gmlrs-rocket-and-its-continued-evolution.
17    Kara Scannell, et al., “Donald Trump Indicted by Manhattan Grand Jury on More than 30 Counts Related to Business Fraud,” CNN, March 30, 2023, https://edition.cnn.com/2023/03/30/politics/donald-trump-indictment/index.html.
18    Ellen Nakashima, “Taiwan Frustrated by Weapons Delays, Key Lawmaker Finds in Stealth Visit,” Washington Post, February 22, 2023, https://www.washingtonpost.com/national-security/2023/02/22/taiwan-weapons-china-gallagher.
19    “China’s Position on the Political Settlement of the Ukraine Crisis,” Ministry of Foreign Affairs of the People’s Republic of China, February 24, 2023, https://www.fmprc.gov.cn/mfa_eng/zxxx_662805/202302/t20230224_11030713.html.
20    “CHIPS and Science Act Will Lower Costs, Create Jobs, Strengthen Supply Chains, and Counter China,” White House, August 9, 2022, https://www.whitehouse.gov/briefing-room/statements-releases/2022/08/09/fact-sheet-chips-and-science-act-will-lower-costs-create-jobs-strengthen-supply-chains-and-counter-china.
21    “2022 National Defense Strategy,” US Department of Defense, October 27, 2022, https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.PDF.
22    Julian E. Barnes and Adam Entous, “The U.S. Intelligence Playbook to Expose Russia’s Ukraine War Plans,” New York Times, February 23, 2023, https://www.nytimes.com/2023/02/23/us/politics/intelligence-russia-us-ukraine-china.html.
23    Hope Yen, “CIA Chief: China Has Some Doubt on Ability to Invade Taiwan,” Associated Press, February 26, 2023, https://apnews.com/article/russia-ukraine-taiwan-politics-united-states-government-eaf869eb617c6c356b2708607ed15759.
24    Nahal Toosi and Lara Seligman, “The U.S. Overestimated Russia’s Military Might. Is It Underestimating China’s?” Politico, June 15, 2022, https://www.politico.com/news/2022/06/15/china-military-00039786.
25    Keir Giles, “Russia’s Nuclear Blackmail Is a Spectacular Success for Putin,” CNN, March 29, 2023, https://www.cnn.com/2023/03/29/opinions/russia-putin-nuclear-blackmail-belarus-giles/index.html.
26    Harlan Ullman, “Self-Deterrence Does Not Work,” Hill, March 14, 2022, https://thehill.com/opinion/national-security/597985-self-deterrence-does-not-work.
27    Wilhelmine Preussen, “NATO Membership for Ukraine Would Have Prevented War, Says Finland’s PM,” Politico,  January 17, 2023, https://www.politico.eu/article/nato-membership-ukraine-would-have-prevented-russia-war-finland-sanna-marin-prime-minister-says.
28    Gunter Schubert, “Is Taiwanese Society Ready to Face a Belligerent China?” CommonWealth Magazine, June 9, 2021, https://english.cw.com.tw/article/article.action?id=3007.
29    Isabel Muttreja and Bernhard Blumenau, “How Russia’s Invasion Changed German Foreign Policy,” Chatham House, November 18, 2022, https://www.chathamhouse.org/2022/11/how-russias-invasion-changed-german-foreign-policy; Sylvie Kauffmann, “There Are Too Many Russian Skeletons in France’s Closets,” Le Monde, February 8, 2023, https://www.lemonde.fr/en/opinion/article/2023/02/08/there-are-too-many-russian-skeletons-in-france-s-closets_6014938_23.html; “Russia-Friendly Austria Breaks with Its Neutrality: ‘Enough Is Enough,’” Vindobona, March 2, 2022, https://www.vindobona.org/article/russia-friendly-austria-breaks-with-its-neutrality-enough-is-enough.
30    Kristin Haugevik Øyvind Svendsen, “More Alignment in Nordic States’ Security and Defence Policies,” Norsk Utenrikspolitisk Institutt, December 8, 2021, https://www.nupi.no/en/news/more-alignment-in-nordic-states-security-and-defence-policies; Sinéad Baker, “After Years of Being Ignored, the Countries That Know Putin’s Russia the Best Have Been Proved Totally Right,” Business Insider, October 8, 2022, https://www.businessinsider.com/countries-that-warned-about-russia-have-been-vindicated-2022-9; David Hutt, “Central and Eastern Europe Want More Security Clout. Will Increased Spending Be Enough?” Euronews, February 14, 2023, https://www.euronews.com/my-europe/2023/02/14/central-and-eastern-europe-want-more-security-clout-will-increased-spending-be-enough.
31    Teri Schultz, “In Defense, Finland Prepares for Everything,” Deutsche Welle, October 4, 2017, https://www.dw.com/en/finland-wins-admirers-with-all-inclusive-approach-to-defense/a-40806163.
32    Max Bergmann, Ilke Toygür, and Otto Svendsen, “A Continent Forged in Crisis: Assessing Europe One Year into the War,” Center for Strategic and International Studies, February 26, 2023, https://www.csis.org/analysis/continent-forged-crisis-assessing-europe-one-year-war.
33    “EU Agrees 2-Billion-Euro Ammunition Plan for Ukraine,” France24, March 20, 2023, https://www.france24.com/en/live-news/20230320-eu-hammers-out-2-bn-euro-ammunition-plan-for-ukraine.
34    “Policy Statement by Olaf Scholz, Chancellor of the Federal Republic of Germany and Member of the German Bundestag, 27 February 2022 in Berlin,” Bundesregierung, February 27, 2022, https://www.bundesregierung.de/breg-en/news/policy-statement-by-olaf-scholz-chancellor-of-the-federal-republic-of-germany-and-member-of-the-german-bundestag-27-february-2022-in-berlin-2008378.
35    Lucas Robinson, “Germany’s Identity Crisis: European Security After Russia’s Invasion of Ukraine,” EGF, April 7, 2022, https://egfound.org/2022/04/germanys-identity-crisis-european-security-after-russias-invasion-of-ukraine; Piotr Buras, “East Side Story: Poland’s New Role in the European Union,” European Council on Foreign Relations, February 16, 2023, https://ecfr.eu/article/east-side-story-polands-new-role-in-the-european-union.
36    Stuart Lau, “You Ain’t No Middleman: EU and NATO Slam China’s Bid to Be a Ukraine Peacemaker,” Politico, February 24, 2023, https://www.politico.eu/article/ukraine-war-russia-china-negotiations-diplomacy-nato-europe-diplomacy-peacemaker.
37    “China’s Position on the Political Settlement of the Ukraine Crisis.”
38    Josep Borrell, “The EU Needs a Strategic Approach for the Indo-Pacific,” Delegation of the European Union to the United States of America, March 12, 2021, https://www.eeas.europa.eu/eeas/eu-needs-strategic-approach-indo-pacific_en?s=253.
39    Chun Han Wong and Chao Deng, “China’s ‘Wolf Warrior’ Diplomats Are Ready to Fight,” Wall Street Journal, May 19, 2020, https://www.wsj.com/articles/chinas-wolf-warrior-diplomats-are-ready-to-fight-11589896722; Matthew Reynolds and Matthew P. Goodman, “China’s Economic Coercion: Lessons from Lithuania,” Center for Strategic and International Studies, May 6, 2022, https://www.csis.org/analysis/chinas-economic-coercion-lessons-lithuania.
40    “China in the World,” Munich Security Conference, last visited April 12, 2023, https://securityconference.org/en/msc-2023/agenda/event/china-in-the-world.
41    “Taiwan Strait Crisis: Implications for Europe,” Central European Institute of Asian Studies, October 2, 2022, https://ceias.eu/taiwan-strait-crisis-implications-for-europe.
42    Anniki Mikelsaar, “Taiwan and Europe—Far Away, Not Worlds Apart,” International Centre for Defence and Security, August 16, 2022, https://icds.ee/en/taiwan-and-europe-far-away-not-worlds-apart.
43    Nicolas Camut, “Macron’s China remarks are a ‘disaster’ for Europe, EU conservative leader says,” Politico, April 17, 2023,  https://www.politico.eu/article/macrons-china-remarks-disaster-for-europe-eu-conservative-leader-says-us-manfred-weber-italian-daily-corriere-della-sera/; Philip Oltermann, “German foreign minister warns of ‘horror scenario’ in Taiwan strait,” The Guardian, April 14, 2023,  https://www.theguardian.com/world/2023/apr/14/germany-annalena-baerbock-warns-horror-scenario-taiwan-strait-china.
44    Fraser Cameron, “EU Strategic Autonomy—A Perennial Pipe Dream?” European Policy Centre, January 27, 2022, https://www.epc.eu/en/publications/EU-strategic-autonomy-A-perennial-pipe-dream~4565a0.
45    Mary Ilyushina, Robyn Dixon, and Niha Masih, “Putin Says Russia Will Suspend Participation in New START Nuclear Treaty,” Washington Post, February 21, 2023, https://www.washingtonpost.com/world/2023/02/21/putin-speech-ukraine-state-of-nation; “2022 China Military Power Report,” US Department of Defense, 2002, https://media.defense.gov/2022/Nov/29/2003122279/-1/-1/1/2022-MILITARY-AND-SECURITY-DEVELOPMENTS-INVOLVING-THE-PEOPLES-REPUBLIC-OF-CHINA.PDF.
46    Max Bergmann and Sophia Besch, “Why European Defense Still Depends on America,” Foreign Affairs, March 7, 2023, https://www.foreignaffairs.com/ukraine/why-european-defense-still-depends-america.
47    Greg Torode and Yew Lun Tian, “Risks Mount from China Drills near Taiwan during Pelosi Visit—Analysts,” Reuters, August 3, 2022, https://www.reuters.com/world/china/risks-mount-china-drills-near-taiwan-during-pelosi-visit-analysts-2022-08-03.
48    “INDOPACOM Report: ‘PRC-Russia Cooperation—Spotlighting PRC’s Continued Support to Russia Despite Legal Commitments to Ukraine,’” Andrew S. Erickson (blog), February 25, 2023, https://www.andrewerickson.com/2023/02/indopacom-report-prc-russia-cooperation-spotlighting-prcs-continued-support-to-russia-despite-legal-commitments-to-ukraine; “中华人民共和国和乌克兰友好合作条约[PRC-Ukraine Treaty of Friendship & Cooperation]”, People’s Republic of China Treaty Database, Dec. 5, 2013, http://treaty.mfa.gov.cn/tykfiles/20180718/1531877012440.pdf.
49    Simone McCarthy, “With Zelensky call, Xi Jinping steps up bid to broker peace – but does he have a plan?” CNN, April 27, 2023, https://www.cnn.com/2023/04/27/china/china-ukraine-xi-jinping-zelensky-call-analysis-intl-hnk/index.html.
50    “2013 PRC-Ukraine Treaty of Friendship & Cooperation/Joint Communiqué: Russian, Ukrainian & Chinese Documents, Context, Timeline,” Andrew S. Erickson (blog), August 21, 2022,https://www.andrewerickson.com/2022/08/2013-prc-ukraine-treaty-of-friendship-cooperation-joint-communique-russian-ukrainian-chinese-documents-context-timeline.
51    Kofman, “The Emperors League.”

The post US-China lessons from Ukraine: Fueling more dangerous Taiwan tensions appeared first on Atlantic Council.

]]>
Webster quoted in the Wall Street Journal on Chinese exports of armored trucks to Russia https://www.atlanticcouncil.org/insight-impact/in-the-news/webster-quoted-in-the-wall-street-journal-on-chinese-exports-of-armored-trucks-to-russia/ Fri, 09 Jun 2023 20:00:40 +0000 https://www.atlanticcouncil.org/?p=671968 The post Webster quoted in the Wall Street Journal on Chinese exports of armored trucks to Russia appeared first on Atlantic Council.

]]>

The post Webster quoted in the Wall Street Journal on Chinese exports of armored trucks to Russia appeared first on Atlantic Council.

]]>
Ukraine’s summer counteroffensive will aim to keep the Russians guessing https://www.atlanticcouncil.org/blogs/ukrainealert/ukraines-summer-counteroffensive-will-aim-to-keep-the-russians-guessing/ Wed, 07 Jun 2023 21:00:33 +0000 https://www.atlanticcouncil.org/?p=653160 Speculation is mounting that Ukraine's hotly anticipated summer counteroffensive may be underway but initial stages are likely to feature probes and diversionary attacks rather than a big push, writes Peter Dickinson.

The post Ukraine’s summer counteroffensive will aim to keep the Russians guessing appeared first on Atlantic Council.

]]>
Is Ukraine’s hotly anticipated counteroffensive finally underway? That is the question dominating much of the international media this week following reports from both the Ukrainian and Russian sides of a significant upswing in activity along the front lines in southern and eastern Ukraine.

This speculation is understandable; after all, expectations have been mounting since early 2023 over an offensive that is being widely billed as a potential turning point in the sixteen-month war. It may be more helpful, however, to view Ukraine’s counteroffensive as a rolling series of local probes and thrusts rather than a single big push to penetrate Russian defenses and secure a decisive breakthrough.

Talk of a coming Ukrainian counteroffensive began following the liberation of Kherson from Russian occupation in late 2022. In the six months since that last major military success, Ukraine has sent tens of thousands of fresh troops for training in NATO countries and received unprecedented amounts of Western military aid including modern battle tanks, cruise missiles, armored personnel carriers, and enhanced air defense systems. With these newly trained and equipped formations now believed to be largely in position, observers have been watching for indications that the offensive is indeed underway. Ukrainian President Volodymyr Zelenskyy added to the sense of anticipation by declaring in a June 3 interview with the Wall Street Journal: “We are ready” for the counteroffensive.

Anyone expecting to witness major battles is set to be disappointed, at least for the time being. While the long lines of opposing trenches and emphasis on artillery duels has led many to compare the fighting in Ukraine to the horrors of World War I, few expect the Ukrainian military to begin its counteroffensive by going “over the top” and attempting to smash through Russian lines with their newly formed brigades. Instead, Ukrainian commanders will likely seek to test Russian defenses at a number of locations along the length of the 1,000-kilometer front in a bid to stretch Vladimir Putin’s invasion force and identify weak points to exploit.

A series of recent cross-border incursions into the Russian Federation conducted by Ukrainian-backed Russian militias may be part of these efforts. While militarily insignificant in terms of size or territorial gains, the raids have proved a major personal embarrassment for Putin and could force Moscow to reduce its military presence in Ukraine in order to bolster the badly exposed home front.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

As they look to advance, Ukraine’s troops will face formidable obstacles. Russia has not sat idly by during the past half-year; it has created a defense in depth in anticipation of Ukraine’s coming attack that includes several lines of trenches and other fortifications.

Russia appears to have provided an indication of its resolve early on June 6 by blowing up the Kakhovka dam and power plant on the Dnipro River in southern Ukraine. While Moscow officially denies destroying the dam, initial analysis points to Russian responsibility. A June 7 New York Times article referencing engineering and munitions experts concluded that a deliberate explosion inside the Russian-controlled dam “most likely caused its collapse.” The ensuing ecological disaster has flooded the surrounding area, virtually ruling out a Ukrainian thrust across the river toward Crimea.

Moscow’s preparations for the Ukrainian counteroffensive certainly look impressive, but questions remain over the morale of Russian troops, with a steady stream of video addresses posted to social media in recent months indicating widespread demoralization among mobilized Russian soldiers complaining of poor conditions, suicidal tactics, and heavy losses. In contrast, Ukrainian morale is believed to be high, despite the large numbers of casualties incurred during intense fighting over the winter and spring months around the eastern Ukrainian city of Bakhmut.

Crucially, Ukraine’s troops are defending their homes and have a clear vision of what they are fighting for, while Russia has struggled to articulate its war aims or define what a potential victory could look like. In the heat of the coming summer counteroffensive, this morale factor could play a critical role.

Most commentators agree that the primary military objective of Ukraine’s summer counteroffensive is to cut the land bridge running across southern Ukraine that connects Russia itself and the occupied Donbas region with the Crimean peninsula. If this is achieved, it would isolate large numbers of Russian troops in Crimea and south Ukraine while dealing a painful blow to Russian prestige.

Ultimately, Ukraine’s stated goal remains the liberation of Crimea itself, which has been under Russian occupation since 2014. A successful advance toward Crimea would leave the peninsula exposed to Ukrainian airstrikes and could spark a political crisis inside Russia. The military failures of the past sixteen months have already led to significant infighting among different elements within the Russian establishment; if Crimea itself is threatened, the international community must brace for a major escalation in Putin’s nuclear threats as he attempts to ward off what would be a catastrophic defeat.

Many believe a showdown over the fate of Crimea will serve as the end game of the entire war. But before we approach that point, Ukraine must first deploy its fresh forces effectively and overcome Russia’s deeply entrenched army on the mainland. This will involve much maneuvering and diversionary attacks before any major advances are attempted.

Ukraine’s successful 2022 campaigns may offer the best indication of what to expect from the summer counteroffensive. In August 2022, Ukrainian officials loudly trumpeted a counteroffensive in the south to retake Kherson. When Russia duly dispatched many of its best units to meet the expected Ukrainian attack, Ukraine struck instead in the thinly defended east and liberated most of the Kharkiv region. With Russia still reeling from this defeat and scrambling to hold the line, the Ukrainian military then renewed its southern offensive and forced Russia to abandon Kherson.

This masterclass in the art of military deception rightfully won Ukraine considerable plaudits. Ukrainian commanders will be looking to spring some similar surprises in the months ahead. Their stated goal is the complete liberation of Ukrainian territory, but they will aim to keep the Russians guessing as to exactly how they plan to achieve this.

Peter Dickinson is the editor of the Atlantic Council’s UkraineAlert service.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Ukraine’s summer counteroffensive will aim to keep the Russians guessing appeared first on Atlantic Council.

]]>
The 5×5—Cross-community perspectives on cyber threat intelligence and policy https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-cross-community-perspectives-on-cyber-threat-intelligence-and-policy/ Tue, 30 May 2023 04:01:00 +0000 https://www.atlanticcouncil.org/?p=649392 Individuals with experience from the worlds of cyber threat intelligence and cyber policy share their insights and career advice.

The post The 5×5—Cross-community perspectives on cyber threat intelligence and policy appeared first on Atlantic Council.

]]>
This article is part of The 5×5, a monthly series by the Cyber Statecraft Initiative, in which five featured experts answer five questions on a common theme, trend, or current event in the world of cyber. Interested in the 5×5 and want to see a particular topic, event, or question covered? Contact Simon Handler with the Cyber Statecraft Initiative at SHandler@atlanticcouncil.org.

A core objective of the Atlantic Council’s Cyber Statecraft Initiative is to shape policy in order to better secure users of technology by bringing together stakeholders from across disciplines. Cybersecurity is strengthened by ongoing collaboration and dialogue between policymakers and practitioners, including cyber threat intelligence analysts. Translating the skills, products, and values of these communities between each other can be challenging but there is prospective benefit, as it helps drive intelligence requirements and keeps policymakers abreast of the latest developments and realities regarding threats. For younger professionals, jumping from one community to another can appear to be a daunting challenge.

We brought together five individuals with experience from both the worlds of cyber threat intelligence and cyber policy to share their experiences, perspectives on the dynamics between the two communities, and advice to those interested in transitioning back and forth.

#1 What’s one bad piece of advice you hear for threat intelligence professionals interested in making a transition to working in cyber policy?

Winnona DeSombre Bernsen, nonresident fellow, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council

“I have not heard bad pieces of advice specifically geared toward threat intelligence professionals, but I was told by someone once that if I wanted to break into policy, I could not focus on cyber. This is mostly untrue: the number of cyber policy jobs in both the public and the private sectors are growing rapidly, because so many policy problems touch cybersecurity. Defense acquisition? Water safety? Civil Rights? China policy? All of these issues (and many more!) touch upon cybersecurity in some way. However, cyber cannot be your only focus! As most threat intelligence professionals know, cybersecurity does not operate in a vacuum. A company’s security protocols are only as good as the least aware employee, and a nation-state’s targets in cyberspace usually are chosen to further geopolitical goals. Understanding the issues that are adjacent to cyber in a way that creates sound policy is important when making the transition.” 

Sherry Huang, program fellow, Cyber Initiative and Special Projects, William and Flora Hewlett Foundation

“I would not count this as advice, but the emphasis on getting cybersecurity certifications that is persistent in the cyber threat intelligence community is not directly helpful to working in the cyber policy space. Having technical knowledge and skills is always a plus, but in my view, having the ability to translate between policymakers and technical experts is even more valuable in the cyber policy space, and there is not a certification for that.” 

Katie Nickels, nonresident senior fellow, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council; director of intelligence, Red Canary

“I think there is a misconception that to work in cyber policy, you need to have spent time on Capitol Hill or at a think tank. I have found that to be untrue, and I think that misconception might make cybersecurity practitioners hesitant to weigh in on policy matters. The way I think of it is that cyber policy is the convergence of two fields: cybersecurity and policymaking. Whichever field is your primary one, you will have to learn about the other. Practitioners can absolutely learn about policy.” 

Christopher Porter, nonresident senior fellow, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council

“When intelligence professionals think about policy work, they often experience a feeling of personal control—‘now I get to make the decisions!’ So there is a temptation to start applying your own pet theories or desired policy outcomes and start working on persuasion. That is part of it, but in reality policymaking looks a lot like intelligence work in one key aspect—it is still a team sport. You have to have buy-in from a lot of stakeholders, many of whom will have different perspectives or intellectual approaches to the same problem. Even if you share the same goal, they may have very different tools. So just as intelligence is a team sport, policymaking is too. That is a reality that is not reflected in a lot of academic preparation, which emphasizes theoretical rather than practical policymaking.” 

Robert Sheldon, director of public policy & strategy, Crowdstrike

“I sometimes hear people treating technical career paths and policy career paths as binary–and I do not think that is the direction that we are headed as a community. People currently working in technical cybersecurity disciplines, including threat intelligence, should consider gaining exposure to policy work without fully transitioning and leaving their technical pursuits behind. This is a straightforward way to make ongoing, relevant contributions to a crowded cyber policy discourse.”

#2 What about working in threat intelligence best prepared you for a career in cyber policy, or vice versa?

Desombre Bernsen: “Threat intelligence gave me two key skills: the first is the ability to analyze a large-scale problem. Just like threat intelligence analysts, cyber policymakers must look through large systems to find chokepoints and potential vulnerabilities, while also making sure that the analytic judgments one makes about the system are sound. This skill enables one to craft recommendations that best fit the problem. The second skill is the ability to tailor briefings to different principal decisionmakers. Threat intelligence is consumed by network defenders and C-suite executives alike, so understanding at what level you are briefing is key. A chief information security officer does not care about implementing YARA rules, just like a network defender does not want their time wasted with a recommendation on altering their company-wide phishing policies. Being able to figure out what the principal cares about, and to tailor recommendations to the audience best able to action on them is applicable to the cyber policy field as well. When briefing a company or government agency, knowing their risk tolerance and organization mission, for example, helps tailor the briefing to help them understand what they can do about the problem.” 

Huang: “Being a cyber threat intelligence analyst gave me exposure to a wide variety of issues that are top of mind for government and corporate clients. In a week, I could be writing about nation-state information operations, briefing clients on cybersecurity trends in a certain industry, and sorting through data dumps on dark web marketplaces. Knowing a bit about numerous cyber topics made it easier for me to identify interest areas that wanted to pursue in the cyber policy space and, more importantly, allows me to easily understand and interact with experts on different cyber policy issue areas, which is helpful in my current role.” 

Nickels: “The ability to communicate complex information in an accessible way is a skill I learned from my threat intelligence career that has translated well to policy work. Threat intelligence is all about informing decisions, so there are many overlaps with writing to inform policy.” 

Porter: “In Silicon Valley, it is typical to have a position like ‘chief solutions architect.’ I have spent most of my career in intelligence being the ‘chief problems architect.’ It is the nature of the job to look for threats, problems, and shortcomings. Policymakers have the inverse task—to imagine a better future and build it, even if that is not the path we are on currently. But still, I think policymakers need to keep in mind how their plans might fail or lead to unintended consequences. When it comes to cybersecurity, new policies almost never eliminate a threat, they only change its shape. Much like the end to Ghostbusters, you get to choose the kind of problem you are going to face, but not whether or not you face one. Anyone with a background in intelligence will be ready for that step, where you have to imagine second- and third-order implications beyond the first-order effect you are seeking to have.” 

Sheldon: “Working as an analyst early in my career taught me a lot about analytical methods and rigor, evidence quality, and constructing arguments. Each of these competencies apply directly to policy work.”

#3 What realities of working in the threat intelligence world do you believe are overlooked by the cyber policy community?

Desombre Bernsen: “The cyber policy community has not yet realized that threat intelligence researchers and parts of the security community themselves—similarly to high level cyber policy decisionmakers—are targets of cyberespionage and digital transnational repression. North Korea, Russia, China, and Iran have all targeted researchers and members of civil society in cyberspace. Famously, North Korea would infect Western vulnerability researchers, likely to steal capabilities. In addition, threat intelligence researchers lack the government protections many policymakers have. Researchers that publicly lambast US adversaries can be targeted and threatened online by state-backed trolls. Protections for these individuals are few and far between—CISA just this year rolled out a program for protecting civil society members targeted by transnational repression, so I hope it gets expanded soon.” 

Huang: “Most of the time, threat intelligence analysts (at least in the private sector) do not hear from clients after a report has gone out and do not have visibility into whether their analysis and recommendations are helpful or have real-world impact. Feedback, whether positive or constructive, can help analysts fine-tune their craft and improve future analysis.” 

Nickels: “I think the cyber policy community largely considers threat intelligence to be information to be shared about breaches, often in the form of indicators like IP addresses. While that can be one aspect of it, they may not recognize that threat intelligence analysts consider much more than that. Broadly, threat intelligence is about using an understanding of how cyber threats work to make decisions. Under that broad definition, cyber policymakers have a significant need for threat intelligence—if policymakers do not know how the threats operate, they cannot determine how to create policies to help organizations better protect against them.” 

Porter: “There are aspects of the work—such as attribution—that are more reliable and not as difficult as imagined. Conversely, there are critical functions, like putting together good trends data or linking together multiple different pieces of evidence, that can be very difficult and time-intensive but seem simple to those outside the profession. So there is always a little bit of education that needs to take place before getting into a substantive back-and-forth, where the cyber intelligence community needs to explain a little bit about how they are doing their work, and the strengths and limitations of that so that everyone has the same assumptions and understands one another’s perspective.” 

Sheldon: “The policy community sometimes lacks understanding of the sources and methods that threat intelligence practitioners leverage in their analysis. This informs the overall quality of their work, the skill needed to produce it, timeliness, extensibility, the possibility for sharing, and so on. All of these are good reasons for the two communities to talk more about how they do their work.”

More from the Cyber Statecraft Initiative:

#4 What is the biggest change in writing for a threat intelligence audience vs. policymakers? 

Desombre Bernsen: “The scope is much broader. Threats to a corporate system are confined largely to the corporate system itself, but the world of geopolitics has far more players and many more first- and second-order effects of the policies you recommend.” 

Huang: “Not having to be as diligent about confidence levels! Jokes aside, it is similar in that being precise in wording and being brief and to the point are appreciated by both audiences. However, I do find that a policy audience often cares more about the forward-looking aspect and the ‘so what?’” 

Nickels: “The biggest difference is that when writing for policymakers, you are expected to express your opinion! As part of traditional intelligence doctrine, threat intelligence analysts avoid injecting personal opinions into their assessments and try to minimize the effects of their cognitive biases. Intelligence analysts might write about potential outcomes of a decision, but should not weigh in on which decision should be made. However, policymakers want to hear what you recommend. It can feel freeing to be able to share opinions, and it remains valuable to try to hedge against cognitive biases because it allows for sounder policy recommendations.” 

Porter: “Threat intelligence professionals are going to be very interested in how the work gets done, as the culture—to some degree—borrows from academic work, in terms of rewarding reproducibility of results and sharing of information. But, strictly speaking, policymakers do not care about that. Their job is to link the findings in those reports to the broader strategic context. One really only need to show enough of how the intelligence work was done to give the policymaker confidence and help them use the intelligence appropriately without understating or overstating the case. The result is that for policy audiences you end up starting from the end of the story—instead of a blog post or white paper building up to a firm conclusion, you talk about the conclusion and, depending on the level of technical understanding and skepticism on the part of the policymaker, may or may not get into the story of how things were pieced together at all.” 

Sheldon: “Good writing in both disciplines has much in common. Each should be concise, include assertions and evidence, provide context, and make unknowns clear. But there are perhaps fewer ‘product types’ relevant to core threat intelligence consumers and, in some settings, analysts can assume some fundamental knowledge base among their audience.” 

#5 Where is one opportunity to work on policy while still in industry that most people miss?

Desombre Bernsen: “You absolutely can work on policy issues while working in threat intelligence! I cannot just choose one, but I highly recommend searching for non-resident fellowship programs in think tanks (ECCRI, Atlantic Council, etc.), speaking at conferences on threat trends and their policy implications, and doing more policy through corporate threat wargaming internally.” 

Huang: “Volunteering at conferences that involve the cyber policy community, such as Policy@DEF CON and IGF-USA. These are great opportunities to support policy-focused discussions and to have deeper interactions with peers in the cyber policy space.” 

Nickels: “In the United States, one commonly missed opportunity is to reach out to elected representatives with opinions on cybersecurity legislation. Cybersecurity practitioners can also be on the lookout for opportunities to provide comments that help shape proposed regulations affecting the industry. For example, the Commerce Department invited public comments to proposed changes to the Wassenaar Arrangement around export controls of security software, and cybersecurity practitioners weighed in on how they felt the changes would influence tool development.” 

Porter: “That will vary greatly from company to company; almost universally though, you will have the opportunity to help your colleagues and future generations by providing mentorship and career development opportunities. Personnel is policy, so in addition to thinking about particular policies you might want to shape, think also about how you can shape the overall policymaking process by helping others make the most of their talents. It will take years, but, in the long run, those are the kinds of changes that are most lasting.” 

Sheldon: “Regardless of your current role, you can read almost everything relevant to the policy discourse. National strategies, executive orders, bills, commission and think tank reports, and so on are all publicly available. Unfortunately, many in the policy community are only skimming, but reading these sources deeply and internalizing them is a great basis to distinguish yourself in a policy discussion. Also, there are more opportunities than ever to read and respond to Requests for Comment from the National Institute of Standards and Technology and other government agencies, and these frequently include very technical questions.”

Simon Handler is a fellow at the Atlantic Council’s Cyber Statecraft Initiative within the Digital Forensic Research Lab (DFRLab). He is also the editor-in-chief of The 5×5, a series on trends and themes in cyber policy. Follow him on Twitter @SimonPHandler.

The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

The post The 5×5—Cross-community perspectives on cyber threat intelligence and policy appeared first on Atlantic Council.

]]>
Russian War Report: Russia fires barrage at Kyiv while UK promises ‘kamikaze’ drones https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-russia-fires-barrage-at-kyiv-while-uk-promises-kamikaze-drones/ Fri, 19 May 2023 11:00:00 +0000 https://www.atlanticcouncil.org/?p=647090 A series of Russian missile strikes directed at Kyiv were largely intercepted while the UK promises hundreds of drones. In Poland, a missile "cover up" controversy.

The post Russian War Report: Russia fires barrage at Kyiv while UK promises ‘kamikaze’ drones appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

New barrage of missiles targets Ukraine as UK promises hundreds of ‘kamikaze’ drones

Russian missile from December found in Polish forest sparks ‘cover-up’ controversy

Another barrage of missiles targets Ukraine as UK promises hundreds of ‘kamikaze’ drones

On May 16, Russian media reported that the Russian army had strengthened its positions in the Bakhmut area. According to Russian reports, four battalions have deployed around Bakhmut to prevent Ukrainian advances. The Russian Ministry of Defense said that its forces are focused on repelling Ukrainian counterattacks. Ukraine’s Deputy Defense Minister Hanna Maliar said on May 15 that Russian forces are deploying additional airborne forces to defend their flanks in Bakhmut. Russian forces appear to have made limited gains within Bakhmut.  

Another wave of Russian attacks targeted Ukraine with missiles and drones. The General Staff of the Ukrainian Armed Forces reported that, in the early hours of May 16, Russia launched six Kh-47 Kinzhal missiles from six MiG-31K aircraft at Kyiv, in addition to nine Kalibr missiles and ten S-400 and Iskander-M missiles that targeted other areas. Ukraine said its air defenses shot down most of the missiles, including six Kinzhal missiles and nine drones, of which six were Iranian-made Shahed-131/136s drones. The Russian defense ministry claimed—and US officials later confirmed—that one of the Kinzhal missiles struck a Patriot missile defense system in Kyiv. A US official told CNN that the US-made Patriot system likely suffered damage but was not destroyed. 

Elsewhere, the dam connected to the Russian-controlled Kakhovka hydroelectric power plant appears to be gushing water. A video taken on May 11 appears to show powerful streams of water flowing through the dam, which sits across the Dnipro River. The Ukrainian Center for Journalistic Investigations reported that the damage to the dam was caused by Russia. The report also cited Russian Telegram channels that claimed Russian positions were flooded and that a soldier had died as a result.  

Meanwhile, allied military aid continues to flow into Ukraine, albeit at a slower pace. On May 15, the United Kingdom said it would send Ukraine hundreds of custom-built ‘kamikaze’ drones. According to The Telegraph, the drones will have a range of more than 200 kilometers, comparable to an artillery shell. Their delivery to Ukraine is expected in the coming months.  

The German company Hensoldt said it will deliver six more TRML-4D radars compatible with the IRIS-T air defense system to Ukraine. These radars were introduced in 2018 and can detect and track up to 1,500 aerial targets at a distance of ten meters up to 250 kilometers, with an altitude reaching thirty kilometers. The radars can be used for detecting inconspicuous targets, such as hovering helicopters or low-flying cruise missiles. The combined value of the radar stations is €100 million ($108 million). Currently, Ukraine has only four TRML-4D radar systems. 

In addition, Ukraine joined the NATO Cooperative Cyber Defense Centre of Excellence on May 16, with the Ukrainian flag raised near the center’s headquarters, in Tallinn, Estonia. The center comprises thirty-one nations who exchange information, conduct research and specialist training, and undergo cyber military exercises.

Ruslan Trad, resident fellow for security research, Sofia, Bulgaria 

Russian missile from December found in Polish forest sparks ‘cover-up’ controversy

On May 10, Polish broadcaster RMF reported on preliminary findings from the Polish Air Force Institute of Technology, which found that, on December 16, 2022, a Russian KH-55 cruise missile landed in Polish territory. The missile was not discovered until April 27, 2023, when a woman came across the remains of an air-to-surface missile while riding a horse through a forest. The Russian rocket reportedly flew 300 kilometers into Polish airspace before landing in a forest in Zamość, near the northern city of Bydgoszcz, 265 kilometers northwest of Warsaw. The missile was reportedly launched from a Russian plane flying over Belarusian territory. On December 16, 2022, Russian forces fired at least seventy-six missiles toward Ukraine.  

The delayed discovery of the missile has sparked discussions about whether the Polish government tried to cover up the incident. Ukraine reportedly informed Polish armed forces on December 16 that an object, which could be a missile, was approaching Polish air space. Polish radars also spotted an unspecified object but later lost track of it near Bydgoszcz. Polish Armed Forces Operational Command reportedly initiated an immediate search, but according to Polish media outlet Onet citing high-ranking unnamed sources, the Ministry of Defense decided to halt the search after attempts to find the object were unsuccessful. RMF reported that the armed forces did not notify the prosecutor’s office about the airspace violation, meaning the investigation was not launched until months after the missile landed on Polish territory. Prime Minister Mateusz Morawiecki and President Andrzej Duda also claimed that they were not immediately notified about the incident and only learned of it in April 2023.  

On May 11, Defense Minister Mariusz Blaszczak claimed that Operational Commander of the Polish Armed Forces Tomasz Piotrowski had “failed to carry out his duties by not informing me about the object that appeared in Polish airspace, nor informing the Government Centre for Security and other services associated with the procedures.” Blaszczak also claimed that Piotrowski had “failed to launch a sufficient search for the object.” However, Chief of General Staff of the Polish Armed Forces Rajmund Andrzejczak argued on May 11 that he immediately informed his superiors about the incident, in accordance with standard procedure. Poland’s TVN24 reported that, on December 19, Blaszczak met with Piotrowski and Andrzejczak at a Christmas event for Polish soldiers.  

Donald Tusk, leader of the main opposition Civic Platform party, demanded Blaszczak’s resignation, accusing him of hiding “behind Polish generals.”

Givi Gigitashvili, research associate, Warsaw, Poland

The post Russian War Report: Russia fires barrage at Kyiv while UK promises ‘kamikaze’ drones appeared first on Atlantic Council.

]]>
What is driving the adoption of Chinese surveillance technology in Africa? https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/what-is-driving-the-adoption-of-chinese-surveillance-technology-in-africa/ Mon, 15 May 2023 13:49:00 +0000 https://www.atlanticcouncil.org/?p=818066 When examining the proliferation of Chinese surveillance systems and cyber capabilities in Africa, research disproportionately focuses on the motivations and ambitions of the supplier. This perspective, while it highlights Chinese diplomatic ambitions and corporate opportunities, ignores local features that drive the adoption of Chinese surveillance tools.

The post What is driving the adoption of Chinese surveillance technology in Africa? appeared first on Atlantic Council.

]]>

Table of Contents

Executive summary

When examining the proliferation of Chinese surveillance systems and cyber capabilities in Africa, research disproportionately focuses on the motivations and ambitions of the supplier. This perspective, while it highlights Chinese diplomatic ambitions and corporate opportunities, ignores local features that drive the adoption of Chinese surveillance tools. This paper discusses African demand factors through an examination of the primary case study of Kenya and examples from South Africa and Uganda. By drawing attention to local efforts to procure and collaborate with Chinese firms to establish public security systems, this work seeks to address the motivations behind the adoption of Chinese information and communication technology (ICT) systems, which include artificial intelligence (AI) surveillance tools and other biometric identification systems, and illustrates the consequences of the proliferation of digital surveillance tools for local and global communities. The paper emphasizes African volition—recognizing its salience—as a way to go beyond myopic representations of Africa as a passive recipient and partner in Africa-China relations.

This work examines the proliferation of Chinese surveillance tools as a dynamic multilateral process. To stem the proliferation of surveillance tools, US policy must understand African demand and accordingly help address local priorities. Accordingly, this paper assesses how demand factors contribute to the proliferation of surveillance technologies, addressing an underexplored facet of the proliferation process, while underscoring the risks of these tools’ buildup. Local procurement is critically driven by public security ambitions and justified as a means of achieving development and security aims. While these tools arrive on ostensibly permissible grounds, their acquisition and application come without public consent or robust accountability measures. It is this gap between the adoption of novel digital surveillance technologies and robust regulatory measures that inspires trepidation. Despite growing concerns over human rights violations domestically and the real risk of installed backdoors in hardware and software, African leaders continue to procure surveillance tools from the People’s Republic of China. This decision is predicated on the availability and financial feasibility of Chinese platforms as well as on the technology’s supposed capacity to address infrastructure gaps and local public security threats. Discussions of African agency that fail to underscore some of the impediments to its expression only romanticize African volition.

Issue Brief

Oct 17, 2022

China’s surveillance ecosystem and the global spread of its tools

By Bulelani Jili

This paper seeks to offer insights into how China’s domestic surveillance market and cyber capability ecosystem operate, especially given the limited number of systematic studies that have analyzed its industry objectives.

Cybersecurity

Introduction

Countries across Africa are procuring and employing surveillance tools from China. This trend is a product of China’s diplomatic strategy, its technological ambitions, and growing corporate power and reach, as well as African domestic demands. Thus, both supply and demand factors contribute to the growing proliferation of surveillance tools. A companion paper to this issue brief focused on the key “push factors” from China and their significance for Global South actors.1 This paper focuses on a diagnostic account of the pull factors in African states.

This paper is divided into three sections. It begins with a brief overview of China’s global expansion into African markets.2 This study’s focus on the proliferation and procurement of Chinese surveillance tools does not presume the party-state’s exceptional nature in the distribution of digital surveillance tools or seek to obfuscate the broader international market for surveillance tools and cyber intrusive systems, which involves Western firms. Rather, this close examination of the proliferation of Chinese public security systems is an attempt to understand China’s growing role in African ICT markets. An investigation into the spread of Chinese digital surveillance technologies in Africa offers a grounded basis for examining how party-state ambitions and corporate firm activities are entangled and, critically, meditated by local vectors. Principally, it expands our understanding of the local and global risks that the adoption of these systems entails while providing greater insight into the client decision-making process, a crucial and underexamined feature of this proliferation.

Then, this paper examines the factors driving the adoption of digital infrastructure in Africa and the consequences for civil liberties. The size and scope of this inquiry do not permit an exhaustive review of the global ecosystem of surveillance technologies. Instead, primary attention is given to the spread of public security technology from China to Africa. Kenya, South Africa, and Uganda are salient examples of broader China-Africa dynamics, and have been selected to help explore how China’s growing cyber footprint is driven by local realities in Africa, how Chinese diplomatic engagements and corporate expansion are mediated by local adoption patterns, and how these local demand factors have their own inertia that drives outcomes. The paper emphasizes African volition—recognizing its salience—as a way to go beyond myopic representations of Africa as a passive recipient and partner in Africa-China relations.

The paper draws attention to drivers for the adoption of digital infrastructure in Africa and the consequences for civil liberties. By privileging the perspective of recipient countries and their local milieu, it demonstrates not only how China promotes its products abroad but precisely how local actors adopt and help drive the proliferation and use of Chinese digital surveillance technology.3 In light of this, the paper seeks to offer both a grounded study and a systematic analysis of the global and local features at play.

Finally, this paper aims to investigate the features that motivate the procurement of these digital surveillance tools. In so doing, it demonstrates that China’s proclivity to provide aid and support to African state actors financially, regardless of their human rights record, thus rendering citizens vulnerable to the misuse of these surveillance technologies. The final sections emphasize that the risks of using these surveillance tools without adequate regulatory frameworks are vast, particularly in a region with established challenges at the intersection of crime, penury, policing, governance, and race. This paper examines the implications of the distribution of Chinese surveillance tools, including the deeper, hidden costs of their adoption, how these new digital tools challenge global norms and standards around data protection, and how American policymakers should respond to the global adoption of these tools. Addressing these questions has significant implications for international security, digital development, and global cybersecurity.

Go global

This section highlights some of the key factors that motivate the supply of ICT products into African markets. Current analysis on the distribution of Chinese surveillance tools and cyber capability platforms scrutinizes China’s diplomatic activities and questions the degree to which the party-state, with the aid of private firms, enables autocratic digital practices across the globe. These accounts speculate on the level of coordination between Beijing and its corporate actors. While the degree of coordination cannot be empirically fixed, financial incentives in the form of aid and loans are used to incentivize African state procurement and the proliferation of surveillance technologies.

Accordingly, several interconnected economic policy initiatives that helped Chinese firms gain overseas infrastructure development experience were primary contributors to China’s global expansion into African ICT markets. Surplus capital is lent abroad to create novel commercial opportunities for Chinese firms.4 The aim of assisting the internationalization of domestic firms was in part about improving Chinese brand recognition globally, easing fierce domestic competition, and exploiting commercial opportunities made available in part by the absence of US investment in Africa.5

A 2011 foreign aid white paper precisely outlines Beijing’s approach to global expansion and development aid.6 Naming this initiative “South-South cooperation,” the party-state aims to foster a remunerative orientation with African countries while also simultaneously seeking to carve out a distinct auxiliary role when compared to traditional Western development partners. Therefore, rather than promoting politically conditioned foreign aid that asks for democratic reforms or value-driven commitments like gender equity, Beijing offers aid without political conditions. While this posture suggests a “no strings attached” approach to development, it obfuscates the economic asymmetries that condition relations.7 China’s resource-backed lending finances projects while also demanding that borrowing countries commit to repaying loans with future revenues earned from their infrastructure projects or their natural resources.8 The posture of “no strings attached” to loans seeks to augment legitimacy for Beijing’s development work in the Global South while also effacing the broad economic features that prompt its engagement and responsibility for the consequences of its financial involvement on the ground.

While China’s surveillance system is confined to its national borders, the private firms that make its surveillance architecture possible are selling their tools to an African customer base. With the aid of state funding, Chinese tech firms expanded into African ICT markets. Firms like Huawei initially worked to expand internet connectivity in Kenya, but in 2014 they began selling their smart city products. Proponents of this move argue that public security systems provide vital intelligence to authorities while acting as a deterrent to criminals. Adam Lane, deputy chief executive of government affairs at Huawei Kenya, echoes this sentiment by contending that “authorities can now conduct panoramic video surveillance of Nairobi’s urban center, as well as maintain a highly agile command and dispatch setup that runs on satellite-based GPS and software-based geographic information system.”9 Yet, this sanguine outlook does not account for the real risk of exacerbating established problems like the misuse of public security systems and debt stress levels.10 While Chinese firms promise a technological fix to traditional problems like public safety and state security, they under-deliver in those areas. More significantly, investigative reporting and digital rights organizations have raised concerns about cybersecurity threats, digital surveillance tools, and biometric data collection by these Chinese surveillance tools. These groups contend that the ubiquitous and underregulated use of these technologies threatens privacy rights.11 Needless to say, they believe that the adoption of digital tools without robust institutional checks and balances, renders citizens more vulnerable to state surveillance and suppression. It is this gap between novel technological adoption and regulatory framework implementation that creates emerging risks.

The use of Chinese public security systems in Africa

Surveillance cameras in Nairobi’s Central Business District, taken by Bulelani Jili

This section underscores the demand for digital surveillance tools and their domestic applications. Namely, African states seek out and acquire surveillance systems for a number of reasons, largely as part of a wider effort to augment state security response and capability. Africa’s significant digital infrastructure gap is being addressed through Chinese investment and state support. Annually, there is an estimated infrastructure funding gap of up to $107.5 billion a year.12 China plays a monopolistic role in Africa’s telecommunications sector, supplying approximately 70 percent of the continent’s digital infrastructure.13 Surveillance tools are typically purchased as part of a package of ICT systems, which include data centers, closed-circuit television (CCTV) systems, and high-tech biometrics that are integrated and used in tandem with AI products—thus supporting public security authorities and development ambitions.14

Digital infrastructure investments, including the promotion of public security systems, in Africa’s telecommunications sector have largely been built by China, mostly through state-to-state engagements, but also supplemented by the growing involvement of Chinese private sector actors. According to a review of datasets and reports on the acquisition of Chinese digital surveillance tools in Africa, about 22 African states have contracted with companies like Huawei to adopt digital surveillance technology.15 Usually procured under the banner of smart city initiatives, these systems collect, integrate, and analyze data from various sources, like national diametric databases that are made available by state partners. The system supports crime prevention and recovery operations. African demand drives the procurement and application of these tools, specifically, to address Africa’s digital infrastructure gap.16 African state and city officials in Kenya, Uganda, Ethiopia, South Africa, and other countries are reaching out to Chinese firms to aid their varying domestic aims. Together these examples illustrate the establishment of local digital governance regimes. They are not simply a derivative of a Beijing concocted vision, rather, Chinese firms are acquiescing to the ambitions of their host. Crucially, these surveillance regimes are embedded within local private-public ventures. As such, we must consider a more balanced approach that helps to tease out the degree to which local agency is helping shape geopolitical relations while also examining the interplay between Chinese firms and party-state activities on the continent. It is this more balanced approach that offers a vantage point from which to defamiliarize and reimagine politics on the ground.

Issue Brief

Oct 17, 2022

China’s surveillance ecosystem and the global spread of its tools

By Bulelani Jili

This paper seeks to offer insights into how China’s domestic surveillance market and cyber capability ecosystem operate, especially given the limited number of systematic studies that have analyzed its industry objectives.

Cybersecurity

A case from Kenya

China’s principal entry into Kenya’s telecommunication market came through the docking of fiber-optic cables. Led by Huawei and ZTE, two giant Chinese technology firms that specialize in telecommunication, the docking of submarine cables enabled the Kenyan government to liberalize their ICT market, which allowed for a more competitive telecommunication section.17 In an interview with the author, a former ICT official said, “ [the ministry] then set in motion a series of policies, including the National Information and Communications Technology (ICT) Policy, that aimed at the liberalization of the telecommunications sector that created opportunities for more actors to be involved. With financing that came from US banks and the Export-Import Bank of China, we looked to close the infrastructure gap that hampered growth.”18 To establish the country’s first National Optic Fiber Backbone Infrastructure, which brought high-speed connectivity, the government jointly contracted Huawei and ZTE.19 Each company was expected to manage a different region across the country. ZTE laid the cables for the west, and Huawei handled Nairobi and the central parts of the country.20 This novel digital capacity empowered the state to pursue e-government projects, which include public security systems and cyber intrusion platform solutions.

As such, the Kenyan government primarily enlists these surveillance tools as a means to scale public security capabilities, national security prerogatives, and data security. The adoption of surveillance tools is made possible through the sale of Chinese equipment and soft loans from the Export-Import Bank of China, which are crucial in making public security platforms financially attainable for Nairobi and other African governments. Beyond Huawei, Chinese companies like Dahua, Hikvision, and others are involved in the adoption of digital surveillance systems.21 In 2012, the Kenyan government awarded Nanjing Les Information Technology, a high-tech provider that offers urban traffic management and urban governance tools, a tender to supply digital surveillance cameras.22 The goal of the initiative was to augment public security and intelligent traffic management systems in downtown Nairobi. According to official figures, the platform cost the government 463,960,697 Kenyan shillings, which amounts to $3.8 million.23 The expected date of completion was June 2013, but, due to delays, the project was not completed until April 2014.24 Constant power shortages and access to privately owned buildings for installation purposes were the main reasons for delays. No less important, the adoption plan for these tools did not include corresponding data protection measures to promote and maintain privacy rights, rather inadequate planning before the start of the program presaged the delays and data policy omissions.

China’s oversized role in African ICT markets engenders a dependence on their products and expertise. Digital public security systems are embedded within state-driven processes that are contingent on private-public ventures. The use and effectiveness of these tools, though nominally operated by and for the purposes of Kenyan government officials, are heavily reliant on Chinese contractors to operate public security platforms. An audit by the auditor-general’s office found that senior staff sent by the Kenyan government to China to learn how to operate public security systems did not acquire the necessary skills.25 Instead, the staff spent time inspecting the parts of the system to be delivered. During that visit, no attempts were made to learn or teach how to operate the system.26 For this reason, questions remain about Kenya’s ability to operate and maintain its public security systems. Furthermore, technical matters having to do with the upkeep of the system are managed by the contractor. The National Police, who are tasked with the responsibility of operating the system, had not even developed the capability to work the control room.27 To complicate matters, the manual language of the control room was in Chinese. Most of the digital surveillance cameras installed within Nairobi’s central business district stopped working months after they were installed. Even more worrying is that there were limited security protocols for accessing the system, which increased the possibility of unauthorized access or the launch of malicious code on the server by unauthorized users.

To supplement its earlier public security system, Huawei was invited to install its public security system in Kenya. In Kenya, as in the rest of the continent, Huawei promised that its new product, the safe city, would improve public security. The safe city is a form of a smart city, which is a computational model of urban planning that aims to utilize technological innovation to enhance operational efficiencies. The safe city platform utilizes a series of interconnected technologies like video cameras, tracking devices, software, and cloud storage systems to link technologies and processes as a means to integrate them into a larger and more cohesive whole to advance public initiatives like managing traffic, policing, and streamlining service delivery.28 The first safe city system by Huawei was able to connect 1,800 high-definition cameras and 200 high-definition traffic surveillance infrastructures across Nairobi.29 A command center was also installed, which supports over 9,000 police officers in 195 police stations.30 The Kenyan government is pursuing smart city initiatives as a way to resolve public security challenges and address the country’s digital infrastructure gap. Digital surveillance platforms are part of a wider state-led initiative to utilize technologies to help resolve structural challenges and, thus, make development more attainable.

Comparisons across the continent  

This section highlights the motivations for and incentives of local surveillance procurement in Uganda and South Africa. It lends weight to an examination of the proliferation of Chinese surveillance tools in Africa as a dynamic process shaped by demand and supply factors. Uganda, like Kenya, is also procuring public security systems from Huawei. The Kampala police procured AI facial recognition systems from Huawei in 2019, supposedly to address the city’s growing crime rate.31Uganda is working with Huawei to help close digital infrastructure gaps and address domestic challenges with crime. In contrast, Kenya’s particular history with terrorist attacks by Islamist militants has motivated the state’s adoption of surveillance systems. As in Kenya, Huawei claims that safe city tools meet several service delivery demands, including real-time surveillance, evidence collection, and video browsing that support policing initiatives.

Opposition leaders in Uganda, civil society, and international observers highlight the misuse of surveillance tools, and how these platforms are instead used to monitor and target political opposition to the administration of President Yoweri Museveni.32 To be sure, the misuse of public security platforms is not the only reason for concern. Facial recognition technologies require mass biometric data for training data collection, software integration, and algorithm development. As a result, acquiring and using these tools without strong privacy safeguards poses a threat to privacy rights.

South Africa’s experience with high rates of crime is the primary motivation for the state to adopt public security platforms as a means to manage the perennial threat. While demand is a response to concerns about crime and governance, it also due to state efforts to close infrastructure gaps and bolster state digital capabilities. Smart city initiatives in South Africa seek to resolve structural challenges while also offering solutions to social challenges like crime. Former Rustenburg mayor Mpho Kunou explains that “the Rustenburg Smart City project aims to develop the economy, enhance citizen participation, improve public safety and transportation, expand the scope of government services, and implement digitalized public utilities through leading technologies.”33 The increased presence of Chinese surveillance technology in South Africa has raised concerns in Washington about the party-state’s influence over South Africa’s digital infrastructure.34 In addition to Huawei, in South Africa, local company Vumacam is a leading provider of digital surveillance tools. For example, in the city of Johannesburg, Huawei digital cameras are paired platforms from Vumacam and Hikvision, another Chinese digital surveillance tool provider.35 The various surveillance tools are deployed by the police, local municipalities, and private security firms. This example, like the previously mentioned public security systems in Kenya, illustrates African states’ tendency to use multifarious governance and surveillance platforms.

The lack of evidence that public security systems reduce crime does not deter the promotion of public security platforms. In fact, in the case of Kenya, crime rates have risen in areas supported by these technologies.36With the growing concern over the promotion and misuse of surveillance tools, Adam Lane, deputy chief executive of government affairs at Huawei Kenya, dismisses these concerns by contending that “Huawei’s role is to develop, install, deploy, and maintain the technology according to the request and need of the National Police Service. The National Police Service is responsible for operating it and using it according to their policies in line with any national laws.”37This popular framing is reductive, if not completely misleading. It rests, somewhat simplistically, on an all-or-nothing approach to responsibility for negative outcomes. The argument draws attention to the behavior of the National Police but says nothing about the consequences of the sale of these systems or whether regulations are necessary to mitigate negative outcomes. The company position de-emphasizes its role in enabling state actors to surveil citizens, instead placing sole blame and responsibility on state actors for any misconduct.

Government officials, including Kenyan, South African, and Ugandan state representatives, see digital surveillance systems as possible solutions to the traditional challenges that their countries face. This contention challenges presuppositions about the adoption of Chinese surveillance tools as strictly a reflection of Beijing’s efforts to promote digital authoritarianism. Rather, African governments assemble hybridized surveillance systems, in part from Chinese companies, as part of a broader digital infrastructure initiative that seeks to address infrastructure gaps while connecting various heterogeneous tools whose application promises to ameliorate domestic problems like violent crime and terrorism. These objectives, however, are not supported by robust legal measures to protect civil liberties. With the introduction of public security platforms, policymakers are faced with challenge to devise appropriate data policies and privacy measures to deal with the intensification of datafication and surveillance.

Global insecurities and US interests

This section examines the consequences of the global proliferation of Chinese surveillance tools. Precisely, it raises a series of questions for both the international community and local stakeholders, especially about transparency and accountability. For example, most African governments, including Kenya and Uganda, have limited transparency with respect to the acquisition of surveillance tools, despite provisions in their federal laws that demand state transparency.38 More saliently, there is a need for more transparency around the use of Chinese loans and procurement of public security platforms, as well as technologies that have the potential to be repurposed deployed for surveillance purposes. The party-state’s willingness to support digital infrastructure projects that include public security platforms is problematic in the context of authoritarian states like Uganda or Zimbabwe, which have a history of utilizing cyber intrusion systems to undercut human rights and conduct unwarranted state surveillance.39 The adoption of public security platforms enhances the state’s capabilities to conduct surveillance. Even in a relatively healthy democracy like South Africa or Kenya, skewing power toward the state can result in unwarranted surveillance practices that lead to the atrophy of rights, especially in the absence of robust institutional checks and balances.40 It is this gap between the adoption of public security systems and regulatory frameworks that poses a critical risk to civil liberties. As such, transparency and accountability measures must extend to digital infrastructure development, which creates room for the misuse of public security products to advance surveillance and other modalities that incentivize democratic backsliding.

The global spread of Chinese surveillance tools could pose threats to privacy and cybersecurity. Several researchers and observers have warned about misuses and various cybersecurity vulnerabilities with Hikvision surveillance products.41 The incessant product vulnerabilities have led researchers to claim “backdoors” are intentionally designed to enable Chinese intelligence collection.42 This position is further bolstered by the fact that the party-state recently introduced several laws—the national intelligence law of 2017, the data security law of 2021, the national security law of 2015, and the cybersecurity law of 2016—that establish obligations for private firms to comply with state demands for data while also offering limited means to reject or appeal unwarranted requests from the Beijing government.43 Vitally, however, this kind of argument still presumes a level of party-state intention and collaboration with firms. At this time, there is no empirical evidence from Kenya, South Africa, or Uganda that establishes coordination and collaboration between Chinese state authorities and Hikvision that results in intentional data theft. Similar allegations leveled against other companies, such as Huawei, cannot be emphatically proven. However, the absence of concrete evidence or attribution does not categorically dispel escalating concerns and vulnerabilities. In fact, it further demonstrates the need for ensuring supply chain security and integrity given the ever-present potential for furtive insertions like backdoors in software and hardware products.

US-China competition’s impact on Africa

This section details the United States should respond to the proliferation and adoption of Chinese surveillance tools. Currently, the growing adoption of Chinese surveillance tools in Africa and the United States’ ambition to mitigate this spread are encouraging the bifurcation of the world, staging Africa and the Global South generally as the theater for a dispute between China and the United States. This division between procurers and non-procurers does not support US interests or the health and inclusive posture of the international liberal order. Indeed, it further ignores the real political challenges and financial motivations behind nation-states’ procurement of Chinese tools. To stem the proliferation of these technologies and the real harm felt locally and globally, the United States must develop a more nuanced posture on the proliferation of Chinese surveillance and cyber-offensive systems, one that responds to the real political challenges and financial motivations behind nation-states’ procurement of Chinese tools.44

 American and international observers must pay greater attention to the contextual motivations for the growing demand for Chinese digital infrastructure and public security systems. Precisely, it is important to consider how local factors mediate and condition China’s geopolitical footprint. To curtail the spread and misuse of surveillance technologies, Washington and its European allies should focus not on the “supply” side but on the factors driving African demand for public security platforms.

The primary driver of procurement of surveillance technology in Kenya is contingent on their promise to close digital infrastructure gaps and address traditional challenges like crime and terror. This most prominent example of terrorism in the country is the 2013 al-Shabaab militant attack on an upscale shopping center in Nairobi, killing 67 people and injuring hundreds more. This argument suggests that the United States cannot afford to take a parochial approach and message to the risks posed by the adoption of Chinese technologies. The message shared with the world must speak to the challenges confronting African leaders and partners. Working with African authorities to build digital infrastructure, implement data protection measures, and address challenges like terrorism are ways to mitigate the negative consequences of the proliferation of public security systems. Indeed, a policy that meets African stakeholders where they are with regard to their development challenges is needed. This kind of message will inform a more nuanced approach and understanding, which will help the United States and its allies work within and against the challenges, priorities, and incentives that drive the adoption of Chinese public security systems.

An approach that centers on dissuading African countries from working with companies like Huawei, which are believed to pose cybersecurity threats, risks misunderstanding the objectives and priorities that drive the adoption of Huawei’s tools. For instance, the appeal of Huawei’s safe city project is its financial feasibility, its comprehensive offerings, and its promise to resolve traditional problems like crime. A message that stresses the risks involved is pivotal, but alone, this point runs counter to local priorities. To limit the proliferation of surveillance tools, US policy must better understand African demand and accordingly help address local priorities by offering attainable and safer alternatives to assist local initiatives, while emphasizing that these tools are not automatic remedy for domestic challenges but rather auxiliary instruments. In fact, their adoption can exacerbate challenges in a region with established concerns around crime, governance, corruption, and policing, particularly in the absence of robust checks and balances.

Initiatives like the smart city blur the distinction between service delivery initiatives and invasive surveillance practices. Accordingly, the adoption of these tools has implications for civil liberties, particularly in legal environments that lack robust regulatory frameworks.45 This raises questions about the need for mechanisms that govern the distribution and use of these platforms. Chinese firms and actors have been swift in its attempts to establish norms for the application of these systems. As stated before, this effort is pursued through the development of several domestic laws, training programs involving recipient nations, diplomatic exchanges with African partners, and ventures to influence global standards around the regulation of these platforms.46 Such endeavors include active participation and leadership in intergovernmental institutions like the International Telecommunication Union (ITU), which is responsible for influencing the global standards and regulatory frameworks for the use of surveillance platforms. To counter the concerted push along this front from the Chinese government, the US government must actively promote standards, regulations, and norms that mirror its democratic values and interests domestically and in multilateral institutions like the ITU. Meanwhile, working alongside likeminded democracies can also help strengthen and promote human rights and democratic values.

The United States and its European partners can play a significant role in helping build local data protection and cybersecurity capacity in regulating the use of public security systems. Many countries on the continent, including Kenya, still lack a comprehensive legal and policy framework to address cybersecurity risks. For example, the Data Protection Act (2019) empowers regulators and requires mandatory registration by data processors, yet it remains unclear what authority the data protection commissioner has to enforce state privacy abuses emerging.47 Likewise, there are no means to audit the algorithms that power facial recognition technology or to halt the harvesting of biometric data from the population without an adequate system of checks and balances. Kenya, like many countries in the continent, must work toward building a more conducive legal and policy environment to address growing cybersecurity threats.

In giving an intelligible account of China’s expanding geopolitical footprint, it is important to underscore party-state ambitions and activities in Africa while also illuminating how these aims are mediated by local state and substate actions. Digital surveillance tools on the continent are enlisted to address social challenges like crime, but also a way to index and catalyze digital development. Indeed, while African governments’ ambitions are laudable on the surface, without checks and balances, surveillance activities pose a threat to civil liberties, particularly in a region that struggles with challenges at the intersection of policing, governance, surveillance, race, and crime. Work must be done to advance legal measures to mitigate the negative consequences of intensified surveillance practices.

About the author 

Bulelani Jili is a nonresident fellow at the Atlantic Council’s Cyber Statecraft Initiative. His research interests include ICT development, Africa-China relations, cybersecurity, post-colonial thought, and privacy law. He is also a Meta Research PhD fellow at Harvard University, visiting fellow at Yale Law School, cybersecurity fellow at the Harvard Kennedy School, scholar-in-residence at the Electronic Privacy Information Center, visiting fellow at Hong Kong University Law, and research associate at Oxford University.

Acknowledgments 

Without friends and colleagues’ support, it would have been an arduous task to bring this work to conclusion. It is their advice, research, and critical reflections that enable this work and its insights.


The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

1    Bulelani Jili, China’s Surveillance Ecosystem & The Global Spread of Its Tools, Atlantic Council, October 2022, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/chinese-surveillance-ecosystem-and-the-global-spread-of-its-tools/.
2    See, for example: China’s Tech-Enhanced Authoritarianism, House Permanent Select Committee on Intelligence, 116th Cong. (2019) (statement of Samantha Hoffman, nonresident fellow, Australian Strategic Policy Institute’s International Cyber Policy Centre); Steven Feldstein, The Global Expansion of AI Surveillance, Carnegie Endowment for International Peace, September 17, 2019, https://carnegieendowment.org/2019/09/17/global-expansion-of-ai-surveillance-pub-79847.
3    A privileging of the local, while illuminating, can also overlook the broader political and economic forces that shape the particular. However worthy it may be to pursue a strictly grounded study, inquiry risks misidentifying the global forces that—increasingly, with varying degrees of efficacy—are besetting the local.
4    Kevin Cai, ”Outward Foreign Direct Investment: A Novel Dimension of China’s Integration into the Regional and Global Economy,” The China Quarterly (1999), 856.
5    Nathaniel Ahrens, China’s Competitiveness Myth, Reality, and Lessons for the United States and Japan, Center for Strategic and International Studies February 2013, https://csis-website-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/publication/130215_competitiveness_Huawei_casestudy_Web.pdf.
6    Ministry of Commerce State Council Information Office, China’s Foreign Aid White Paper (中国的对外援助白皮书), last updated May 1, 2011, http://fec.mofcom.gov.cn/article/ywzn/dwyz/zcfg/201911/20191102911291.shtml.
7    Bulelani Jili, “Chinese ICT and Smart City Initiatives in Kenya,” Asia Policy (2022):  44, https://www.nbr.org/wp-content/uploads/pdfs/publications/asiapolicy17.3_africa-china_relations_rt_july2022.pdf.
8    Zainab Usman, What Do We Know About Chinese Lending in Africa?, Carnegie Endowment for International Peace, June 2, 2021, https://carnegieendowment.org/2021/06/02/what-do-we-know-about-chinese-lending-in-africa-pub-84648.
9    N.D. Francois, “Huawei’s Surveillance Tech in Kenya: A Safe Bet,” Africa Times,December 18, 2019, https://africatimes.com/2019/12/18/huaweis-surveillance-tech-in-kenya-a-safe-bet/.
10    Although Beijing does not impose any political conditions on investment, there are economic conditions to its loans. Accordingly, this strategy has permitted resource-rich and high-risk countries the means to secure funds. With the collapse of commodity prices, borrowers in Africa have managed all the risk of debt default. Debt in a way has emerged as the dominant tenure that structures Africa-China relations. Thus far, the party-state has not weaponized debt for geopolitical ends. Rather, it continues to refinance lending terms at lower rates and for longer payment durations. While this willingness to renegotiate does not resolve the problems of accumulating debt, it maintains China’s image as an agreeable development partner for Africa.
11    See, for example: Grace Githaiga and Victor Kapiyo, Kenya’s Cybersecurity Framework: Time to Up the Game! KICTANet, December 2019, https://www.kictanet.or.ke/mdocs-posts/cybersecurity-in-kenya-policy-brief-december-2019/; Karen Allen and Isel van Zyl, Who’s Watching Who? Biometric Surveillance in Kenya and South Africa, Enact,November 2020, https://enactafrica.org/research/research-papers/whos-watching-who-biometric-surveillance-in-kenya-and-south-africa; Tevin Mwenda and Victor Kapiyo, Personal Data and Elections 2022, KICTANet, February 2022, https://www.kictanet.or.ke/policy-brief-personal-data-and-elections-2022/.
12    African Development Bank Group, “Africa’s Infrastructure: Great Potential but Little Impact on Inclusive Growth,” Chapter 3 in African Economic Outlook 2018, January 24, 2018, https://www.afdb.org/fileadmin/uploads/afdb/Documents/Publications/2018AEO/African_Economic_Outlook_2018_-_EN_Chapter3.pdf. See the full report: https://www.afdb.org/en/documents/document/africaneconomic-outlook-aoe-2018-99877.
13    Halligan Agade, “China’s Telecommunications Footprint in Africa,” CGTN, September 2, 2021, https://africa.cgtn.com/2021/09/02/chinas-telecommunications-footprint-in-africa/; Amy Mackinnon, “For Africa, Chinese-Built Internet Is Better Than No Internet at All,” Foreign Policy, March 19, 2019, https://foreignpolicy.com/2019/03/19/for-africa-chinese-built-internet-is-better-than-no-internet-at-all/.
14    See, for example: Huawei, Huawei Hosts Safe City Summit in Africa to Showcase Industry Best Practices [Press Release], October 17, 2016, https://www.huawei.com/en/news/2016/10/safe-city-summit-africa; “Safe City Summit in a Safe City,” Hi-Tech Security Solutions, February 2017, http://www.securitysa.com/56445n.
15    Bulelani Jili, The Rise of Chinese Surveillance Technology in Africa, Electronic Privacy Information Center (EPIC), August 25, 2022, https://epic.org/the-rise-of-chinese-surveillance-technology-in-africa-part-4-of-6/; Feldstein, The Global Expansion of AI Surveillance; Sheena Chestnut Greitens, Dealing with the Demand for China’s Global Surveillance Exports, The Brookings Institution,April 2020, https://www.brookings.edu/research/dealing-with-demand-for-chinas-global-surveillance-exports/; Jonathan Hillman and Laura Rivas, Global Networks 2030, Center for Strategic and International Studies, March 2021, https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/210329_Hillman_Global_Networks_2030.pdf?U9r90Zabm5MGoAuHQkVsmqH33SasTi70; Samantha Hoffman, “‘Mapping China’s Tech Giants: Covid-19, Supply Chains and Strategic Competition,’ The Strategist,June 8, 2021, https://www.aspistrategist.org.au/china-tech-giants-map-update-3-launch-major-updates/.
16    Huawei, Rustenburg: World Platinum Capital Deploys Smart City ‘Gold Mine’ [Case Study] (2017),  https://e.huawei.com/topic/leading-new-ict-ua/rustenburg-smartcity-case.html.
17    Bitange Ndemo and Tim Weiss, Digital Kenya: An Entrepreneurial Revolution in the Making (London: Springer Nature, 2017).
18    An one-one interview with the official was conducted with the author during  a 11 month fieldwork study in Nairobi.
19    Iginio Gagliardone, China, Africa, and the Future of the Internet (London: Zed Books, 2019).
20    Muriuki Mureithi, Telecommunication Ecosystem Evolution in Kenya, 2009-2019: Setting the Pace and, Unbundling the Turbulent Journey to a Digital Economy in a 4IR Era, Institute of Economic Affairs, March 2021, https://ieakenya.or.ke/download/telecommunication-ecosystem-evolution-in-kenya-2009-2019-setting-the-pace-and-unbundling-the-turbulent-journey-to-a-digital-economy-in-a-4ir-era/.
21    Bulelani Jili, “Chinese ICT and Smart City Initiatives in Kenya.
22    Office of the Auditor General of Kenya, Performance Audit Report of the Auditor-General on Integrated Urban Surveillance System for Nairobi Metropolitan Area , February 2017, https://www.oagkenya.go.ke/wp-content/uploads/2022/08/Integrated-Urban-Surveillance-System-for-Nairobi-Metropolitan.pdf.
23    Office of the Auditor General of Kenya, Performance Audit Report.
24    Office of the Auditor General of Kenya, Performance Audit Report.
25    Office of the Auditor General of Kenya, Performance Audit Report.
26    Office of the Auditor General of Kenya, Performance Audit Report.
27    Office of the Auditor General of Kenya, Performance Audit Report.
28    Huawei. “Huawei Hosts Safe City Summit in Africa to Showcase Industry Best Practices” October 17, 2016, https://www.huawei.com/us/news/2016/10/safe-city-summit-africa; Frank Hersey, “Digital ID in Africa this Week: Biometrics for Tea Workers, Financial Inclusion with a Thumbprint,” Biometric Update, August 23, 2019, https://www.biometricupdate.com/201908/digital-id-in-africa-this-week-biometrics-for-tea-workers-financial-inclusion-with-a-thumbprint.
29    Bulelani Jili, The Spread of Chinese Surveillance Tools in Africa, Oxford University China, Law and Development Project,June 30, 2020, https://cld.web.ox.ac.uk/files/finaljilipdf.; Hi-tech security, “Safe city summit in a safe city,” Hi-tech security, February 2017, http://www.securitysa.com/56445n ; China’s Strategic Aims in Africa: Goals of China’s Africa Policy and Consequences of Beijing’s Influence, US-China Economic and Security Review Commission,  116th Cong. (2020) (statement of Steve Feldstein, nonresident fellow, Carnegie Endowment for International Peace).
30    See, for example: Jili, The Spread of Chinese Surveillance Tool.
31    Tom Wilson and Madhumita Murgia, “Uganda Confirms Use of Huawei Facial Recognition Cameras,” Financial Times, August 20, 2019, https://www.ft.com/content/e20580de-c35f-11e9-a8e9-296ca66511c9.
32    Elias Biryabarema, “Uganda’s Cash-Strapped Cops Spend $126 Million on CCTV from Huawei,” Reuters,August 15, 2019, https://www.reuters.com/article/us-uganda-crime-idUSKCN1V50RF.
33    Huawei, Rustenburg: World Platinum Capital.
34    Opposing the Republic of South Africa’s hosting of military exercises with the People’s Republic of China and the Russian Federation, and calling on the Biden administration to conduct a thorough review of the United States-South Africa relationship, ‘H.R. Res.145, 118th Cong. (2023).
35    Karen Hao and Heidi Swart, “South Africa’s Private Surveillance Machine is Fueling a Digital Apartheid,” MIT Technology Review, April 19, 2022, https://www.technologyreview.com/2022/04/19/1049996/south-africa-ai-surveillance-digital-apartheid/.
36    National Police Service of the Republic of Kenya, Annual Crime Report 2018, September 12, 2019, http://www.nationalpolice.go.ke/crime-statistics.html.
37    N.D. Francois, “Huawei’s Surveillance Tech in Kenya: A Safe Bet,” African Times, December 18, 2019, https://africatimes.com/2019/12/18/huaweis-surveillance-tech-in-kenya-a-safe-bet/.
38    Christopher Musodza, Kuda Hove, and Otto Saki, Digital Influence in Africa, Friedrich Naumann Foundation, November 2022, https://shop.freiheit.org/download/P2@1351/661343/China’s%20digital%20influence%20in%20Africa_Friedrich%20Naumann%20Foundation.pdf; “Mapping and Analysis of Privacy Laws in Africa,” Collaboration on International ICT Policy in East and Southern Africa (CIPESA), November 2021, https://cipesa.org/?wpfb_dl=479.
39    Allen Munoriyarwa , and Sarah H. Chiumbu, “Big Brother is Watching: Surveillance Regulation and its Effects on Journalistic Practices in Zimbabwe,” African Journalism Studies (2019), 26-41.
40    Bulelani Jili, “The Spread of Chinese Surveillance Tools in Africa: A Focus on Ethiopia and Kenya.’” in Africa–Europe Cooperation and Digital Transformation, ed. Chux Daniels, Benedikt Erforth and Chloe Teevan. (London: Routledge, 2022), 32-49.
41    John Honovich, “Hikvision has ‘Highest Level of Critical Vulnerability,’ Impacting 100+ Million Devices,’ IPVM,September 20, 2021, https://ipvm.com/reports/hikvision-36260#:~:text=Hikvision%20has%20admitted%20a%209.8,it%20impacts%20100%2B%20million%20devices; Valentin Weber and Vasilis Ververis, “China’s Surveillance State: A Global Project,” Top10VPN, August 2021, https://www.top10vpn.com/assets/2021/07/Chinas-Surveillance-State.pdf; Wilson and Murgia, “Uganda Confirms Use of Huawei Facial Recognition Cameras”.
42    Heidi Swart, “Joburg’s New Hi-Tech Surveillance Cameras: A Threat to Minorities that Could See the Law Targeting Thousands of Innocents,” Daily Maverick, September 28, 2018, https://www.dailymaverick.co.za/article/2018-09-28-joburgs-new-hi-tech-surveillance-cameras-a-threat-to-minorities-that-could-see-the-law-targeting-thousands-of-innocents/.
43    “National Intelligence Law of the People’s Republic of China.” (“中华人民共和国国家情报法”), The National People’s Congress of the People’s Republic of China, June 12, 2017, http://www.npc.gov.cn/npc/c30834/201806/483221713dac4f31bda7f9d951108912.shtml; “Data Security Law of the People’s Republic of China.” (“中华人民共和国数据安全法”), The National People’s Congress of the People’s Republic of China, June 10, 2021, http://www.npc.gov.cn/npc/c30834/202106/7c9af12f51334a73b56d7938f99a788a.shtml; “National Security Law of the People’s Republic of China.” (“中华人民共和国国家安全法”), The National People’s Congress of the People’s Republic of China, July 7, 2015, http://www.npc.gov.cn/npc/c10134/201507/5232f27b80084e1e869500b57ecc35d6.shtml; “Cybersecurity Law of the People’s Republic of China” (“中华人民共和国网络安全法”),  November 7, 2016, http://www.npc.gov.cn/npc/c30834/201611/270b43e8b35e4f7ea98502b6f0e26f8a.shtml.
44    Greitens, Dealing with the Demand.
45    Bulelani Jili, ‘Africa: Regulate Surveillance Technologies and Personal Data,’ Nature (2022), 445–448.
46    Emma Rafaelof, Rogier Creemers, Samm Sacks, Katharin Tai, Graham Webster, and Kevin Neville, China’s ‘Data Security Law, New America, July 2, 2020, https://www.newamerica.org/cybersecurity-initiative/digichina/blog/translation-chinas-data-security-law-draft/; Li Wanyi, “Delegation of South African Parliament Police Committee Visits Shanghai (南非议会警察委员会代表团访问上海),” Jiefang Daily, October 4, 2107, http://shzw.eastday.com/shzw/G/20171014/u1a13342865.html; Li Zhengwei, “The China-Africa Internet Development and Cooperation Forum Held (中非互联网发展与合作论坛举办),” Guangming, August 24, 2021, https://m.gmw.cn/baijia/2021-08/24/35106965.html; Ministry of National Defense People’s Republic of China, Wei Fenghe Meets with Representatives of the First China-Africa Defense and Security Forum (魏凤和会见首届中非防务安全论坛代表) [Press release],  July 10, 2018, http://www.mod.gov.cn/topnews/2018-07/10/content_4818896.htm.
47    Office of the Data Protection Commissioner of Kenya, Data Protection Act, 2019, https://www.odpc.go.ke/dpa-act/.

The post What is driving the adoption of Chinese surveillance technology in Africa? appeared first on Atlantic Council.

]]>
Russian War Report: Russia wages an invisible war with radar waves and Russian music across borders https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-russia-wages-invisible-war-with-radar-waves/ Fri, 12 May 2023 19:06:30 +0000 https://www.atlanticcouncil.org/?p=645296 Russian surveillance has increased on Ukraine's border. Meanwhile a museum in Estonia hung a large poster depicting Putin as a war criminal.

The post Russian War Report: Russia wages an invisible war with radar waves and Russian music across borders appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Interference on satellite imagery suggests Russia is increasing its means to surveil border activity

Zelenskyy says Ukraine preparing for “new events” as Transnistrian official asks for increased Russian troop presence

Tracking narratives

Prigozhin accuses Russian defense ministry of creating “shell hunger” in Bakhmut

Russian city organizes Victory concert on riverbank facing Estonia

Interference on satellite imagery suggests Russia is increasing its means to surveil border activity

A May 6 satellite image caught by the Sentinel-1 satellite of the European Space Agency revealed an interference pattern that was recorded stretching 172 kilometers in north-eastern Ukraine. This pattern almost exactly covers the border between the Russian city of Belgorod and Kharkiv, Ukraine’s second most populous city. The interference was cast as a result of electromagnetic emissions caught within the 5Ghz range, also known as the NATO C-band. Open source researcher Brady Africk first reported the pattern. 

Radar interference captured along the Ukraine-Russia border. (Source: @Bradyafr/archive) 

The imagery shows several layers of pink straight lines, which are different from patterns usually observed by analysts. In a January 2023 edition of the Russian War Report, the DFRLab reported an interference pattern with bulkier interferences that was attributed to a potential anti-air defense missile system deployed in the Krasnodar Krai region. 

Additionally, similar patterns were recorded throughout April 2023. The DFRLab compiled imagery data from April 14 to April 21 that shows how Russia may have increased its deployment of military radars and anti-air defense systems in the region. The April 29 drone attack against an oil depot in Crimea also indicates that Russia could have been building up its defense systems in the southern occupied territories of Ukraine. 

A map based on the aggregated Sentinel-1 imagery over the Azov Sea showing several interference patterns. (Source: DFRLab via ESA Sentinel-1) 

The May 6 interference pattern resembles the one cast over mainland Crimea in April, suggesting similarity in the type of devices or equipment responsible for its emission. This assessment indicates that Russia could be transitioning towards further deployments of defense systems and military-class radar monitoring on its borders with Ukraine and in occupied territories.  

Valentin Châtelet, Research Associate, Security, Brussels, Belgium

Zelenskyy says Ukraine preparing for “new events” as Transnistrian official asks for increased Russian troop presence

The Russian army carried out a large-scale missile and drone strike over Ukrainian territory in the early hours of May 8. The General Staff of the Ukrainian Armed Forces reported on May 8 that Russian forces launched sixteen missiles at Kharkiv, Kherson, Mykolaiv, and Odesa, and that Ukrainian troops shot down all thirty-five launched Shahed drones. A drone appears to have hit a tall building in Kyiv, possibly after being shot down. There were also reports that falling debris caused other damage. The drone strike is one of the largest attacks on Kyiv since February 2022. 

Ukrainian President Volodymyr Zelenskyy announced on May 7 that Ukrainian forces are preparing for “new events” in May or June 2023, an indication that Ukrainian forces may be preparing to conduct counter-offensive operations. Ukrainian military sources said that Russian forces continue to transfer equipment, ammunition, and supplies to prepare for defensive operations. 

Footage from Bakhmut on May 5 shows the possible use of incendiary shells against the remaining areas held by the Ukrainian army. The footage suggests ammunition is available, despite Wagner’s Yevgeny Prigozhin claiming the group does not have enough ammunition in Bakhmut. 

Footage from Bakhmut on May 5 shows the possible use of incendiary shells against the remaining areas held by the Ukrainian army.

Meanwhile, the evacuation of civilians from Russian-occupied frontline towns in the Zaporizhzhia region has led to fuel shortages, problems with ATMs, and connectivity issues, according to Enerhodar Mayor Dmytro Orlov. He added that Russian forces have reportedly removed medical equipment from the city’s hospital, asked patients to evacuate, and closed several hospital wards.  

Elsewhere, conflicting reports are emerging from the Orikhiv region. The city is in north Zaporizhzhia Oblast, eight-five kilometers from Melitopol. On May 3, Russian media claimed that Ukrainian forces were trying to attack Orikhiv. On the same day, Vladimir Rogov, a member of the Zaporizhzhia occupation administration, told the media that the situation in the direction of Orikhiv was under control, adding that Ukraine’s army is conducting surveillance. The Zaporizhzhia region is critical to Russia because of its proximity to Melitopol. On May 9, Russian Telegram channels reported their belief that the Ukrainian army had completed preparations for a counter-offensive and that Orikhiv would be among the areas that would come under pressure. In addition, reports emerged that the Russian Volunteer Corps, fighting for Ukraine, is conducting attacks against Russian forces in Orikhiv. The Russian Volunteer Corps is a paramilitary unit that claimed responsibility for an attack in Russia’s Bryansk region in March 2023. The same unit published a video on May 9 claiming they are actively fighting against Russian forces in Orikhiv.  

The Russian government does not recognize that Russian actors are fighting on the side of Ukraine, shifting responsibility for the attacks to Ukrainian forces. The strengthening of such military units is a trend that likely causes concern within the Russian command structure. Moscow will likely continue to deny the participation of Russians in the battles against Russian forces. However, as Ukraine prepares a possible counter-offensive, the Russian command could use the presence of Russian volunteers as propaganda, creating a state of paranoia and suspicion to attack opposition groups within Russia. The video footage of the Russian Volunteer Corps received attention among Russian opposition groups, like Rospartizan, who on May 9 attacked the liberal opposition for not taking arms against the Russian government.  

Lastly, Leonid Manakov, Transnistria’s representative in Moscow, asked Russia to increase the number of Russian forces in Transnistria due to claims of “terrorist risks.” His request follows reports that Moldovan authorities detained members of the pro-Russian Shor party in April and May. US officials warned in March that individuals linked to Russian military intelligence were planning staged protests against the Moldovan government. Russia is unlikely to increase its military presence in Transnistria, especially when considering a possible Ukrainian counter-offensive. However, the risk of infiltrations and attempts to destabilize Moldova remains, including through disinformation and fear-mongering, which would serve Russia’s military goals in the Odesa region and western Ukraine.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria 

Prigozhin accuses Russian defense ministry of creating “shell hunger” in Bakhmut

In a press release published on May 6, Wagner financier Yevgeny Prigozhin revealed more details about the group’s ongoing dispute with the Russian Ministry of Defense (MoD). Prigozhin said that in October 2022, in cooperation with Sergei Surovikin, General of the Russian Armed Forces, Wagner launched “Operation Bakhmut Meat Grinder” to provoke Ukrainian President Volodymyr Zelenskyy into sending as many Ukrainian forces as possible to defend the city. Prigozhin argued that taking control of Bakhmut was not a key objective of the operation; rather, the primary goal was “grinding the units of the Armed Forces of Ukraine” to allow the Russian army respite to restore its combat capability. Prigozhin stated that Wagner killed about 50,000 Ukrainian soldiers in Bakhmut and prevented Ukraine’s counter-offensive.

The statement claimed that Wagner has successfully managed to occupy 1,500 square kilometers of Ukrainian land and seventy-one settlements, while the Russian MoD has suffered setbacks and defeats on the frontlines. Prigozhin purported that the Russian army faced a lack of control and discipline, was embroiled in mobilization scandals, and had supply problems. He asserted that to compensate for their failures and envy towards Wagner, the MoD took counter-actions against Wagner, prohibiting it from recruiting Russian prisoners as volunteers and reducing the supply of ammunition to 30 percent of the amount Wagner required, followed by a further decrease to 10 percent. Other measures reportedly taken by the Russian MoD included suspending issuing orders and medals to dead Wagner fighters, denying personnel transfers from Africa to Ukraine, and disabling special communication systems.

Prigozhin added that to impose a complete “shell blockade” on Wagner, the Russian MoD fired Colonel General Mikhail Mizintsev, who led the siege of Mariupol in 2022 and later became deputy ninister of defense overseeing logistics and supplies. After leaving the MoD, Mizintsev reportedly joined Wagner as a deputy commander. Prigozhin said that most of Wagner’s fighters and commanders left the Russian army to join Wagner because they had lost confidence in the MoD. Due to this, he ruled out the possibility of Wagner integrating into the MoD. 

After seven months of carrying out “Operation Bakhmut Meat Grinder,” Prigozhin concluded that Wagner has lost its combat potential. He claimed that between October 2022 and May 2023, Wagner received 38 percent of the ammunition requested from the MoD and 30 to 40 percent of the tanks, artillery, and armored vehicles required for combat missions. He added that Wagner currently has 30,000 soldiers on combat missions in Bakhmut, while Ukraine has around 35,000 troops in the area, and its numbers would need to be three times higher to achieve success. He suggested that “shell hunger” resulted in two-thirds of Wagner’s losses and killed “tens of thousands” of Russian soldiers.

Givi Gigitashvili, Research Associate, Warsaw, Poland

Russian city organizes Victory concert on riverbank facing Estonia

The Russian city of Ivangorod, separated by a small river from the Estonian city of Narva, organized a May 9 Victory Day concert for residents of Narva, a predominately Russian-speaking town with a large Russian population. This is the first time Ivangorod has organized a May 9 concert on the riverbank, opposite the Narva Museum. In response, the Narva Museum hung a large poster on the exterior of the building depicting Russian President Vladimir Putin with blood-like spatter over his face and the text “Putin War Criminal.” 

The decision to host the “large format” concert on the Narva riverbank for “Narva inhabitants to see” was made at the “federal level,” according to Aleksandr Sosnin, head of the Ivangorod administration, during an April 12 press conference.

Videos shared online show that scores of people gathered in Narva to listen to the concert. LenTV24, a pro-Kremlin regional infotainment YouTube channel, reported an altercation between a younger man carrying a Ukrainian flag–more than five hundred Ukrainian refugees reside in Narva–and an older man who attacked him. The altercation was captured on video and spread on Telegram and Facebook. Zhanna Ryabceva, a member of the Russian Duma, shared the video on Telegram. It was then shared approximately one thousand times, including by sixteen public Telegram groups and channels, according to Telegram monitoring tool TGStat. Later, the video, with a caption identical to the one used in Ryabceva’s post, was published by at least three Facebook accounts that identified as being based in Russia. One of the accounts, Ruslon Bely, was previously involved in amplifying a Secondary Infektion influence operation targeting Denmark with a forged letter that alleged Greenland was seeking independence and closer cooperation with the United States.

Nika Aleksejeva, Resident Fellow, Riga, Latvia

The post Russian War Report: Russia wages an invisible war with radar waves and Russian music across borders appeared first on Atlantic Council.

]]>
The 5×5—Cryptocurrency hacking’s geopolitical and cyber implications https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-cryptocurrency-hackings-geopolitical-and-cyber-implications/ Wed, 03 May 2023 04:01:00 +0000 https://www.atlanticcouncil.org/?p=641955 Experts explore the cybersecurity implications of cryptocurrencies, and how the United States and its allies should approach this challenge.

The post The 5×5—Cryptocurrency hacking’s geopolitical and cyber implications appeared first on Atlantic Council.

]]>
This article is part of The 5×5, a monthly series by the Cyber Statecraft Initiative, in which five featured experts answer five questions on a common theme, trend, or current event in the world of cyber. Interested in the 5×5 and want to see a particular topic, event, or question covered? Contact Simon Handler with the Cyber Statecraft Initiative at SHandler@atlanticcouncil.org.

In January 2023, a South Korean intelligence service and a team of US private investigators conducted an operation to interdict $100 million worth of stolen cryptocurrency before its hackers could successfully convert the haul into fiat currency. The operation was the culmination of a roughly seven-month hunt to trace and retrieve the funds, stolen in June 2022 from a US-based cryptocurrency company, Harmony. The Federal Bureau of Investigation (FBI) attributed the theft to a team of North Korean state-linked hackers—one in a string of massive cryptocurrency hauls aimed at funding the hermit kingdom’s illicit nuclear and missile programs. According to blockchain analysis firm Chainalysis, North Korean hackers stole roughly $1.7 billion worth of cryptocurrency in 2022—a large percentage of the approximately $3.8 billion stolen globally last year.

North Korea’s operations have brought attention to the risks surrounding cryptocurrencies and how state and non-state groups can leverage hacking operations against cryptocurrency wallets and exchanges to further their geopolitical objectives. We brought together a group of experts to explore cybersecurity implications of cryptocurrencies, and how the United States and its allies should approach this challenge.

#1 What are the cybersecurity risks of decentralized finance (DeFi) and cryptocurrencies? What are the cybersecurity risks to cryptocurrencies?

Eitan Danon, senior cybercrimes investigator, Chainalysis

Disclaimer: Any views and opinions expressed are the author’s alone and do not reflect the official position of Chainalysis. 

“DeFi is one of the cryptocurrency ecosystem’s fastest-growing areas, and DeFi protocols accounted for 82.1 percent of all cryptocurrency stolen (totaling $3.1 billion) by hackers in 2022. One important way to mitigate against this trend is for protocols to undergo code audits for smart contracts. This would prevent hackers from exploiting vulnerabilities in protocols’ underlying code, especially for cross-chain bridges, a popular target for hackers that allows users to move funds across blockchains. As far as the risk to cryptocurrencies, the decentralized nature of cryptocurrencies increases their security by making it extraordinarily difficult for a hostile actor to take control of permissionless, public blockchains. Transactions associated with illicit activity continue to represent a minute portion (0.24 percent) of the total crypto[currency] market. On a fundamental level, cryptocurrency is a technology—like data encryption, generative artificial intelligence, and advanced biometrics—and thus a double-edged sword.” 

Kimberly Donovan director, Economic Statecraft Initiative, and Ananya Kumar, associate director of digital currencies, GeoEconomics Center, Atlantic Council

“We encourage policymakers to think about cybersecurity vulnerabilities of crypto-assets and services in two ways. The first factor is the threat of cyberattacks for issuers, exchanges, custodians, or wherever user assets are pooled and stored. Major cryptocurrency exchanges like Binance and FTX have had serious security breaches, which has led to millions of dollars being stolen. The second factor to consider is the use of crypto-assets and crypto-services in money-laundering. Often, attackers use cryptocurrencies to receive payments due to the ability to hide or obfuscate financial trails, often seen in the case of ransomware attacks. Certain kinds of crypto-services such as DeFi mixers and aggregators allow for a greater degree of anonymity to launder money for criminals, who are interested in hiding money and moving it quickly across borders.” 

Giulia Fanti, assistant professor of electrical and computer engineering, Carnegie Mellon University

“The primary cybersecurity risks (and benefits) posed by DeFi and cryptocurrencies are related to lack of centralized control, which is inherent to blockchain technology and the philosophy underlying it. Without centralized control, it is very difficult to control how these technologies are used, including for nefarious purposes. Ransomware, for example, enables the flow of money to cybercriminial organizations. The primary cybersecurity risks to cryptocurrencies on the other hand can occur at many levels. Cryptocurrencies are built on various layers of technology, ranging from an underlying peer-to-peer network to a distributed consensus mechanism to the applications that run atop the blockchain. Attacks on cryptocurrencies can happen at any of these layers. The most widely documented attacks—and those with the most significant financial repercussions—are happening at the application layer, usually exploiting vulnerabilities in smart contract code (or in some cases, private code supporting cryptocurrency wallets) to steal funds.” 

Zara Perumal, chief technology officer, Overwatch Data

“Decentralized means no one person or institution is in control. It also means that no one person can easily step in to enforce. In cases like Glupteba, fraudulent servers or data listed on a blockchain can be hard to take down in comparison to cloud hosted servers where companies can intervene. Cybersecurity risks to cryptocurrencies include endpoint risk, since there is not a centralized party to handle returning accounts as the standard ways of credential theft is a risk to cryptocurrency users. There is a bigger risk in cases like crypto[currency] lending, where one wallet or owner holds a lot of keys and is a large target. In 2022, there were numerous high-profile protocol attacks, including the Wormhole, Ronin, and BitMart attacks. These attacks highlight the risks associated with fundamental protocol vulnerabilities via blockchain, smart contracts or user interface.”

#2 What organizations are most active and capable of cryptocurrency hacking and what, if any, geopolitical impact does this enable for them?

Danon: “North Korea- and Russia-based actors remain on the forefront of crypto[currency] crime. North Korea-linked hackers, such as those in the Lazarus Group cybercrime syndicate, stole an estimated $1.7 billion in 2022 in crypto[currency] hacks that the United Nations and others ­­have assessed the cash-strapped regime uses to fund its weapons of mass destruction and ballistic missiles programs. Press reporting about Federation Tower East—a skyscraper in Moscow’s financial district housing more than a dozen companies that convert crypto[currency] to cash—has highlighted links between some of these companies to money laundering associated with the ransomware industry. Last year’s designations of Russia-based cryptocurrency exchanges Bitzlato and Garantex for laundering hundreds of millions of dollars’ worth of crypto[currency] for Russia-based darknet markets and ransomware actors cast the magnitude of this problem into starker relief and shed light on a diverse constellation of cybercriminals. Although many pundits have correctly noted that Russia cannot ‘flip a switch’ and run its G20 economy on the blockchain, crypto[currency] can enable heavily sanctioned countries, such as Russia, North Korea, and others, to project power abroad while generating sorely needed revenue.” 

Donovan and Kumar: “We see actors from North Korea, Iran, and Russia using both kinds of cybersecurity threats described above to gain access to money and move it around without compliance. Geopolitical implications include sanctioned state actors or state-sponsored actors using the technology to generate revenue and evade sanctions. Hacking and cyber vulnerabilities are not specific to the crypto-industry and exist across digital infrastructures, specifically payments architecture. These threats can lead to national security implications for the private and public entities accessing or relying on this architecture.” 

Perumal: “Generally, there are state-sponsored hacking groups that are targeting cryptocurrencies for financial gain, but also those like the Lazarus Group that are disrupting the cryptocurrency industry. Next, criminal hacking groups may both use cryptocurrency to receive ransom payments or also attack on chain protocols. These groups may or may not be associated with a government or political agenda. Many actors are purely financially motivated, while other government actors may hack to attack adversaries without escalating to kinetic impact.”

#3 How are developments in technology shifting the cryptocurrency hacking landscape?

Danon: “The continued maturation of the blockchain analytics sector has made it harder for hackers and other illicit actors to move their ill-gotten funds undetected. The ability to visualize complex crypto[currency]-based money laundering networks, including across blockchains and smart contract transactions, has been invaluable in enabling financial institutions and crypto[currency] businesses to comply with anti-money laundering and know-your-customer requirements, and empowering governments to investigate suspicious activity. In some instances, hackers have chosen to let stolen funds lie dormant in personal wallets, as sleuths on crypto[currency] Twitter and in industry forums publicly track high-profile hacks and share addresses in real-time, complicating efforts to off-ramp stolen funds. In other instances, this has led some actors to question whether this transparency risks unnecessary scrutiny from authorities. For example, in late April, Hamas’s military wing, the Izz al-Din al-Qassam Brigades, publicly announced that it was ending its longstanding cryptocurrency donation program, citing successful government efforts to identify and prosecute donors.” 

Donovan and Kumar: “Industry is responding and innovating in this space to develop technology to protect and/or trace cyber threats and cryptocurrency hacks. We are also seeing the law enforcement, regulatory, and other government communities develop the capability and expertise to investigate these types of cybercrimes. These communities are taking steps to make public the information gathered from their investigations, which further informs the private sector to safeguard against cyber operations as well as technology innovations to secure this space.” 

Fanti: “They are not really. For the most part, hacks on cryptocurrencies are not increasing in frequency because of sophisticated new hacking techniques, but rather because of relatively mundane vulnerabilities in smart contracts. There has been some research on using cutting-edge tools such as deep reinforcement learning to try to gain funds from smart contracts and other users, particularly in the context of DeFi. However, it is unclear to what extent DeFi users are using such tools; on-chain records do not allow observers to definitively conclude whether such activity is happening.” 

Perumal: “As the rate of ransomware attacks rises, cryptocurrency is more often used as a mechanism to pay ransoms. For both that and stolen cryptocurrency, defenders aim to track actors across the blockchain and threat actors increase their usage mixers and microtransactions to hide their tracks. A second trend is crypto-jacking and using cloud computing from small to large services to fund mining. The last development is not new. Sadly, phishing and social engineering for crypto[currency] logins is still a pervasive threat and there is no technical solution to easily address human error.”

More from the Cyber Statecraft Initiative:

#4 What has been the approach of the United States and allied governments toward securing this space? How should they be approaching it?

Danon: “The US approach toward securing the space has centered on law enforcement actions, including asset seizures and takedowns with partners of darknet markets, such as Hydra Market and Genesis Market. Sanctions in the crypto[currency] space, which have dramatically accelerated since Russia’s invasion of Ukraine last February, have generated awareness about crypto[currency] based money laundering. However, as is the case across a range of national security problems, the United States has at times over relied on sanctions, which are unlikely to change actors’ behavior in the absence of a comprehensive strategy. The United States and other governments committed to AML should continue to use available tools and data offered by companies like Chainalysis to disrupt and deter bad actors from abusing the international financial system through the blockchain. Given the blockchain’s borderless and unclassified nature, the United States should also pursue robust collaboration with other jurisdictions and in multilateral institutions.” 

Donovan and Kumar: “The United States and its allies are actively involved in this space to prevent regulatory arbitrage and increase information sharing on cyber risks and threats. They have also increased communication with the public and private sectors to make them aware of cyber risks and threats, and are making information available to the public and industry to protect consumers against cybercrime. Government agencies and allies should continue to approach this issue by increasing public awareness of the threats and enabling industry innovation to protect against them.” 

Fanti: “One area that I think needs more attention from a consumer protection standpoint is smart contract security. For example, there could be more baseline requirements and transparency in the smart contract ecosystem about the practices used to develop and audit smart contracts. Users currently have no standardized way to evaluate whether a smart contract was developed using secure software development practices or tested prior to deployment. Standards bodies could help set up baseline requirements, and marketplaces could be required to report such details. While such practices cannot guarantee that a smart contract is safe, they could help reduce the prevalence of some of the most common vulnerabilities.” 

Perumal: “Two recent developments from the US government are the White House cybersecurity strategy and the Cybersecurity and Infrastructure Security Agency’s (CISA) move to ‘secure by default.’ They both emphasize cooperation with the private sector to move security of this ecosystem to cloud providers. While the system is inherently decentralized, if mining or credential theft is happening on major technology platforms, these platforms have an opportunity to mitigate risk. The White House emphasized better tracing of transactions to “trace and interdict ransomware payments,” and CISA emphasizes designing software and crypto[currency] systems to be secure by default so smaller actors and users bear less of the defensive burden. At a high level, I like that this strategy moves protections to large technology players that can defend against state actors. I also like the focus on flexible frameworks that prioritize economics (e.g., cyber liability) to set the goal, but letting the market be flexible on the solution—as opposed to a prescriptive regulatory approach that cannot adapt to new technologies. In some of these cases, I think cost reduction may be a better lever than liability, which promotes fear on a balance sheet, however, I think the push toward financially motivated goals and flexible solutions is the right direction.”

#5 Has the balance of the threats between non-state vs. state actors against cryptocurrencies changed in the last five years? Should we be worried about the same entities as in 2018?

Danon: “Conventional categories of crypto[currency]-related crime, such as fraud shops, darknet markets, and child abuse material, are on the decline. Similarly, the threat from non-state actors, such as terrorist groups, remains extremely low relative to nation states, with actors such as North Korea and Russia continuing to leverage their technical sophistication to acquire and move cryptocurrency. With great power competition now dominating the policy agenda across many capitals, analysts should not overlook other ways in which states are exercising economic statecraft in the digital realm. For example, despite its crypto[currency] ban, China’s promotion of its permissioned, private blockchain, the Blockchain-based Service Network, and its central bank digital currency, the ‘digital yuan,’ deserve sustained research and analysis. Against the backdrop of China’s rise and the fallout from the war on Ukraine, it will also be instructive to monitor the efforts of Iran, Russia, and others to support non-dollar-pegged stablecoins and other initiatives aimed at eroding the dollar’s role as the international reserve currency.” 

Donovan and Kumar: “More is publicly known now on the range of actors in this space than ever. Agencies such as CISA, FBI, and the Departments of Justice and the Treasury and others have made information available and provided a wide array of resources for people to get help or learn—such as stopransomware.gov. Private blockchain analytics firms have also enabled tracing and forensics, which in partnership with enforcement can prevent and punish cybercrime in the crypto[currency] space. Both the knowledge about ransomware and awareness of ransomware attacks have increased since 2018. As the popularity of Ransomware as a Service rises, both state and non-state actors can cause destruction. We should continue to be worried about cybercrime in general and remain agnostic of the actors.” 

Perumal: “State actors continue to get more involved in this space. As cryptocurrencies and some digital currencies based on the blockchain become more mainstream, attacking it allows a more targeted geopolitical impact. In addition to attacks by governments (like Lazarus Group), a big recent development was China’s ban on cryptocurrency, which moved mining power from China to other parts of the world, especially the United States and Russia. This changed attack patterns and targets. At a high level, we should be worried about both financially-motivated and government-backed groups, but as the crypto[currency] market grows so does the sophistication of attacks and attackers.”

Simon Handler is a fellow at the Atlantic Council’s Cyber Statecraft Initiative within the Digital Forensic Research Lab (DFRLab). He is also the editor-in-chief of The 5×5, a series on trends and themes in cyber policy. Follow him on Twitter @SimonPHandler.

The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

The post The 5×5—Cryptocurrency hacking’s geopolitical and cyber implications appeared first on Atlantic Council.

]]>
What Russian mercenaries tell us about Russia https://www.atlanticcouncil.org/commentary/podcast/what-russian-mercenaries-tell-us-about-russia/ Thu, 27 Apr 2023 14:17:06 +0000 https://www.atlanticcouncil.org/?p=640202 Host and nonresident senior fellow Alia Brahimi speaks with Russian defence analyst Pavel Luzin about what the proliferation of Russian mercenaries abroad tells us about Russia at home.

The post What Russian mercenaries tell us about Russia appeared first on Atlantic Council.

]]>

In Season 1, Episode 2 of the Guns for Hire podcast, host Alia Brahimi speaks with the Russian defence analyst Pavel Luzin about what the proliferation of Russian mercenaries abroad tells us about Russia at home. They explore the domestic forces that gave rise to the Kremlin’s co-optation of Russian mercenaries, how they are funded by the Russian federal budget, and the effects mercenaries are already having on Russian society. They also discuss how Russia’s strategy of playing the troublemaker in Libya won it a seat at the table in determining Libya’s future.

 

“Hundreds of thousands of veterans will come back sooner or later to Russia and it will be a political economy and social disaster. It will be [a] high level of violence”

Pavel Luzin, Russian defence analyst

Find the Guns For Hire podcast on the app of your choice

About the podcast

The Guns for Hire podcast is a production of the Atlantic Council’s North Africa Initiative. Taking Libya as its starting point, it explores the causes and implications of the growing use of mercenaries in armed conflict.

The podcast features guests from many walks of life, from ethicists and historians to former mercenary fighters. It seeks to understand what the normalisation of contract warfare tells us about the world as we currently find it, but also about the future of the international system and about what war could look like in the coming decades.

Further reading

Through our Rafik Hariri Center for the Middle East, the Atlantic Council works with allies and partners in Europe and the wider Middle East to protect US interests, build peace and security, and unlock the human potential of the region.

The post What Russian mercenaries tell us about Russia appeared first on Atlantic Council.

]]>
Russian War Report: Russian army presses on in Bakhmut despite losses https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-russian-army-presses-on-in-bakhmut-despite-losses/ Fri, 14 Apr 2023 17:34:44 +0000 https://www.atlanticcouncil.org/?p=636784 Bakhmut remains a major conflict zone with dozens of attacks on Ukrainian forces there, despite Russian forces sustaining heavy losses.

The post Russian War Report: Russian army presses on in Bakhmut despite losses appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Russian army presses on in Bakhmut despite losses

Russia enacts “e-drafting” law

Drone imagery locates new burial site east of Soledar

Russian hackers target NATO websites and email addresses

Russian army presses on in Bakhmut despite losses

The General Staff of the Ukrainian Armed Forces recorded fifty-eight attacks on Ukrainian troop positions on April 9 and 10. Of these attacks, more than thirty were in the direction of Bakhmut, and more than twenty were in the direction of Marinka and Avdiivka. Russian forces also attempted to advance toward Lyman, south of Dibrova.

Documented locations of fighting April 1-13, 2023; data gathered from open-source resources. (Source: Ukraine Control Map, with annotations by the DFRLab)
Documented locations of fighting April 1-13, 2023; data gathered from open-source resources. (Source: Ukraine Control Map, with annotations by the DFRLab)

On April 10, Commander of the Eastern Group of Ukrainian Ground Forces Oleksandr Syrskyi said that Russian forces in Bakhmut increasingly rely on government special forces and paratroopers because Wagner units have suffered losses in the recent battles. Syrskyi visited Bakhmut on April 9 to inspect defense lines and troops deployed to the frontline. According to the United Kingdom’s April 10 military intelligence report, Russian troops are intensifying tank attacks on Marinka but are still struggling with minimal advances and heavy losses. 

On April 13, Deputy Chief of the Main Operational Directorate of Ukrainian Forces Oleksiy Gromov said that Bakhmut remains the most challenging section on the frontline as Russian forces continue to storm the city center, trying to encircle it from the north and south through Ivanivske and Bohdanivka. According to Ukrainian estimates, during a two-week period, Russian army and Wagner Group losses in the battle for Bakhmut amounted to almost 4,500 people killed or wounded. To restore the offensive potential in Bakhmut, Russian units that were previously attacking in the direction of Avdiivka were transferred back to Bakhmut.

On April 8, Commander of the Ukrainian Air Forces Mykola Oleshchuk lobbied for Ukraine obtaining F-16 fighter jets. According to his statement, Ukrainian pilots are now “hostages of old technologies” that render all pilot missions “mortally dangerous.” Oleshchuk noted that American F-16 jets would help strengthen Ukraine’s air defense. Oleshchuk said that even with a proper number of aircraft and pilots, Ukrainian aviation, which is composed of Soviet aircraft and missiles, may be left without weapons at some point. He noted the F-16 has a huge arsenal of modern bombs and missiles. The commander also discussed the need for superiority in the air and control of the sea. Currently, Russian aviation is more technologically advanced and outnumbers Ukraine, meaning Ukraine cannot adequately protect its airspace. In order for the Ukrainian army to advance and re-capture territory occupied by Russia, it will require substantial deliveries of aviation and heavy equipment like tanks, howitzers, and shells. 

April 10, Ukrainian forces reported they had spotted four Russian ships on combat duty in the Black Sea, including one armed with Kalibr missiles. Another Russian ship was spotted in the Sea of Azov, along with seven in the Mediterranean, including three Kalibr cruise missile carriers. 

Meanwhile, according to Ukrainian military intelligence, Russia plans to produce Kh-50 cruise missiles in June. If confirmed, this could potentially lead to increased missile strikes against Ukraine in the fall. The Kh-50 missiles in the “715” configuration are intended to be universal, meaning they can be used by many Russian strategic bombers, including the Tu-22M3, Tu-95MS, and Tu-160.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

Russia enacts “e-drafting” law

On April 11, the Russian State Duma approved a bill reading allowing for the online drafting of Russian citizens using the national social service portal Gosuslugi. One day later, the Russian Federal Council adopted the law. The new law enables military commissariats, or voenkomat, to send mobilization notices to anyone registered in the Gosuslugi portal. Contrary to the traditional in-person delivery of paper notices, the digital mobilization order will be enforced immediately upon being sent out to the user; ordinarily, men drafted for mobilization could dispute the reception of the notice during the twenty-one-day period after the notice was sent. As of 2020, 78 million users were reportedly registered in the Gosuslugi portal, nearly two-thirds of the Russian population.

Alongside the adoption of the digital mobilization notices are newly adopted restrictions regarding unresponsive citizens. Those who fail to appear at their local military commissariat in the twenty-day period following notice will be barred from leaving the country and banned from receiving new credit or driving a car. Of the 164 senators who took part in the vote, only one voted against the bill; Ludmila Narusova argued that the law had been adopted exceptionally hastily and that the punishments against “deviants” who do not respond to the notice are “inadequate.”

As explained by Riga-based Russian news outlet Meduza, the law also states that reserves could be populated with those who legally abstained from military service until the age of twenty-seven, due to an amendment in the bill that allows for personal data to be shared with the Russian defense ministry in order to establish “reasonable grounds” for mobilization notices to be sent out. Several institutions across the country will be subject to the data exchange, including the interior ministry, the federal tax office, the pension and social fund, local and federal institutions, and schools and universities.

Valentin Châtelet, Research Associate, Security, Brussels, Belgium

Drone imagery locates new burial site east of Soledar

Images released by Twitter user @externalPilot revealed a new burial site, located opposite a cemetery, in the village of Volodymyrivka, southeast of Soledar, Donetsk Oblast. The DFRLab collected aerial imagery and assessed that the burial site emerged during the last week of March and the first week of April. The city of Soledar has been under Russian control since mid-January. The burial site faces the Volodymyrivka town cemetery. Drone footage shows several tombs with no apparent orthodox crosses or ornaments. Analysis of the drone imagery indicates around seventy new graves have been dug on this site. A DFRLab assessment of satellite imagery estimates the surface area of the burial site amounts to around thirteen hectares.

Location of new burial site east of Soledar, Volodymyrivka, Donetsk Oblast. (Source: PlanetLab, with annotations by the DFRLab)
Location of new burial site east of Soledar, Volodymyrivka, Donetsk Oblast. (Source: PlanetLab, with annotations by the DFRLab)

Valentin Châtelet, Research Associate, Security, Brussels, Belgium

Russian hackers target NATO websites and email addresses

On April 8, the pro-war Russian hacktivist movement Killnet announced they would target NATO in a hacking operation. On April 10, they said they had carried out the attack. The hacktivists claimed that “40% of NATO’s electronic infrastructure has been paralyzed.” They also claimed to have gained access to the e-mails of NATO staff and announced they had used the e-mails to create user accounts on LBGTQ+ dating sites for 150 NATO employees.

The hacktivists forwarded a Telegram post from the KillMilk channel showing screenshots of one NATO employee’s e-mail being used to register an account on the website GayFriendly.dating. The DFRLab searched the site for an account affiliated with the email but none was found.

Killnet also published a list of e-mails it claims to have hacked. The DFRLab cross-checked the e-mails against publicly available databases of compromised e-mails, like Have I been Pwned, Avast, Namescan, F-secure, and others. As of April 13, none of the e-mails had been linked to the Killnet hack, though this may change as the services update their datasets.

In addition, the DFRLab checked the downtime of the NATO websites that Killnet claims to have targeted with distributed denial of service (DDoS) attacks. According to IsItDownRightNow, eleven of the forty-four NATO-related websites (25 percent) were down at some point on April 10.  

Nika Aleksejeva, Resident Fellow, Riga, Latvia

The post Russian War Report: Russian army presses on in Bakhmut despite losses appeared first on Atlantic Council.

]]>
Game-changers: Implications of the Russo-Ukraine war for the future of ground warfare https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/game-changers-implications-of-the-russo-ukraine-war-for-the-future-of-ground-warfare/ Mon, 03 Apr 2023 16:30:00 +0000 https://www.atlanticcouncil.org/?p=631638 T.X. Hammes describes the most significant gamechangers for ground warfare from the Russo-Ukraine war and the lessons that US, allied, and partner policymakers should draw from the conflict for their own force posture and development.

The post Game-changers: Implications of the Russo-Ukraine war for the future of ground warfare appeared first on Atlantic Council.

]]>
FORWARD DEFENSE
ISSUE BRIEF

What does the record of combat in the year since Russia began its full-scale invasion of Ukraine herald about the future character of ground war? Defense analysts are split on whether the conflict manifests transformative change or merely reinforces the verities of ground combat. On the one hand, the bulk of each side’s formations are armed with decades-old equipment and trained in Soviet-era tactics. However, both forces are adapting, and the Ukrainian military is demonstrating an impressive propensity to improvise and innovate. In particular, Russia was not prepared for Ukraine’s convergence of new capabilities in command and control, persistent surveillance, and massed, precision fires which are changing the game of ground warfare.

Want to learn more? Watch the launch event.

Verities of ground combat

The Russo-Ukraine war has reinforced important continuities in military operations. These include the importance of preparation, logistics, and industrial capacity which are the core components needed to sustain a capable force. The war has also driven home the importance of both massed and precision fires. Cannon artillery has played a central role in the war, firing about two million rounds to date. Ukrainian forces have also adeptly employed long-range High Mobility Artillery Rocket Systems (HIMARS) to dramatically damage Russian ammunition resupply. Artillery fires have been, and will continue to be, crucial for supporting maneuver, degrading adversary communications and logistical capabilities, and destroying or suppressing adversary artillery. Consequently, the industrial capacity to produce the necessary ammunition, maintenance equipment, and systems to replace losses, will remain a defining feature of military preparedness.

Game-changers

The Ukrainian military has combined existing and new technologies to develop three capabilities that are dramatically altering the dynamics on the battlefield. First, Ukraine has developed truly connected, high-speed command and control. Second, Ukraine has access to near-persistent surveillance of the battlespace. Third, Ukraine’s skilled use of precision artillery, drones, and loitering munitions demonstrated how their smaller, lighter forces could defeat Russia’s offensive.

Recommendations

  • Recognize that these game-changing capabilities are giving new and powerful advantages to defenders in ground combat.
  • Structure and organize forces to operate in an environment of ubiquitous surveillance.
  • Prepare for ground combat in which large numbers of “semiautonomous” loitering munitions dominate the battlefield.
  • Recognize ground-based missiles and drones as key instruments of air power.
  • Engage the commercial sector as a key source of technology and innovation.

Generously sponsored by

Maxar Technologies
SAIC

About the author

T.X. Hammes

Distinguished Research FellowInstitute for National Strategic Studies, National Defense University

Dr. Thomas X. Hammes joined Institute for National Strategic Studies in June 2009. His areas of expertise include future conflict, the changing character of war, military strategy, operational concepts, and insurgency. Dr. Hammes earned a Bachelor of Science from the Naval Academy in 1975 and holds a Masters of Historical Research and a Doctorate in Modern History from Oxford University. He is a Distinguished Graduate from the Canadian National Defence College. He has published three books: Deglobalization and International Security; The Sling and the Stone: On War in the 21st Century; and The 1st Provisional Marine Brigade, the Corps’ Ethos, and the Korean War. He has also published over 160 articles. His publications have been used widely in staff and defense college curricula in the US, UK, Canada, Australia, and Singapore. Dr. Hammes has lectured extensively at leading academic and military institutions in the United States and abroad. Prior to his retirement from active duty, Dr. Hammes served 30 years in the Marine Corps to include command of an intelligence battalion, an infantry battalion and the Chemical Biological Response Force. He participated in military operations in Somalia and Iraq and trained insurgents in various locations.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Game-changers: Implications of the Russo-Ukraine war for the future of ground warfare appeared first on Atlantic Council.

]]>
The problem with India’s app bans https://www.atlanticcouncil.org/blogs/southasiasource/the-problem-with-indias-app-bans/ Mon, 27 Mar 2023 20:33:24 +0000 https://www.atlanticcouncil.org/?p=628678 The Indian government needs to build a comprehensive, transparent, and accountable means of addressing data privacy and security risks.

The post The problem with India’s app bans appeared first on Atlantic Council.

]]>
TikTok is front and center in the US debate on technology, privacy, cybersecurity, and US-China relations. Yet, the app has also been subject to conversation about national security in another country: India. Just before the Trump administration issued its executive order in August 2020 attempting to ban TikTok in the United States (later struck down in multiple courts and then withdrawn by the Biden administration in June 2021), New Delhi banned TikTok in June 2020. In the time since, India expanded this strategy, banning hundreds of other apps in the country—many with links to China—citing national security and sovereignty justifications.

The most recent iteration was in February, when the Indian government initiated a process to ban 138 betting apps and ninety-four lending apps, many of which it claimed have links to China. Authorities walked a few of these bans back after Indian companies like LazyPay and Kissht reportedly demonstrated they had no such links. Some US policymakers have praised India’s app bans, namely Federal Communications Commission Commissioner Brendan Carr, who said in January of this year that India set an “incredibly important precedent” by banning TikTok from the country.

But India’s app bans are not an example of constructive, careful, and established policy and process on the risks posed by foreign technology companies, products, and services.

Government overreach with no transparency

The administration of Prime Minister Narendra Modi is grossly mistaken in playing hundreds of rounds of whack-a-mole against Chinese apps. The bans were imposed with very little transparency and little or no public consultation. They were followed up by state orders—which went largely unquestioned—for internet service providers (ISPs) in India to filter out Indians’ access to TikTok servers. To top it off, India has no comprehensive privacy regime—exactly what it needs to better protect Indian citizens’ data, including from the undemocratic Modi government.

Instead, the country is witnessing overreaching government policies that make sweeping assessments of mobile apps behind closed doors, with few avenues of recourse by the public. Citizens’ data, meanwhile, remains vulnerable to widespread abuse.

India has banned hundreds of apps since the first round of app expulsions in June 2020. The government banned fifty-nine Chinese apps in June 2020, forty-seven apps in July 2020, 118 apps in September 2020, and forty-three apps in November 2020. In February 2022, over a year after the prior set of bans, New Delhi announced fifty-four new app bans. Most recently, in February 2023, the government initiated a process to ban 232 apps; the exact number of banned applications is unclear due to a lack of media coverage on subsequent walk-backs.

A data analysis of the bans indicates that they focus heavily on utility apps, photo and video apps, social media apps, messaging and social networking apps, and gaming apps. In many of these cases, New Delhi has asserted that the apps are prejudicial to the national security and sovereignty of India. Clearly, this language was selected because it pulls from Section 69(A) of India’s Information Technology Act of 2000, the legislation which the Indian government invokes with these bans. The provision states that:

“Where the Central Government or a State Government or any of its offers specially authorized by the Central Government or the State Government, as the case may be, in this behalf may, if satisfied that it is necessary or expedient to do so, in the interest of the sovereignty or integrity of India, defense of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offense relating to or above or for investigation of any offense, it may be subject to the provisions of sub-section (2), for reasons to be recorded in writing, by order, direct any agency of the appropriate Government to intercept, monitor or decrypt or cause to be intercepted or monitored or decrypted any information generated, transmitted, received or stored in any computer resource.”

With each of these app bans, the Indian government has given little public notice or none at all. For example, the scramble in the wake of the February 2023 bans—where companies in India were banned because of alleged links to China, though they subsequently demonstrated nothing of the sort—suggests the companies were not approached or notified by the government prior to the bans’ public announcement. New Delhi has also consistently provided insufficient information on its reasoning for the bans. As the nonprofit Internet Freedom Foundation in India wrote after the first round of June 2020 bans, “currently we only have a press release and not the actual order,” which is needed “since it contains the reasons for the ban which are important when we try to assess the legality and validity of the ban.” The lack of public notice is especially significant given that the actions did not target a single app or company at once; instead, each round of bans threw dozens or even more than one hundred apps out of India at a time.

Governments need to provide a clear public explanation (if not also evidence) for decisions to restrict a tech company, product, or service’s market access for “security” reasons. This is because not every risk posed by a technology company, product, or service is the same. Consider a hypothetical example: a social media platform could raise questions about the risk of corporate data abuse; foreign government data access; foreign government content manipulation; addictiveness for children; and so on. Each of these are different concerns requiring unique diagnoses and policy responses. Hence, broadly claiming “security” and “sovereignty” is an insufficient justification for a complete ban—just as US policymakers who initially said “TikTok is owned by a Chinese firm” were not properly breaking down the perceived risks. Democracies (even if backsliding) should provide the public, the private sector, and civil society with explanations for their tech policy decisions. 

In India’s case, the state has failed to properly do so time and time again with these bans.

A lack of due process for ban policies

The process for India’s app bans is also highly concerning. The so-called IT Blocking Rules from 2009 laid out regulations for how these types of bans should take place (as required in Section 69(B) of the Information Technology Act). But, as the Internet Freedom Foundation noted in June 2020, it was unclear if the Indian government’s decision to enact these bans followed the proper process—to include holding a pre-decisional hearing. Process rarely makes for interesting conversation, but it’s vital. How a government reviews tech companies, products, and services for security risks; how it makes determinations about those risks; whether it consults with outside voices on those risks; and how it communicates those risks and that process to the public all shape whether government security reviews are nuanced, transparent, and accountable.

Even if one agrees with the result of a ban—such as expelling TikTok from India—how the Modi government arrived there, and its unilateral power to block and censor in this area, are still great reasons for concern. There has been woefully insufficient press attention, in India and even more so in the West, to the fact that New Delhi quickly got Apple and Google to remove apps from their stores and then ordered ISPs, at least in TikTok’s case, to filter Indians’ web traffic to block access to servers.

There is also a strong political dimension to these actions. When the Indian government first started banning China-linked apps in June 2020, including TikTok, it followed an India-China border clash in which twenty Indian soldiers and four Chinese soldiers reportedly died. That India’s app bans were compared to “digital counterstrikes” from India to China underscore the fact that the move was heavily politically motivated, meant to signal to the Indian public that the Modi government was responding, and to China that India was willing to constrain Chinese apps’ market access. New Delhi was able to signal resolve against Beijing (at least in its mind), defending Indian “sovereignty” (as per the ban press release) without taking military action.

Modi’s administration has also been increasing pressure on tech companies operating in India. For instance, there was significant media reporting about Facebook, India, and the ruling Bharatiya Janata Party (BJP); in addition to underinvesting in content moderation in India and many other countries, Facebook reportedly had internal pushes to relax its rules for BJP officials spreading hate speech because the users in question belonged to the party in power. Indian police also raided (empty) Twitter offices in 2021—a move reminiscent of the Russian government’s coercive tactics—after the company applied a “manipulated media” label to a tweet from a BJP official. Even with discussions of data localization in India, one of the many motivations at play was the Indian government’s interest in applying pressure to—and holding leverage over—tech companies operating there. 

The app bans fit within this broader context of tech company coercion and state efforts to increase control of the tech environment.

No data privacy regime means “anything goes”

Lastly, India has no comprehensive privacy law. The new Digital Personal Data Protection Bill is a mixed bag for privacy but has some improvements over the previous legislation (the Personal Data Protection Bill) which had broad data localization requirements among other things. Negotiations are still ongoing. Yet, that is exactly the point: the Modi government has banned hundreds and hundreds of apps, many with links to China, in the past 2.5 years, while India is still without a law to constrain corporate data collection, rein in the sale of Indians’ data by data brokers, and place guardrails around expanding Indian government surveillance.

Without a doubt, the Chinese government is heavily engaged in espionage against countries around the world—India included—and it’s safe to assume that most if not all Chinese tech firms must answer to Beijing when asked. China is not micromanaging all companies all the time (as that would be unwieldy) but the risks of Chinese state influence on Chinese tech firms are certainly present. 

The Indian government needs to build a comprehensive, transparent, and accountable means of addressing data privacy and security risks. Playing endless rounds of arbitrary whack-a-mole against apps—with little to no public consultation—is a step in the wrong direction with serious consequences.

The author thanks Rose Jackson for comments on an earlier draft of this article.

Justin Sherman (@jshermcyber) is a nonresident fellow at the Atlantic Council’s Cyber Statecraft Initiative and the founder and CEO of Global Cyber Strategies, a Washington, DC-based research and advisory firm.

The South Asia Center is the hub for the Atlantic Council’s analysis of the political, social, geographical, and cultural diversity of the region. ​At the intersection of South Asia and its geopolitics, SAC cultivates dialogue to shape policy and forge ties between the region and the global community.

The post The problem with India’s app bans appeared first on Atlantic Council.

]]>
Defeating the Wagner Group https://www.atlanticcouncil.org/commentary/podcast/defeating-the-wagner-group/ Thu, 23 Mar 2023 14:39:42 +0000 https://www.atlanticcouncil.org/?p=626622 Host and nonresident senior fellow Alia Brahimi speaks with author and former mercenary Dr. Sean McFate about his three-pronged strategy for defeating the Wagner Group.

The post Defeating the Wagner Group appeared first on Atlantic Council.

]]>

In Season 1, Episode 1 of the Guns for Hire podcast, host Alia Brahimi speaks with the author and former mercenary Dr. Sean McFate about his three-pronged strategy for defeating the Wagner Group. They also discuss internal dynamics within the Kremlin-linked private military company, the dangerously outsized influence of its leader in the war in Ukraine, and Sean’s argument that there’s nothing more unconventional today than a conventional war– and that this is borne out by the way that Russia is fighting in Ukraine.

 

“There’s this natural schism, between for-profit and not-for-profit warriors. Let’s just widen that schism in the Russian instance.”

Sean McFate, author and former mercenary

Find the Guns For Hire podcast on the app of your choice

About the podcast

The Guns for Hire podcast is a production of the Atlantic Council’s North Africa Initiative. Taking Libya as its starting point, it explores the causes and implications of the growing use of mercenaries in armed conflict.

The podcast features guests from many walks of life, from ethicists and historians to former mercenary fighters. It seeks to understand what the normalisation of contract warfare tells us about the world as we currently find it, but also about the future of the international system and about what war could look like in the coming decades.

Further reading

Through our Rafik Hariri Center for the Middle East, the Atlantic Council works with allies and partners in Europe and the wider Middle East to protect US interests, build peace and security, and unlock the human potential of the region.

The post Defeating the Wagner Group appeared first on Atlantic Council.

]]>
The 5×5—Conflict in Ukraine’s information environment https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-conflict-in-ukraines-information-environment/ Wed, 22 Mar 2023 04:01:00 +0000 https://www.atlanticcouncil.org/?p=625738 Experts provide insights on the war being waged through the Ukrainian information environment and take away lessons for the future.

The post The 5×5—Conflict in Ukraine’s information environment appeared first on Atlantic Council.

]]>
This article is part of The 5×5, a monthly series by the Cyber Statecraft Initiative, in which five featured experts answer five questions on a common theme, trend, or current event in the world of cyber. Interested in the 5×5 and want to see a particular topic, event, or question covered? Contact Simon Handler with the Cyber Statecraft Initiative at SHandler@atlanticcouncil.org.

Just over one year ago, on February 24, 2022, Russia launched a full-scale invasion of neighboring Ukraine. The ensuing conflict, Europe’s largest since World War II, has not only besieged Ukraine physically, but also through the information environment. Through kinetic, cyber, and influence operations, Russia has placed Ukraine’s digital and physical information infrastructure—including its cell towers, networks, data, and the ideas that traverse them—in its crosshairs as it seeks to cripple Ukraine’s defenses and bring its population under Russian control. 

Given the privately owned underpinnings of the cyber and information domains by technology companies, a range of local and global companies have played a significant role in defending the information environment in Ukraine. From Ukrainian telecommunications operators to global cloud and satellite internet providers, the private sector has been woven into Ukrainian defense and resilience. For example, Google’s Threat Analysis Group reported having disrupted over 1,950 instances in 2022 of Russian information operations aimed at degrading support for Ukraine, undermining its government, and building support for the war within Russia. The present conflict in Ukraine offers lessons for states as well as private companies on why public-private cooperation is essential to building resilience in this space, and how these entities can work together more effectively. 

We brought together a group of experts to provide insights on the war being waged through the Ukrainian information environment and take away lessons for the United States and its allies for the future. 

#1 How has conflict in the information environment associated with the war in Ukraine compared to your prior expectations?

Nika Aleksejeva, resident fellow, Baltics, Digital Forensic Research Lab (DFRLab), Atlantic Council

“As the war in Ukraine started, everyone was expecting to see Russia conducting offensive information influence operations targeting Europe. Yes, we have identified and researched Russia’s coordinated information influence campaigns on Meta’s platforms and Telegram. These campaigns targeted primarily European countries, and their execution was unprofessional, sloppy, and without much engagement on respective platforms.” 

Silas Cutler, senior director for cyber threat research, Institute for Security and Technology (IST)

“A remarkable aspect of this conflict has been how Ukraine has maintained communication with the rest of the world. In the days leading up to the conflict, there was a significant concern that Russia would disrupt Ukraine’s ability to report on events as they unfolded. Instead of losing communication, Ukraine has thrived while continuously highlighting through social media its ingenuity within the conflict space. Both the mobilization of its technical workforce through the volunteer IT_Army and its ability to leverage consumer technology, such as drones, have shown the incredible resilience and creativity of the Ukrainian people.” 

Roman Osadchuk, research associate, Eurasia, Digital Forensic Research Lab (DFRLab), Atlantic Council: 

“The information environment was chaotic and tense even before the invasion, as Russia waged a hybrid war since at least the annexation of Crimea and war in Eastern Ukraine in 2014. Therefore, the after-invasion dynamic did not bring significant surprises, but intensified tension and resistance from Ukrainian civil society and government toward Russia’s attempts to explain its unprovoked invasion and muddle the water around its war crimes. The only things that exceeded expectations were the abuse of fact-checking toolbox WarOnFakes and the intensified globalization of the Kremlin’s attempts to tailor messages about the war to their favor globally.” 

Emma Schroeder, associate director, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council

“The information environment has been a central space and pathway throughout which this war is being fought. Russian forces are reaching through that space to attack and spread misinformation, as well as attacking the physical infrastructure underpinning this environment. The behavior, while novel in its scale, is the continuation of Russian strategy in Crimea, and is very much living up to expectations set in that context. What has surpassed expectations is the effectiveness of Ukrainian defenses, in coordination with allies and private sector partners. The degree to which the international community has sprung forward to provide aid and assistance is incredible, especially in the information environment where such global involvement can be so immediate and transformative.” 

Gavin Wilde, senior fellow, Technology and International Affairs Program, Carnegie Endowment for International Peace

“The volume and intensity of cyber and information operations has roughly been in line with my prior expectations, though the degree of private and commercial activity was something that I might not have predicted a year ago. From self-selecting out of the Russian market to swarming to defend Ukrainian networks and infrastructure, the outpouring of support from Western technology and cybersecurity firms was not on my bingo card. Sustaining it and modeling for similar crises are now key.” 

 
#2 What risks do private companies assume in offering support or partnership to states engaged in active conflict?

Aleksejeva: “Fewer and fewer businesses are betting on Russia’s successful economical future. Additionally, supporting Russia in this conflict in any way is morally unacceptable for most Western companies. Chinese and Iranian companies are different. As for Ukraine, supporting it is morally encouraged, but is limited by many practicalities, such as supply chain disruptions amid Russia’s attacks.” 

Cutler: “By providing support during conflict, companies risk becoming a target themselves. Technology companies such as Microsoft, SentinelOne, and Cloudflare, which have publicly reported their support for Ukraine, have been historically targeted by Russian cyber operations and are already familiar with the increased risk. Organizations with pre-conflict commercial relationships may fall under new scrutiny by nationally-aligned hacktivist groups such as Killnet. This support for one side over the other—whether actual or perceived—may result in additional risk.” 

Osadchuk: “An important risk of continuing business as usual [in Russia] is that it may damage a company’s public image and test its declared values, since the continuation of paying taxes within the country-aggressor makes the private company a sponsor of these actions. Another risk for a private company is financial, since the companies that leave a particular market are losing their profits, but this is incomparable to human suffering and losses caused by the aggression. In the case of a Russian invasion, one of the ways to stop the war is to cut funding for and, thus, undermine the Russian war machine and support Ukraine.” 

Schroeder: “Private companies have long provided goods and services to combatants outside of the information environment. The international legal framework restricting combatants to targeting ‘military objects’ provides normative protection, as objects are defined as those ‘whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offers a definite military advantage’ in a manner proportional to the military gain foreseen by the operation. This definition, however, is still subject to the realities of conflict, wherein combatants will make those decisions to their own best advantage. In the information environment, this question becomes more complicated, as cyber products and services often do not fall neatly within standard categories and where private companies themselves own and operate the very infrastructure over and through which combatants engage. The United States and its allies, whether on a unilateral of supranational basis, work to better define the boundaries of civilian ‘participation’ in war and conflict, as the very nature of the space means that their involvement will only increase.” 

Wilde: “On one hand, it is important not to falsely mirror onto others the constraints of international legal and normative frameworks around armed conflict to which responsible states strive to adhere. Like Russia, some states show no scruples about violating these frameworks in letter or spirit, and seem unlikely to be inhibited by claims of neutrality from companies offering support to victimized states. That said, clarity about where goods and services might be used for civilian versus military objectives is advisable to avoid the thresholds of ‘direct participation’ in war outlined in International Humanitarian Law.”

#3 What useful lessons should the United States and its allies take away from the successes and/or failures of cyber and information operations in Ukraine?

Aleksejeva: “As for cyber operations, so far, we have not seen successful disruptions achieved by Russia of Ukraine and its Western allies. Yes, we are seeing constant attacks, but cyber defense is much more developed on both sides than before 2014. As for information operations, the United States and its allies should become less self-centered and have a clear view of Russia’s influence activities in the so-called Global South where much of the narratives are rooted in anti-Western sentiment.” 

Cutler: “Prior to the start of the conflict, it was strongly believed that a cyber operation, specifically against energy and communication sectors, would act as a precursor to kinetic action. While a WannaCry or NotPetya-scale attack did not occur, the AcidRain attack against the Viasat satellite communication network and other attacks targeting Ukraine’s energy sector highlight that cyber operations of varying effectiveness will play a role in the lead up to a military conflict.” 

Osadchuk: “First, cyber operations coordinate with other attack types, like kinetic operations on the ground, disinformation, and influence operations. Therefore, cyberattacks might be a precursor of an upcoming missile strike, information operation, or any other action in the physical and informational dimensions, so allies could use cyber to model and analyze multi-domain operations. Finally, preparation for and resilience to information and cyber operations are vital in mitigating the consequences of such attacks; thus, updating defense doctrines and improving cyber infrastructure and social resilience are necessary.” 

Schroeder: “Expectations for operations in this environment have exposed clear fractures in the ways that different communities define as success in a wartime operation. Specifically, there is a tendency to equate success with direct or kinetic battlefield impact. One of the biggest lessons that has been both a success and a failure throughout this war is the role that this environment can play. Those at war, from ancient to modern times, have leveraged every asset at their disposal and chosen the tool they see as the best fit for each challenge that arises—cyber is no different. While there is ongoing debate surrounding this question, if cyber operations have not been effective on a battlefield, that does not mean that cyber is ineffective, just that expectations were misplaced. Understanding the myriad roles that cyber can and does play in defense, national security, and conflict is key to creating an effective cross-domain force. 

Wilde: “Foremost is the need to check the assumption that these operations can have decisive utility, particularly in a kinetic wartime context. Moscow placed great faith in its ability to convert widespread digital and societal disruption into geopolitical advantage, only to find years of effort backfiring catastrophically. In other contexts, better trained and resourced militaries might be able to blend cyber and information operations into combined arms campaigns more effectively to achieve discrete objectives. However, it is worth reevaluating the degree to which we assume offensive cyber and information operations can reliably be counted on to play pivotal roles in hot war.”

More from the Cyber Statecraft Initiative:

#4 How do comparisons to other domains of conflict help and/or hurt understanding of conflict in the information domain?

Aleksejeva: “Unlike conventional warfare, information warfare uses information and psychological operations during peace time as well. By masking behind sock puppet or anonymous social media accounts, information influence operations might be perceived as legitimate internal issues that polarize society. A country might be unaware that it is under attack. At the same time, as the goal of conventional warfare is to break an adversary’s defense line, information warfare fights societal resilience by breaking its unity. ‘Divide and rule’ is one of the basic information warfare strategies.” 

Cutler: “When looking at the role of cyber in this conflict, I think it is critical to examine the history of Hacktivist movements. This can be incredibly useful for understanding the influences and capabilities of groups like the IT_Army and Killnet.” 

Osadchuk: “The information domain sometimes reflects the kinetic events on the ground, so comparing these two is helpful and could serve as a behavior predictor. For instance, when the Armed Forces of Ukraine liberate new territories, they also expose war crimes, civilian casualties, and damages inflicted by occupation forces. In reaction to these revelations, the Kremlin propaganda machine usually launches multiple campaigns to distance themselves, blame the victim, or even denounce allegations as staged to muddy the waters for certain observers.” 

Schroeder: “It is often tricky to carry comparisons over different environments and context, but the practice persists because, well, that is just what people do—look for patterns. The ability to carry over patterns and lessons is essential, especially in new environments and with the constant developments of new tools and technologies. Where these comparisons cause problems is when they are used not as a starting point, but as a predetermined answer.” 

Wilde: “It is problematic, in my view, to consider information a warfighting ‘domain,’ particularly because its physical and metaphorical boundaries are endlessly vague and evolving—certainly relative to air, land, sea, and space. The complexities and contingencies in the information environment are infinitely more than those in the latter domains. However talented we may be at collecting and analyzing millions of relevant datapoints with advanced technology, these capabilities may lend us a false sense of our ability to control or subvert the information environment during wartime—from hearts and minds to bits and bytes.”

#5 What conditions might make the current conflict exceptional and not generalizable?

Aleksejeva: “This war is neither ideological nor a war for territories and resources. Russia does not have any ideology that backs up its invasion of Ukraine. It also has a hard time maintaining control of its occupied territories. Instead, Russia has many disinformation-based narratives or stories that justify the invasion to as many Russian citizens as possible including Kremlin officials. Narratives are general and diverse enough, so everyone can find an explanation of the current invasion—be it the alleged rebirth of Nazism in Ukraine, the fight against US hegemony, or the alleged historical right to bring Ukraine back to Russia’s sphere of influence. Though local, the war has global impact and makes countries around the world pick sides. Online and social media platforms, machine translation tools, and big data products provide a great opportunity to bombard any internet user in any part of the world with pro-Russia massaging often tailored to echo historical, racial, and economic resentments especially rooted in colonial past.” 

Cutler: “During the Gulf War, CNN and other cable news networks were able to provide live coverage of military action as it was unfolding. Now, real-time information from conflict areas is more broadly accessible. Telegram and social media have directly shaped the information and narratives from the conflict zone.” 

Osadchuk: “The main difference is the enormous amount of war content, ranging from professional pictures and amateur videos after missile strikes to drone footage of artillery salvos and bodycam footage of fighting in the frontline trenches—all making this conflict the most documented. Second, this war demonstrates the need for drones, satellite imagery, and open-source intelligence for successful operations, which distances it from previous conflicts and wars. Finally, it is exceptional due to the participation of Ukrainian civil society in developing applications, like the one alerting people about incoming shelling or helping find shelter; launching crowdfunding campaigns for vehicles, medical equipment, and even satellite image services; and debunking Russian disinformation on social media.” 

Schroeder: “One of the key lessons we can take from this war is the centrality of the global private sector to conflict in and through the information environment. From expedited construction of cloud infrastructure for the Ukrainian government to Ukrainian telecommunications companies defending and restoring services along the front lines to distributed satellite devices, providing flexible connectivity to civilians and soldiers alike, private companies have undoubtedly played an important role in shaping both the capabilities of the Ukrainian state and the information battlespace itself. While we do not entirely understand the incentives that drove these actions, an undeniable motivation that will be difficult to replicate in other contexts is the combination of Russian outright aggression and comparative economic weakness. Companies and their directors felt motivated to act due to the first and, likely, free to act due to the second. Private sector centrality is unlikely to diminish and, in future conflicts, it will be imperative for combatants to understand the opportunities and dependencies that exist in this space within their own unique context.” 

Wilde: “My sense is that post-war, transatlantic dynamics—from shared norms to politico-military ties—lent significant tailwinds to marshal resource and support to Ukraine (though not as quickly or amply from some quarters as I had hoped). The shared memory of the fight for self-determination in Central and Eastern Europe in the late 1980s to early 1990s still has deep resonance among the publics and capitals of the West. These are unique dynamics, and the degree to which they could be replicated in other theaters of potential conflict is a pretty open question.”

Simon Handler is a fellow at the Atlantic Council’s Cyber Statecraft Initiative within the Digital Forensic Research Lab (DFRLab). He is also the editor-in-chief of The 5×5, a series on trends and themes in cyber policy. Follow him on Twitter @SimonPHandler.

The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

The post The 5×5—Conflict in Ukraine’s information environment appeared first on Atlantic Council.

]]>
In brief: C4ISR – A five-step guide to maintaining NATO’s comparative military edge over the coming decade https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/in-brief-c4isr-a-five-step-guide-to-maintaining-natos-comparative-military-edge-over-the-coming-decade/ Thu, 16 Mar 2023 14:11:14 +0000 https://www.atlanticcouncil.org/?p=624208 The Atlantic Council presents a five step guide to maintaining NATO's comparative military edge over the coming decade.

The post In brief: C4ISR – A five-step guide to maintaining NATO’s comparative military edge over the coming decade appeared first on Atlantic Council.

]]>

Top lines

  • C4ISR, which stands for command and control, communications, computers, intelligence, surveillance and reconnaissance, is the nervous system of the military.
  • NATO’s current C4ISR systems and thinking do not meet all of the Alliance’s needs. The relevance of such systems in the future will only grow. Mounting threats and challenges to NATO will raise requirements for better awareness, decision making, and rapid response.
  • NATO should seize the momentum and unity that Russia’s invasion of Ukraine has generated, and use it to update its C4ISR.

WORTH A THOUSAND WORDS

C4ISR is the backbone on which NATO awareness, decisions, and action rely, yet the complexity of the system makes its modernization both difficult and essential.

Credit: NATO

THE DIAGNOSIS

Amid historical neglect and focus on crisis response, C4ISR capabilities for collective defense lag behind the level of ambition necessary for the currently volatile geopolitical environment.

With Russia’s war in Ukraine drastically changing the context of European security and defense, the speed of understanding, decision-making, and action among allies are more important than ever. NATO’s strength lies in its ability to collectively decide and act, organize, and integrate. However, the C4ISR capabilities that allow the allies to do that—and much more—remain under resourced and much less effective than required. While much has been done to improve NATO C4ISR over the past decade, much work remains.

NATO has a unique opportunity to leverage the current sense of unity, urgency and shared vision among allies to build the C4ISR architecture the Alliance needs for the future. The time to act is now, when the war in Ukraine is providing a treasure trove of lessons for the Alliance, ranging from the requirements to be ready from day one for any NATO mission (also called day zero readiness) to the important role the private industry plays in the security and resilience of any modern nation state. Early progress can also prepare the Alliance for emerging threats and challenges, such as China’s rise and climate change. The political decisions and level of ambition set by the June 2022 Madrid Summit Declaration and NATO 2022 Strategic Concept—the most important of which include those related to strengthening NATO deterrence and defense and increasing focus on innovation and emerging and disruptive technologies—will be guiding and shaping the requirements and development of the NATO C4ISR architecture of the future.

THE PRESCRIPTION

How to seize the moment

There are five critical steps transatlantic decision-makers can take to modernize NATO C4ISR and help the Alliance maintain its military edge against potential adversaries in an increasingly contested geopolitical environment. Improving  NATO’s C4ISR capabilities will give NATO a relevant and credible nervous system equal to the challenges ahead.

  1. Share more data and intelligence.

    Shared data, information and intelligence are fuel for C4ISR. The uncomfortable truth is that data and intelligence sharing is not at the level it can or needs to be. This also means that the opportunity cost of not sharing sometimes can be enormous. With the right political will and tailored security measures, the vast amounts of data and intelligence collected by NATO and its member states could be better exploited for the benefit of collective security and defense.
  2. Transform digitally.

    Digital transformation, intended to address digitalization, connectivity, data frameworks and data management, is a nascent effort that is fundamental for strengthening security and defense and improving resilience. The digital revolution is intertwined with  C4ISR architecture, because a more technologically advanced C4ISR edge can help the Alliance achieve significant increases in speed, security, and effectiveness in command and control, communications, data and intelligence analysis, decision-making, operations, and interoperability. Proceeding along this journey is particularly important as the Alliance is trying to shift to a new concept of operations, effective multi-domain operations, which entails the integration of kinetic and non-kinetic efforts, across all warfighting domains, at speed and scale.
  3. Implement new concepts, policies, and plans to clarify C4ISR requirements.

    To outthink and outpace potential adversaries, NATO must act now to develop the future C4ISR architecture it needs. Several efforts underway, such as the new NATO Force Model, Alliance Multi Domain Operations Concept, Allied Command Operations Command and Control (C2) assessment, and NATO’s Joint Intelligence Surveillance and Reconnaissance (JISR) Vision 2030+, will directly influence future NATO C4ISR requirements. NATO must provide a definition for C4ISR in an allied context, build a shared understanding among allies around that definition, and ensure coherence in planning, capability and concept development.
  4. Modernize, augment, and acquire capabilities to meet new C4ISR requirements.

    There are a few practical steps NATO should take to maintain its technological and military edge in the future. This includes transforming existing C4ISR force structure, improving NATO’s ability to receive national and commercial space-based information, reducing gaps in integrated air and missile defense (IAMD), developing greater electronic warfare capabilities, and investing in and promoting innovation and adoption of emergent and disruptive technologies such as Artificial Intelligence, autonomy, space-based capabilities, and quantum computing.
  5. Continue to invest in C4ISR interoperability, readiness, resilience, innovation, and adaptation.

    NATO’s strength lies in its ability to collectively decide and act, organize, and integrate. NATO C4ISR forces and capabilities provide the interoperable structure and digital backbone into which member states plug for collective awareness, decision-making, and action. Investing in C4ISR readiness, resilience, and capabilities is a direct contribution to greater potential of the Alliance itself.

BOTTOM LINES

NATO needs a modern and well-defined C4ISR architecture to keep pace with the rapidly changing operational environment and achieve its mission of securing and defending its thirty allies and their interests. Ultimately, the question is not whether NATO will need to evolve and develop its C4ISR capabilities, but whether it can do so in time to meet the ever-growing threats to the Alliance. In its current state, NATO C4ISR will be severely challenged to guarantee the security and defense of the Alliance against the threats it expects to face over the coming decade.

Although C4ISR underpins the success of every NATO operation, its criticality remains underappreciated. However, transatlantic decision-makers right now have the perfect opportunity to implement the recommendations above and set forth the path for the necessary modernization of NATO’s C4ISR architecture. NATO stands stronger and more united than ever. Allied defense investments are rising. Additionally, the foundations of a future C4ISR architecture and its components are progressing in various stages of development and planning. NATO must prioritize C4ISR in light of these positive developments, helping it leapfrog from an underappreciated piece of the puzzle to a key enabler for the Alliance’s defense and deterrence.

Like what you read? Dive deep into our full report.

NATO C4ISR

Report

Mar 16, 2023

The future of NATO C4ISR: Assessment and recommendations after Madrid

By Gordon B. “Skip” Davis Jr.

Current C4ISR capabilities, concepts, policies, and processes do not meet all of the Alliance’s needs. While much has been done to improve NATO C4ISR over the past decade, much work remains.

China Conflict

Related program

The Transatlantic Security Initiative, in the Scowcroft Center for Strategy and Security, shapes and influences the debate on the greatest security challenges facing the North Atlantic Alliance and its key partners.

Subscribe for more content

Subscribe for events and publications on transatlantic security

Sign up for updates from the Atlantic Council’s Transatlantic Security Initiative, covering the debate on the greatest security challenges facing the North Atlantic Alliance and its key partners.



  • This field is for validation purposes and should be left unchanged.

The post In brief: C4ISR – A five-step guide to maintaining NATO’s comparative military edge over the coming decade appeared first on Atlantic Council.

]]>
The future of NATO C4ISR: Assessment and recommendations after Madrid https://www.atlanticcouncil.org/in-depth-research-reports/report/the-future-of-nato-c4isr-assessment-and-recommendations-after-madrid/ Thu, 16 Mar 2023 13:36:35 +0000 https://www.atlanticcouncil.org/?p=621883 Current C4ISR capabilities, concepts, policies, and processes do not meet all of the Alliance’s needs. While much has been done to improve NATO C4ISR over the past decade, much work remains.

The post The future of NATO C4ISR: Assessment and recommendations after Madrid appeared first on Atlantic Council.

]]>

Table of contents

Foreword
Premise
Introduction
Threats and challenges shaping NATO C4ISR
Lessons from the Russia-Ukraine war for NATO C4ISR and future needs

Multi-domain operations
Day zero readiness
NATO Intelligence Enterprise (NIE)
Persistence and survivability
Multidisciplinary intelligence and fusion
Tasking, Collection, Processing, Exploitation, and Dissemination (TCPED)
Cyber
The role of private industry
Digitalization, connectivity, and Big Data
Decisions taken at the Madrid Summit and work underway affecting NATO C4ISR

Multi-domain warfighting
Digital Transformation
Strengthened deterrence and defense posture
Robust, resilient, and integrated command structure and enhanced C2 arrangements
Global awareness
Innovation and EDTs
Defense investment
Recommendations: Share, transform, implement, modernize and invest

1. Share more data and intelligence
2. Transform digitally
3. Implement new concepts, policies, and plans to clarify requirements for NATO C4ISR
4. Modernize, augment, and acquire capabilities to meet new C4ISR requirements
5. Continue to invest in NATO C4ISR interoperability, readiness, resilience, innovation, and adaptation
Conclusion

Glossary
About the author

Foreword

Even as Russia’s illegal and unprovoked war in Ukraine rages, the transatlantic community is seeking to integrate lessons from the battlefield to adapt its defense planning for a rapidly changing world. Already, one lesson is clear: In a contested Europe, allies need to have better awareness of the operating environment. The speed and quality of decision-making and execution must improve. Effective and ethical NATO decision-making must be translated into operational effects. NATO must prioritize the modernization and integration of its command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) architecture to keep pace with the rapidly changing operational environment.

While a complex concept, C4ISR is most easily understood as the “nervous system” of the military. It is essential to everyday operations, automatic responses, and the complicated processes inherent to large enterprises. Rapid and fundamental changes in our security environment—including the return of large-scale war in Europe, China’s growing global ambitions, climate change, and the transformative potential of emerging technologies—require an immediate and critical examination of NATO’s C4ISR architecture. Modernizing C4ISR is necessary to maintain a competitive advantage against state-based adversaries, other systemic challenges, and threats yet to materialize—all of which could overturn the rules-based international order NATO is dedicated to preserving.

The platform offered by NATO’s new Strategic Concept for strengthening defense and deterrence while leveraging emerging and disruptive technologies provides a unique window of opportunity for transatlantic decision-makers. It is NATO’s C4ISR capabilities that will enable a relevant and credible NATO “nervous system” equal to the challenges ahead.

To that end, this study by the Atlantic Council—the culmination of a year of research and interviews by NATO’s former deputy assistant secretary general for defense investment—offers a detailed roadmap to achieve this goal. This comprehensive report offers an expert treatment on the topic of C4ISR modernization to help transatlantic decision-makers, operational forces, the expert and policy community, and military technology watchers alike better understand the challenges and opportunities inherent to NATO’s C4ISR architecture. Importantly, it imagines the possibilities for C4ISR modernization through a series of thoughtfully considered recommendations.

Ultimately, the question is not whether NATO will need to evolve and develop its C4ISR capabilities, but whether it can do so in time to meet the gathering threats to the Alliance. I believe this extensive study skillfully sets forth the path for the necessary modernization of NATO’s C4ISR architecture.

Gen. James E. Cartwright, USMC (Ret.)
Board Director
Atlantic Council 
Former Vice Chairman of the Joint Chiefs of Staff

Premise

NATO needs to urgently respond to changing requirements, leverage the potential of technology and innovation, and address critical issues to provide the command and control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) architecture that Alliance leaders and forces need to maintain their comparative military advantage over the coming decade.

Current C4ISR capabilities, concepts, policies, and processes do not meet all of the Alliance’s needs. While much has been done to improve NATO C4ISR over the past decade, much work remains. Russia’s war in Ukraine and other threats and challenges, including from China and climate change, have added a sense of urgency to this task. Russian aggression, in particular, has tested some aspects of NATO C4ISR and provided initial lessons learned in terms of its strengths, vulnerabilities, and shortfalls.

NATO has a unique window of opportunity to leverage the current sense of urgency, newfound cohesion among allies, and an agreed vision to build the C4ISR architecture it needs for the future.

NATO needs to first provide a clarifying definition of C4ISR architecture, which does not currently exist. A defined C4ISR architecture would harmonize defense planning efforts across multiple domains, enable aggregation and assessment of related capability targets, and ensure greater coherence in concept and capability development.

The trajectory of NATO C4ISR is impacted by political ambitions. These include Digital Transformation, increasing resilience, understanding the security implications of climate change, reducing defense impacts on climate change (e.g., reducing the use of fossil fuels, energy consumption, carbon emissions, toxic waste, and contaminants), and raising the level of NATO common funding.

Political decisions and ambitions announced in the June 2022 Madrid Summit Declaration and NATO 2022 Strategic Concept—the most important of which include those related to strengthening deterrence and defense and increasing focus on innovation and emerging and disruptive technologies—will shape the NATO C4ISR architecture of the future.

Read our in-brief summary of the report

Executive Summary

Mar 16, 2023

In brief: C4ISR – A five-step guide to maintaining NATO’s comparative military edge over the coming decade

By Transatlantic Security Initiative

The Atlantic Council presents a five step guide to maintaining NATO’s comparative military edge over the coming decade.

Defense Policy Defense Technologies

Introduction

The context of European security and defense has drastically changed since Russia invaded Ukraine on February 24, 2022. The war has upended conventional wisdom on Russia’s willingness to use violence, exposed the destructiveness of modern weapons and barbarity of an undisciplined force, and revealed Russian hubris and the limits of Russian power.

On the flip side, the war has strengthened the bond between NATO and the European Union (EU). NATO and EU leaders have taken an unprecedented level of coordinated decisions and actions to impose costs on Russia, defend Europe from further aggression, and support Ukraine in its battle for survival and independence. Alliance and EU leaders have also begun to seriously address other challenges affecting security, such as energy, climate change, and China.

Russia’s war has highlighted the power of united action while exposing the limits of Alliance adaptation to date and identifying vulnerabilities and shortfalls that allies and EU member states must address to ensure their security and defense.

More than ever, the speed of understanding, decision-making, and action are important in modern warfare. Russia has demonstrated on multiple occasions over the past fifteen years that it is capable of rapid decision-making, assembly, and maneuver that has arguably challenged NATO’s ability to respond at the speed of relevance. Georgia in 2008, Ukraine in 2014, annual strategic exercises, and frequent combat readiness tests are all examples.

NATO has improved intelligence sharing and its defense posture since 2014, the year Russia annexed the Crimean Peninsula from Ukraine and began its support to separatists in the Donbas. These improvements have enabled a cohesive and coherent NATO response to the Russian military buildup in 2021 and subsequent invasion of Ukraine in 2022. Whether NATO can effectively identify, prepare for, and defend against Russian aggression toward an ally anywhere in Europe without significant additional posture adjustments is in question.1

NATO command and control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) structures, capabilities, and processes enable effective political and military awareness, decision-making, and action.2 These capabilities encompass an array of land, air, maritime, cyber, and space systems, platforms, and applications that can be owned and operated by all thirty allies (which may soon be thirty-two with Finland and Sweden joining the Alliance),3 by a group of allies (e.g., multinational formations), or by single nations contributing to NATO missions, operations, and activities.

The time to act is now. NATO allies currently enjoy unprecedented cohesion, share an agreed and clear vision for the future, and are motivated by a common sense of urgency, all imbued by the ongoing Russian war on Ukraine.

Despite a growth in collective and national capabilities over the past ten years, NATO C4ISR capabilities remain under resourced, vulnerable, and much less effective than required. Supporting concepts, policies, and procedures related to NATO C4ISR need urgent revision. Many are under development. NATO is engaging industry and the broader private sector, but the latter’s role is not yet fully leveraged. In its current state, NATO C4ISR will be severely challenged to guarantee the security and defense of the Alliance against the threats and challenges it expects to face over the coming decade.4

NATO Secretary General Jens Stoltenberg displays the Strategic Concept booklet during his news conference at a NATO summit in Madrid, Spain June 29, 2022. REUTERS/Susana Vera

The time to act is now. NATO allies currently enjoy unprecedented cohesion, share an agreed and clear vision for the future, and are motivated by a common sense of urgency, all imbued by the ongoing Russian war on Ukraine. Defense investment is rising and the foundations of a future C4ISR architecture and its components are in various stages of development or planning.

NATO and national capabilities must be interoperable and more integrated within and across domains to deliver multidomain effects. The Alliance needs a modern and well-defined C4ISR architecture to achieve its ambition of securing and defending the Alliance and its interests. NATO must improve and further enable its C4ISR with common structure, policies, concepts, frameworks, standards, procedures, and connectivity. NATO must also modernize and integrate current capabilities and acquire new capabilities. Allies need to further increase sharing of data and intelligence, interoperability, and national contributions (forces, platforms, systems, people, and resources) to strengthen NATO C4ISR.

NATO C4ISR policy recommendations

To maintain a comparative advantage against potential adversaries and challengers, NATO allies must 1) share more data and intelligence; 2) transform digitally; 3) implement new concepts, policies, and plans to clarify C4ISR requirements; 4) modernize, augment, and acquire capabilities to meet new C4ISR requirements; and 5) continue to invest in C4ISR interoperability, readiness, resilience, innovation, and adaptation.

Threats and challenges shaping NATO C4ISR

Russia’s war against Ukraine is a major inflection point for NATO, which is in the midst of a long-term effort to improve its deterrence and defense. NATO’s response to Russian aggression has been to assure and defend allies, deter Russia, and support Ukraine. This response has included a surge in the employment of NATO-owned C4ISR forces such as the NATO Alliance Ground Surveillance Force (NAGSF);5 still at Initial Operational Capability and the NATO Airborne Early Warning and Control Force (NAEW&CF).6 National joint intelligence, surveillance, and reconnaissance (JISR) assets have contributed to Alliance shared awareness. NATO cooperation with the EU has led to a united front in communications and complementary actions by EU and non-EU allies on sanctions against Russia, energy security, and support to Ukraine.

Russia “poses the most significant and direct threat” to NATO,7 but there are other threats and challenges that the Alliance must also face or prepare for. Other threats identified by NATO include terrorism in all its forms, missiles from Iran, and cyber and hybrid attacks. All of these threats require constant vigilance, early warning, intelligence, rapid response, and defense and security capabilities enabled by NATO C4ISR.

Among the challenges identified by NATO, China and climate change are the most significant, along with regional instability and strategic shocks. China’s policies and its rising economic, financial, diplomatic, informational, and military power pose a multitude of challenges to NATO’s security, interests, and values. NATO C4ISR must enable shared awareness of China’s policies, actions, and growing military and civilian capabilities. NATO C4ISR must be resilient and respond to Chinese cyber and hybrid activities and favorably compete with Chinese technological advancements and norm-setting efforts.

With respect to climate, NATO C4ISR must contribute to awareness and understanding of the security implications of climate change and contribute to the reduction and mitigation of adverse impacts on climate. Similarly, NATO C4ISR must be able to contribute to anticipation and response related to regional instability and strategic shocks. The addition of crisis prevention to the previous core task of crisis management in the 2022 Strategic Concept highlights a NATO ambition to ensure sufficient awareness (only provided by an effective C4ISR architecture) to understand potential challenges in time to proactively shape, attenuate, or mitigate them.

Preparing for and facing the other threats and challenges listed above implies an ability to cooperate with a broad range of partner organizations and nations, including sharing information and intelligence, and an adequate level of interoperability for coordinated responses. Interaction and combined action with partners will both contribute to and set demands on NATO C4ISR.

Lessons from the Russia-Ukraine war for NATO C4ISR and future needs

The ongoing Russian war in Ukraine is providing a treasure trove of lessons for NATO. NATO is still gathering, processing, and internalizing these lessons, but many are already evident. Some are already captured in reports and articles from journalists, academia, industry, and civilian and military leaders. After reviewing open sources and interviewing several NATO civilian and military leaders, I have assembled the following lessons as most relevant to the future development of NATO C4ISR.

Multi-domain operations

NATO C4ISR must be able to support multi-domain operations (MDO) and deliver multi-domain effects. Much work in connectivity, integration, and interoperability is needed.

The Russian war on Ukraine is the first of its scale in Europe in the twenty-first century. No other recent conflict in Europe—Russia’s war on Georgia in 2008 or Ukraine from 2014 to February 24, 2022—has involved a similar number of military forces or employed such destructive power. Russia and Ukraine have employed or leveraged capabilities in all five domains—air, land, maritime, cyberspace, and space. Russia has struggled with coordinating joint action, let alone achieving multi-domain effects. “Russia has definitely showed us how not to fight,” said Rear Adm. Nicholas Wheeler, director of NATO Headquarters C3 Staff (NHQC3S).8 Ukraine appears to have had more success leveraging multi-domain capabilities. Ukrainian forces have effectively targeted and engaged Russian land and maritime forces using limited multi-source intelligence, aerial drones, maneuver and fires units, and commercial space-based open-source intelligence (OSINT) services from a variety of private companies.

The Russian war in Ukraine is a likely catalyst for NATO leaders to hasten the development of an Alliance MDO Concept. Additionally, NATO’s 2022 Strategic Concept highlights the importance of multi-domain forces and warfighting9 NATO has added cyber and space as operational domains over the past decade and has been working on an MDO concept for some time.10 Allied Command Transformation (ACT) and Allied Command Operations (ACO) delivered an Initial Alliance Concept for MDO in July 2022.11 NATO’s “working definition” of MDO is “the orchestration of military activities, across all domains and environments, synchronized with non-military activities, to enable the Alliance to deliver converging effects at the speed of relevance.”12

According to Headquarters (HQ) Supreme Allied Commander Transformation (SACT) Deputy Chief of Staff (DCOS) for Capability Development Lt. Gen. David Julazadeh, NATO leaders have directed the Strategic Commands to accelerate delivery and implementation of an Alliance MDO Concept.13

Day zero readiness

The scale of Russia’s military buildup and geographically broad and rapid employment of force against Ukraine have caused NATO civilian and military leaders to question whether the Alliance’s current plans and defense posture would have deterred or rapidly repelled a similar Russian assault against an ally, particularly a small nation.14 Could NATO respond with the speed, scale, and coherence needed to prevent initial success?

Day zero readiness

An informal NATO term referring to being mission-ready on the first day of a NATO mission (e.g. a network, a force, a headquarters).

Two ongoing efforts will help. First, a new Supreme Allied Commander Europe’s (SACEUR’s) Area of Responsibility (AOR)-Wide Strategic Plan (SASP) was approved earlier in 2022, but the underlying regional and subordinate strategic plans have yet to be completed and stitched together. Second, a new NATO Force Model approved at the Madrid Summit in June 2022 will address much of the speed, scale, and coherence lacking in current policies and posture by assigning a much larger number of forces (up to four hundred thousand) to regional plans.

Other efforts are in the works. The adapted command and control (C2) structure is not yet fit for purpose and ACO has been directed to conduct a comprehensive C2 assessment. NATO’s Air Command and Control System (ACCS) is woefully behind the times, and a transition plan to a future Air C2 system is in development. According to NATO Assistant Secretary General (ASG) for Operations Tom Goffus: “The NATO Crisis Response System [NCRS] was designed for out of area operations where NATO drives the timeline and has the luxury of time. Now we don’t have that time advantage.”15 The NCRS needs significant revision to enable day zero readiness for collective defense. Goffus is determined to drive such a revision.

The family of plans under development, the new NATO Force Model, and revised C2 structure and NCRS will influence future requirements for NATO C4ISR. NATO must review and update C4ISR requirements for standing defense and baseline activities, as well as exercise and enable rapid activation and deployment related to a short to no-notice collective defense scenario. 

NATO Intelligence Enterprise (NIE)

The NATO Intelligence Enterprise (NIE) surged, adapted, and delivered the intelligence political and senior military leaders needed to respond to the Russian war in Ukraine.16 This is good news. The decisions post-2014 to establish the NATO HQ Joint Intelligence and Security Division (JISD), increase JISR capabilities, and improve NATO’s indicators and warnings (I&W) system have all been validated. The capabilities and processes were not always ideal, but holistically the NIE enabled cohesion, collective decision-making, an effective military response, and effective communications for aggression against a partner nation. The bad news is these outcomes are related to, but not sufficient for, defense against a peer adversary.

NIE’s ability to function and deliver in a collective defense, multi-domain, and high-intensity combat situation requires further improvements in the C4ISR architecture. 

NATO-owned C4ISR capabilities like the Alliance Ground Surveillance17 (AGS) and Airborne Early Warning and Control System18 (AWACS) have proven their value in the current conflict in Ukraine, yet operations have exposed limitations in readiness, types of sensors, quantity of platforms, and connectivity.19 NATO ASG for Intelligence and Security David Cattler highlighted the positive: “NATO and nations contributed with data, platforms, and intelligence. The US shared and declassified intelligence in an unprecedented way and even small nations responded and contributed to specific requirements. Strategic and operational intelligence provided to allies was well coordinated between JISD and ACO.”20 That said, personalities drove much of the success in overcoming standing C4ISR issues in terms of sharing, declassification, coordination procedures between NATO HQ and ACO, and related budgetary issues.21

NATO’s Alliance Ground Surveillance (AGS) RQ-4D ”Phoenix” remotely piloted aircraft. Photo by NATO.

Persistence and survivability

One clear lesson from the Russian invasion of Ukraine, said former ACO DCOS Strategic Employment Maj. Gen. Philip Stewart, “is the need for persistent surveillance.”22 Persistent surveillance is fundamental for effective NATO deterrence and defense and crisis prevention and management because it provides military and political leaders the near-real-time awareness of threat I&W that enable timely decision-making and action. The ability to see and communicate the Russian buildup, invasion, and military action at the operational and tactical levels enabled shared awareness, decision-making, and response. The allies had the luxury of time in the case of Ukraine.

To ensure an effective response against a highly capable peer adversary, NATO needs persistent surveillance, which requires new structures, policies, processes, and capabilities. Persistent surveillance will likely demand a combination of assets from multiple domains. According to NATO ASG for Defense Investment (DI) Camille Grand, “The ability to use and fuse different tools will be critical to achieve persistent surveillance.”23 Both Russian and Ukrainian combatants have employed a vast array of drones, from high and medium-altitude long-endurance platforms to small and very small systems, with an array of capabilities for a variety of missions (including intelligence, surveillance, and reconnaissance, or ISR, and target acquisition). Increases in dedicated NATO and national capabilities from space, high, medium, and low altitude are needed to respond to strategic and operational intelligence requirements in a collective defense scenario.

One clear lesson from the Russian invasion of Ukraine is the need for persistent surveillance.

Former ACO DCOS Strategic Employment Maj. Gen. Philip Stewart

“The Alliance needs robust, in-depth, and survivable JISR platforms in the future,” Cattler said.24 Survivability of NATO C4ISR in modern warfare against a peer adversary is a critical requirement. NATO-owned AGS RQ-4s and AWACS E3As have limited survivability in a contested environment. NATO and national tactical communications are vulnerable to adversary electronic warfare (EW) capabilities. Future solutions may come from a combination of greater sensor range, stealth characteristics, electronic countermeasures, other performance characteristics, or next generation communications systems. Survivability of non-deployable and deployable NATO C2 is another aspect highlighted by the destructive effect of missiles employed in the Russia-Ukraine war. Passive measures like dispersion, displacement, alternate locations, concealment, and degraded operational procedures are all being reviewed or planned. Active measures like air and missile defense planning and deployment to protect NATO C2, not so much. That said, NATO has increased its air and missile defense posture along its eastern flank in the form of short deployments of air and land assets under NATO’s Air Shielding mission.25

Space-based intelligence (as well as other space-based services like communications, early warning, tracking, and guidance) offers a partial answer to the need for both persistent surveillance and survivability, as space-based capabilities are expected to expand rapidly in the coming years.26 National, military, and commercial space-based intelligence (imagery, communications, and electronic signatures) has the potential to contribute greatly to persistent surveillance. NATO will be more and more interested in protection, durability, and survivability of space-based assets, which must be addressed by nations and industry. Redundancy in space-based sensors and assets and the decreasing cost of replacement and remote maintenance may offset some of the need for survivability.

Multidisciplinary intelligence and fusion

Imagery intelligence (IMINT), signals intelligence (SIGINT),27 and OSINT played a key role in unmasking Russian intent and disinformation from the national to tactical level, as well as in targeting. Allies, NATO, Ukraine, and Russia have all exploited space-based data and information (imagery, signals, signatures) for intelligence analysis and production. Ukraine has combined commercially available space-based data and crowdsourced information (technically both part of OSINT) to effectively identify and engage key Russian targets (e.g., leadership, C2 and logistic nodes, and major platforms), refute Russian official narratives, and identify war crimes and war criminals.

There is a need for improvements in NATO’s multidisciplinary intelligence capabilities and ability to collect, fuse, and process such intelligence. The Alliance has powerful all-weather sensors in its NATO-owned AGS (Synthetic Aperture Radar, Ground Movement Target Indicator), but no electrical-optical (EO), infrared (IR), full-motion video (FMV), or SIGINT capabilities.28 The latter capabilities are key for collective defense and a broad range of other crisis and security operations. NATO SIGINT (provided through national contributions) has contributed to strategic shared awareness and decision-making but is still too compartmentalized and often overclassified to be fused and used meaningfully at the operational and tactical levels. NATO has no NATO-owned SIGINT sensors or platforms, and its EW capabilities are a long-standing shortfall at the tactical level.

Two initiatives underway can partially address NATO’s need for SIGINT and OSINT. First, the Alliance Persistent Space Surveillance29 (APSS) initiative set up in April 2022 and formally launched in February 2023 is a key step toward enabling NATO’s collection of national contributions and commercial contracting of space-based data, products, and services.30 Second, the NATO Public Diplomacy Division’s (PDD) Information Environment Assessment (IEA) project (supported by JISD and ACT) is prototyping an artificial intelligence (AI) tool to help NATO professionals sort and analyze vast amounts of print, media, and online information.31 The APSS and IEA initiatives deserve expansion and acceleration in delivery to meet NATO’s current and future C4ISR needs.

Tasking, Collection, Processing, Exploitation, and Dissemination (TCPED)

TCPED is the information management process that NATO and other military or government organizations use to synchronize intelligence and operational efforts to acquire and deliver intelligence in response to specific requirements.32 An effective and responsive TCPED process is fundamental to NATO’s ability to deliver timely and relevant intelligence in response to strategic political and operational military demands. The NIE’s response to the Russia-Ukraine crisis as well as observations of the combatants in the war have highlighted the need for vastly improved capacity for TCPED.

NATO’s TCPED process is operating at a level below its potential and short of strategic and operational need. Speed and efficiency of the TCPED process are already challenged by current levels of structure, data, assets, and analysts. According to NAEW&C Force Commander Maj. Gen. Tom Kunkel, “NATO leaves so much data on the cutting floor.”33 Matters would only be worse if NATO were fully engaged in a modern conflict attempting to execute MDO.

AI and machine learning (ML) tools, along with improved data management and connectivity, could offer relatively cheap solutions (as opposed to major equipment programs) to vastly improve the speed, efficiency, and effectiveness of the NATO TCPED process (from the strategic to tactical levels).

You can’t cyber your way across a river.

Gen. Patrick Sanders, Chief of Britain’s General Staff

Cyber

The role of cyber in the Russia-Ukraine war has been surprising. Pre-invasion, leaders and analysts generally expected the Ukrainian government and military to succumb to the crippling effects of Russia’s “overwhelming” cyber capabilities. That has not happened.

According to Cattler, open sources reveal that Russia deployed destructive cyber malware against Ukrainian government and military C2, rendered systems inoperable, and sabotaged an Internet provider that both Ukrainian police and military depend on. All of this was evidence of “good cyber reconnaissance ahead of time by Russia,” he said.34 However, he added, Russian cyber operations were “not coordinated with conventional ops” nor exploited.35 The reasons are likely a mix of restraint on the part of Russia; a limited ability of Russia to coordinate cyber and other domain effects; the competence of Ukrainian military, government, and private citizens in restoring and protecting systems and services; and significant assistance to Ukraine from powerful private companies like SpaceX and Microsoft (see more on this later).

Locked Shields, cyber defence exercise organized by NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Tallinn, Estonia April 10, 2019. REUTERS/Ints Kalnins

There are also limits to cyber effects. Chief of Britain’s General Staff, Gen. Patrick Sanders, said: “You can’t cyber your way across a river.”36 But you might be able to stop a river crossing (see more on this later). While cyber-related lessons from Russia’s war on Ukraine have yet to be comprehensively gathered, Cattler said: “Allies have recognized that cyberspace is contested at all times and cyber defense underpins the broader deterrence and defense posture.”37 Cyberspace is an enabler of C4ISR and an operational domain for cyber operations, activities, and effects related to C4ISR. Cyber represents great potential and opportunities as well as risk and vulnerabilities. NATO must build cyber resilience in its C4ISR architecture and capabilities, leverage private sector expertise and services, and incorporate voluntary national contributions of cyber ISR.

The role of private industry

Private industry has played an outsized role in enabling the Ukrainian response to the Russian aggression, and providing security, resilience, communications, and intelligence to Ukraine and allies alike—all key elements and enablers of C4ISR. SpaceX’s decision to provide thousands of Starlink terminals to enable satellite communications and Internet services for Ukrainian private and public users has been a game changer.38 Microsoft’s support to Ukraine and other countries under Russian cyberattack has enabled understanding of the threat, capabilities to secure data and networks and enable resilience, and provided a comprehensive strategy for response.39 According to NATO ASG for Emerging Security Challenges David van Weel, Microsoft’s talent, expertise, and tools are critical for NATO cyber defense and data management.40

Private companies like Maxar, BlackSky, and Planet (imagery) and HawkEye 360 (signals) are providing AI-enabled space-based services to Ukraine and NATO allies.41 Commercial data, information, and services provided to Ukraine and the allies have been used to confirm Russian military locations and actions (including atrocities and war crimes) and refute disinformation. According to Van Weel, one commercial AI tool is being prototyped by the NATO Intelligence Fusion Center42 (NIFC) to save hours of costly analyst time spent counting aircraft from massive amounts of collected imagery. This tool has enabled near-real-time analysis of Russian air assets and battle damage as well as cueing of changes to existing status.43

NATO Communications and Information Agency (NCIA) General Manager Ludwig Decamps offered that “perhaps we need to add industry as another domain of operations.”44 Noting that NATO already depends on industry for critical services and innovative responses to military need, Decamps added: “How do we include in our planning to account for industry’s expertise, inherent responsibilities, and potential contributions?”45 NATO engagement with industry includes a robust relationship through the NATO Industrial Advisory Group (NIAG),46 which includes national industry delegations from all allies, and recently launched NATO initiatives like Defense Innovation Accelerator for the North Atlantic (DIANA)47 and the NATO Innovation Fund.48

There have been several NATO initiatives and policy efforts over the past five years to increase engagement with parts of the private sector that produce some of the most advanced and innovative technologies. Developed for commercial use, these technologies could also respond to defense requirements.

Until recently, many start-ups and small and medium-sized enterprises (SMEs) rarely engaged with NATO for a variety of reasons, including lack of visibility of NATO needs, lack of experience in NATO procurement processes, concerns over the capital investment needed to compete, and a general view that NATO focused on large, complex systems that were the bailiwick of major primes or consortiums of traditional defense industry.49

Local residents use a Starlink terminal, amid Russia’s attack on Ukraine, in Chasiv Yar, Donetsk region, Ukraine January 31, 2023. REUTERS/Oleksandr Ratushniak

NATO-Industry Forums (NIFs),50 multinational cooperation in capability development,51 internal NATO HQ trials,52 ACT innovation initiatives,53 NCIA industry key events,54 and NATO policy efforts to address emerging and disruptive technologies (EDTs)55 are all examples of NATO engaging nontraditional industry partners to leverage their creative and innovation potential. Among this broad list of efforts, multinational cooperation in capability development has provided the most concrete, albeit still limited, results. DIANA, specifically, will focus on engaging and leveraging start-ups and SMEs, which until recently (prior to 2019) had been under-represented or less represented in NATO engagements with industry.56

The importance of these initiatives in engaging the private sector and leveraging its technology, innovation, and expertise, including that of promising start-ups and SMEs, to develop creative solutions to NATO military problems at pace has only grown due to the ongoing war in Ukraine.

Digitalization, connectivity, and Big Data

Interrelated to many of the previous lessons identified are the importance of digitalization of information (including signals, print, and electronic media), connectivity (efficient, secure, robust, and resilient networks), common data frameworks (standard protocols and interfaces), and data management tools to enable data sharing and Big Data exploitation. More comprehensive intelligence analysis (as well as research in general) has long been hampered by several limitations: the number of documents or signals available in digital form, disconnected private and public data silos containing exploitable information, the lack of common protocols and interfaces to access and share data, and the lack of data management tools in general. While data management and cloud services have become the norm in the private sector, the public defense sector has been wary and slow to adopt. But necessity is the mother of invention and Ukraine is a particularly relevant proving ground.

A prominent example of digitally enabled C4ISR that has been used to rapidly target and destroy Russian forces is the Ukrainian-developed and British-enabled GIS Arta application.57 Described as “Uber-style technology” providing situational awareness and rapid targeting, the system is fed by “real-time battlefield data from reconnaissance drones, rangefinders, smartphones, GPS [global positioning system] and NATO-donated radars.”58 The system then identifies targets and “rapidly selects artillery, mortar, missile or combat drone units that are within range.”59 Rapid calculation of firing options and alerting of firing units has cut the (Ukrainian) military’s targeting time from twenty minutes to one.60

A prominent example of digitally enabled C4ISR that has been used to rapidly target and destroy Russian forces is the Ukrainian-developed and British-enabled GIS Arta application.

Microsoft’s ability to connect, secure, and exploit data globally is another example of effective Big Data management and exploitation. While digitalization is proceeding, NATO connectivity currently falls short of requirements to effectively link NATO HQ, commands, forces, other bodies, and nations in peacetime, let alone crisis or conflict. A common data framework is not yet operational, data management tools are rudimentary, and data sharing is far below potential. Former NATO Director General of the International Military Staff (DGIMS) Lt. Gen. Hans-Werner Wiermann advocated for a NATO digital backbone to enable connectivity and a military Internet of Things (IoT) to connect C2, systems, sensors, and shooters. The envisioned military IoT would support applications for all manner of military assessment, planning, coordination, and execution functions.61

As a result of impetus from the Russia-Ukraine war, other NATO efforts, and productive collaboration across NATO HQ and Strategic Commands, Wiermann’s ambition expanded to a more comprehensive Digital Transformation (DT) concept.62 This DT concept would address digitalization, connectivity, data frameworks, and management tools across the NATO Enterprise. According to Julazadeh, “The nascent NATO DT effort is similar to the US Joint All Domain Command and Control (JADC2) effort, but a bit broader as it encompasses transforming people, processes, and technology. DT is recognized as a sine qua non component of NATO MDO.”63 NATO DT will also enable the design of a future NATO C4ISR architecture.

This is not a complete list of lessons relating to C4ISR to be gained from the Russia-Ukraine war, but it provides a good starting point for identifying recommendations for the improvement and further development of NATO C4ISR. Other lessons related to NATO C4ISR, such as the variety of missions autonomous systems can perform, the importance of counter-unmanned aircraft system (C-UAS) capabilities in protecting C4ISR, the importance of EW capabilities, and how to replicate aspects of Ukraine’s whole-of-society response to Russian aggression in a whole-of-enterprise NATO effort to adapt, modernize, and transform, will be included in this report’s final set of recommendations.

Russia-Ukraine war lessons for NATO C4ISR

• Multi-domain operations • Day zero readiness • NIE surged, adapted, and delivered • Persistence and survivability • Multidisciplinary intelligence and fusion • Tasking, Collection, Processing, Exploitation, and Dissemination • Cyber • Role of private industry • Digitalization, connectivity, and Big Data

In summary, NATO and the allies have gained valuable lessons related to C4ISR from the Alliance’s response to Russian aggression and from the employment of C4ISR capabilities by both Russia and Ukraine.

Decisions taken at the Madrid Summit and work underway affecting NATO C4ISR

Russian aggression and other threats and challenges, including from China and climate change, resulted in a historic NATO summit in Madrid in June 2022. A new NATO 2022 Strategic Concept was approved clearly delineating the threats and challenges facing the Alliance, revising NATO’s three core tasks (deterrence and defense, crisis prevention and management, and cooperative security), and laying out key lines of effort for adapting the Alliance politically and militarily for 2030 and beyond.64 Political decisions and ambitions announced in the Summit Declaration and in the Strategic Concept, the most important of which include those related to achieving a strengthened deterrence and defense and an increased focus on innovation and EDTs, will shape the requirements and development of NATO’s C4ISR architecture.

Other political ambitions impacting the trajectory of NATO C4ISR include DT, increased resilience, understanding the security implications of climate change, reducing defense impacts on climate change (e.g., reducing the use of fossil fuels, energy consumption, carbon emissions, toxic waste and contaminants), and increasing the level of NATO common funding.

The following analysis summarizes decisions taken at the Madrid Summit, the expected follow-through on these decisions, and other ongoing adaptation efforts previously decided and impacting NATO C4ISR.

NATO’s 2022 Strategic Concept broadly sets the context for C4ISR architecture and requirements in its description of threats and challenges expected over the coming decade, and the political guidance under NATO’s three revised core tasks.65 The concept refers to decisions taken at and prior to the Madrid Summit and has critical implications for the enablement, development, and employment of NATO C4ISR..

Multi-domain warfighting

NATO’s 2022 Strategic Concept sets an ambition for multi-domain warfighting and multi-domain forces.66 NATO has taken an initial step toward this end by adopting a working definition for MDO (as previously noted).67 To achieve NATO’s level of ambition with respect to multi-domain warfighting several more steps are required, such as an approved Alliance MDO Concept, revised Allied Joint Doctrine, improved awareness of threats and opportunities in all domains, upgrades and improvements in capabilities, and secure use of and access to cyberspace and space capabilities. Multi-domain warfighting also requires trained and educated leaders and professionals, trained and exercised forces in MDO, a data-centric approach, and, above all, a cultural shift and new mindset.68

The level of effort will be demanding, but the expected outcome is worth the effort: greater shared understanding, collaboration, and synchronization of capabilities and activities across domains to achieve multi-domain effects. MDO concept development and implementation will be enabled by ACT’s Warfare Development Agenda, DT, and NATO initiatives related to innovation and EDTs. According to Julazadeh, HQ SACT DCOS for Capability Development, NATO leaders are pressing for accelerated delivery of an Alliance MDO Concept by 2023.69 Given the breadth and complexity of MDO and the need for supporting studies this is a stretch goal for NATO’s Strategic Commands, but its approval and implementation will be revolutionary for the Alliance. Future C4ISR architecture and capabilities will have to be designed, optimized, integrated, and interoperable to support multi-domain warfighting and full-spectrum operations at the speed of relevance.

Digital Transformation

As mentioned earlier, DT is intended to address digitalization, connectivity, data frameworks, and data management tools across the NATO Enterprise. DT is intended to enable significant increases in speed, security, and effectiveness in C2, communications, data analysis, intelligence analysis and dissemination, decision-making, operations, and interoperability. Proceeding along this journey will make NATO more agile, resilient, and capable of seizing and maintaining the initiative in peacetime and conflict.

Much of the vision under development is not new and many strands have been under development for some time. Former NCIA General Manager Kevin Scheid was a strong advocate of digitally transforming NATO and had initiated an effort known as “NCIA’s digital endeavor” to modernize and improve the security of NATO’s communications and information infrastructure and services.70 Wiermann, the former NATO DGIMS, advocated for development of a NATO digital backbone, which in his view would constitute the new NATO added value to nations in the information age.71

The current effort includes both initiatives and is broader and more ambitious. The effort will address the entire NATO Enterprise and include political approval by nations of a vision in fall 2022 and an implementation plan (ideally with resource assessment) by 2023.72 According to NHQC3S Deputy Director Marco Criscuolo, a three-step concurrent process (modernization, optimization, and transformation) is necessary to address the complexity and uncertainty of a DT journey.73

NATO Digital Transformation Steps

1. Modernization 2. Optimization 3. Transformation

In brief, in step one—modernization—the current main effort includes continuing modernizing existing capabilities and resourcing ongoing programs and projects such as Information Technology Modernization and related network, data, and cybersecurity initiatives. Step two—optimization—includes reviewing and cohering the numerous and currently disconnected capability programs to build synergies, gain efficiencies, and develop better processes, including adopting current off-the-shelf capabilities. Step three—transformation—begins as NATO gains an understanding of the potential of related technologies and tools, starts to adopt them, then revises structures, processes, and capabilities, and builds in resilience (in cyber, space, and physical infrastructure).74

DT will enable connectivity between data pools and access to and exploitation of data across the NATO Enterprise. NATO Enterprise coherence will be driven by top-down guidance and internalized principles (a whole-of-enterprise approach). DT will rely on a new organizational culture and mindset that is digitally savvy and data centric. It will also rely on greater engagement with industry to leverage its expertise and services, and greater integration and interoperability, the latter supported by the active setting and shaping of standards. DT will also rely on an agility in capability development and resource management (budgetary and human capital) and a modern approach to obsolescence management that do not currently exist.

DT will influence and enable the design of future C4ISR architecture and capabilities and improve the integration, connectivity, ability to manage and exploit Big Data, and the quality and speed of C4ISR processes.

Strengthened deterrence and defense posture

The Alliance’s decision to “strengthen our deterrence and defense posture to deny any potential adversary any possible opportunities for aggression”75 is a major change in strategy and has multiple implications for future NATO C4ISR. In particular, the enhanced NATO posture will increase requirements for persistent surveillance and improved awareness of potential threats, a rapid and more effective intelligence process, a revised and robust C2 structure, and resilient and secure networks.

A strengthened posture will be enabled by a new NATO Force Model,76 which will identify and assign around three hundred thousand allied forces at high readiness (ready to move in less than thirty days) to a family of NATO strategic and regional defense plans for the first time since the Cold War.

C4ISR assets from NATO and national services will be an integral part of the NATO Force Model and support the requirements in the SASP and family of regional and subordinate strategic plans. C4ISR architecture and capabilities must also support a strengthened integrated air and missile defense (IAMD) through improved ISR for shared awareness, early warning, and tracking, and improved air and surface-based C2 systems. Persistent surveillance is needed to support the Alliance’s I&W requirements. There will certainly be shortfalls in available assets and interoperability.

Strengthened IAMD is an important and new commitment associated with the 2022 Strategic Concept; it is a must to respond to the broad range of Russian air and missile capabilities, which can threaten allied populations, forces, and infrastructure from any direction given their ranges and mobility. Strengthened IAMD should include greater day zero connectivity and integration of existing IAMD-related C2 nodes, sensors, and effectors; new and improved IAMD capabilities; and an improved Air C2 system. The Air C2 system is already the focus of a transition effort by allies in conjunction with NCIA and ACO that seeks to address numerous shortfalls in the existing system while concurrently planning for the upgrades and development of an Air C2 system that can meet future needs. This transition effort should be accelerated. In particular, a strengthened IAMD should prioritize the ability to detect and defeat the broad range of tactical ballistic and cruise missiles in the current and future Russian inventory. This includes closing the low-altitude surveillance gap to detect and track cruise missiles across SACEUR’s AOR.

Ongoing planning, force generation, and future exercises will identify C4ISR shortfalls and refine future C4ISR requirements to meet the demands of an improved NATO posture, including persistent surveillance and strengthened IAMD.

New NATO Force Model

Robust, resilient, and integrated command structure and enhanced C2 arrangements

NATO leaders recognize that the strengthened deterrence and defense posture they envision must be enabled by an improved Alliance C2 structure, parts of which do not yet exist. ACO’s C2 structure currently includes one strategic headquarters (Supreme Headquarters Allied Powers Europe; SHAPE), three joint force commands (JFCs) (Brunssum, Naples, and Norfolk), three service component commands (Air, Maritime, and Land Commands), a theater logistics command (Joint Support and Enabling Command), and several operational commands (e.g., Striking Forces NATO, the NATO Airborne Early Warning and Control Force, and NATO Alliance Ground Surveillance Force).

The existing structure was designed for maximum flexibility and options to respond to multiple crises of different scale and operational requirements, primarily outside SACEUR’s AOR. It was not optimized for collective defense. The JFCs do not have regional geographic boundaries or AORs. Maritime and Land Commands are neither manned nor trained for C2 of large-scale or AOR-wide operations. Staffs at strategic and operational levels lack critical expertise in key warfighting competencies (e.g., targeting, cyber defense and response, and space support).

Current ACO C2 structure and supporting command, control, communications, and computers (C4) systems (i.e., the current Air Command Control System, Federated Mission Network, Land tactical C2) are not yet fit for modern multi-domain warfare against a peer adversary. Viable Joint, Land, and Maritime C2 structures for an AOR-wide defense accommodating two new allies in the north (Finland and Sweden) will be priorities to establish. According to International Military Staff (IMS) Director of Plans and Capabilities Maj. Gen. Karl Ford, “SHAPE is working on a C2 assessment which will identify the drivers of change, review current capabilities and shortfalls, and propose design principles for future NATO C2.”77

The assessment will look at C2 in three time horizons in order to capture short, medium, and long-term NATO adaptation needs. First, NATO C2 here and now and how to achieve the Concept for the Deterrence and Defense of the Euro-Atlantic Area (DDA) with the current NATO Command Structure and thirty allies. This stage aims to respond to current NATO needs, within the current membership format. Second, decision-makers are exploring NATO C2 needs for a potential thirty-two-nation Alliance, which would operate based on an MDO Concept and with a DT plan in place. This stage represents a much-expanded level of ambition, with NATO C2 over a contiguous northern region able to coordinate and execute cross-domain effects increasingly enabled by DT. Finally, the third stage will include SACT’s vision of NATO C2 out to 2040 carrying out MDO and tailored to future challenges and threats that are expected to be increasingly persistent, boundless, and simultaneous from multiple state and non-state actors as well as from changes in the physical and social environment.78 The third time horizon will be informed and enabled by the NATO Warfighting Capstone Concept (NWCC) and Warfare Development Agenda to get there.79

The NATO Force Structure must also be reviewed. This includes assessing requirements, overlaps, and gaps, in some cases rationalized (numbers of tactical headquarters), in some cases reinforced (creating sufficient manpower and expertise for MDO and peer combat), aligned with plans, and integrated with the NATO Command Structure (i.e., ACO and JFCs). The 2022 Strategic Concept’s increased emphasis on resilience will require increased understanding and intelligence sharing of cyber and other related threats to civilian infrastructure. It will also require sustained investment to meet resilience targets (notably to improve cybersecurity and defense for NATO networks, national communications, transportation, health systems, and financial networks).

DT and increased cyber resilience will need to account for an enhanced NATO Command Structure integrated with a rationalized NATO Force Structure and connected to national forces associated with the new NATO Force Model and NATO plans.

Global awareness

Enhanced shared, situational, and global awareness are all referenced in the 2022 Strategic Concept.80 The first, enhanced shared awareness, implies improved collective awareness enabled by better intelligence sharing and more effective NATO C4ISR to enable timely and relevant intelligence for political and military leaders. The second, situational awareness, likewise implies timely and relevant intelligence and the addition of persistent surveillance of threat indicators that can rapidly evolve and thus require rapid response. The third, global awareness, refers to the need to monitor and analyze data and intelligence related to global factors such as climate change, pandemics, and strategic shocks emanating from abroad that could affect the Alliance. Global awareness also applies to China and Russia and their related activities and influence across the globe that impact Alliance security, interests, and values.

NATO’s revised core tasks include deterrence by denial and crisis prevention. China and climate change are now characterized as long-term challenges. The revised tasks and long-term challenges will lead to new or revised strategic and operational intelligence requirements. Revised intelligence requirements will justify and generate a need for persistent, multidisciplinary, data-enabled, multi-domain NATO JISR and higher-quality and faster analysis to enable shared awareness, decision-making, and action at the speed of relevance (speed is more of a requirement for crisis and conflict than for long-term challenges).

Intelligence to enable awareness for crisis prevention and addressing long-term challenges will need to integrate inputs from a variety of national, regional, and organizational partners, and commercial providers (e.g., space industry, media, and data; computing; and network service and security providers). For example, broader NATO understanding of China would be enabled by financial, commercial, and science and technology data and analysis and greater information sharing with Indo-Pacific partners. NATO climate policy will require better analytics to understand and respond to the security implications of climate change and require greater NATO and national efforts to incorporate aspects of climate change mitigation in defense infrastructure and capability development (e.g., greater energy efficiency and use of sustainable energy sources, better monitoring of defense impacts on climate, reduced waste production, reduced carbon emissions, etc.).81

The approval of JISR Vision 2030+ by the North Atlantic Council (NAC) in Spring 2022 will enable enhanced awareness, multi-domain warfighting, and other aspects of the 2022 Strategic Concept. Giorgio Cioni, director of Armament and Aerospace Capabilities in NATO’s Defense Investment Division, said the new JISR vision “includes a series of strategic outcomes, the overall purpose of which are to render JISR architecture more robust.”82

Cioni said the strategic outcomes include: “1) increased investment in collection capabilities, looking beyond existing NATO-owned platforms and payloads (AGS and AWACS), achieving persistent surveillance through a combination of capabilities and services; 2) expanding the APSS initiative to collect and acquire space-based data, products, and services to improve NATO indicators & warnings and strategic anticipation; 3) improving PED [Processing, Exploitation, and Dissemination] with capabilities and tools to ensure timely and efficient analysis; 4) achieving coherence and integration of different programs contributing to the NATO C4ISR network of sensors, C2 nodes and systems, and effectors; 5) review of the JISR TCPED process to ensure it can cope with more data and capabilities (sensors, platforms, AI and ML tools) and support decentralized MDO operations; 6) enhance the human element of ISR, ensuring training and education of leaders, operators, intelligence professionals involved in ISR or end users of its output.”83

NATO’s level of ambition for global awareness will lead to much greater demands to provide persistent, multidisciplinary, data-enabled, and multi-domain NATO JISR. It will also instigate higher-quality and faster analysis which the new JISR Vision 2030+ and the existing JISR Capability Development Strategy should help NATO and its member states deliver.

NATO’s Nine Priority Technology Areas

Innovation and EDTs

NATO is currently focused on protecting and fostering adoption of EDTs in “nine priority technology areas:” AI, data, autonomy, quantum-enabled technologies, biotechnology, hypersonic technologies, space, novel materials and manufacturing, and energy and propulsion.84 The 2022 Strategic Concept states NATO’s aims for innovation and EDTs.85

NATO has always focused on innovation as a critical element of maintaining its technological edge. However, since 2018 it has redoubled internal efforts to develop policy and external work to engage industry and the private sector to capture the potential of innovative technologies, concepts, applications, and processes.

Advanced, rapidly developing technologies have captured the attention of NATO leaders and led to a series of policies and plans related to EDTs. At the 2021 Brussels Summit, for example, NATO leaders agreed to stand up DIANA and a NATO Innovation Fund.86

According to Van Weel, NATO ASG for Emerging Security Challenges, the Alliance is learning how to promote innovation tailored to its needs. “We can create [a location and context to meet and discuss a particular topic], communicate what we want to achieve, and leverage civilian and commercial expertise,” he said.87 Van Weel also explained that for DIANA, “nations will collectively agree on strategic guidance developed from end users.” The strategic guidance will include a set of prioritized defense needs developed by NATO Military Authorities (who set NATO defense requirements) and informed by the armaments community (consisting of the Conference of National Armaments Directors, or CNAD, and its subordinate structure, which are responsible for supporting capability delivery of NATO defense needs)88 and the Science & Technology Organization (STO), which focuses on horizon scanning of technology developments and enabling collaboration in research and development (R&D).

This strategic guidance for DIANA will subsequently be transformed by the DIANA executive into challenge programs for the private sector. These challenge programs will articulate prioritized defense problems that will be shared with industry to seek potential solutions, much like how national security challenges are used by the US Defense Advanced Research Projects Agency to guide US government investment in private sector technology. NATO engagements to date have demonstrated that two-way communications with high-tech enterprises are more than just an opportunity for NATO to communicate needs.89 This dialogue also exposes business opportunities that commercial enterprise may not know exist. “Many private sector companies don’t know they can help in the defense and security field,” said Van Weel.90

DIANA and the NATO Innovation Fund are being designed specifically to enable delivery of solutions versus simply to promote R&D. “DIANA will not just provide access to dual-use commercial solutions, but it will help mature them,” said Van Weel. “Start-ups need founders, venture capital, business coaching, networking, and solution iteration between end users and industry. DIANA will make sure there is a connection with defense primes. The end of program is to showcase to all allies what solutions have been identified to respond to the agreed problems. Go to the Conference of National Armaments Directors, etc. And the NATO Innovation Fund can come in and put equity into a start-up company to help it scale up.”91

NATO efforts to promote innovation and investment in EDTs will also help allies retain interoperability.92 Interoperability by design is to be baked into capability development supported by DIANA and the NATO Innovation Fund. National efforts in R&D are less likely to be so inspired. Market competition and differing levels of available funding and technology across the Alliance will continue to create gaps in compatibility and interoperability. Without increased commitment by allies to ensure NATO interoperability as a requirement in the development of advanced technology, gaps will persist or increase.

Most of the nine priority technology areas that NATO EDT efforts are focused on will enable improvements in NATO C4ISR and consequently improve the speed and effectiveness of NATO intelligence, decision-making, and operational processes. Here are key points for four priority technology areas most relevant to NATO C4ISR:

Expansion of AI and ML use cases and rapid adoption and scaling up of promising solutions will be critical for achieving NATO’s ambition for C4ISR.

AI, ML, and Big Data services and tools have already been identified for their potential to enable future NATO C4ISR.1 A few AI and ML use cases as described earlier are already underway (e.g., IEA’s tool and NIFC’s aircraft counting tool). These use cases are trials or proofs of principle to demonstrate that technology can improve speed and quality of output and provide new capabilities that respond to unmet needs.

Autonomy promises cost-effective solutions across multiple domains which can increase endurance, reach, survivability, and performance of C4ISR in contested environments while reducing risk to operators.

Autonomy is a field of rapid development for NATO and involves land, maritime, and aerial systems.2 It is significantly enabled by AI, ML, and Big Data services and tools. The NAGSF and future Alliance Future Surveillance and Control (AFSC) 3 are likely to be a subset of future aerial autonomous capabilities available to the Alliance. Land and maritime unmanned systems also promise great potential in delivering C4ISR capabilities. The NATO Maritime Unmanned Systems Initiative is a multinational effort and a splendid example of what collaboration between public and private sector approaches can achieve in terms of vision, capability development, and experimentation.4 NATO’s Project X (testing use cases for unmanned aircraft systems, or UAS, enabled by AI) is another excellent example of private-public collaboration and innovation.5 Finally, countering adversary UAS capabilities is crucial for battlefield success as has been demonstrated in conflicts from the Middle East to Ukraine. C-UAS capabilities are a growing field of NATO collaboration with the private sector. NATO is testing C-UAS interoperability standards with both military and commercial capabilities. 6

Quantum technology in computers, communications, and sensors promises revolutionary changes for NATO C4ISR. 7

Quantum computers will provide vastly improved processing speeds and capacity to enable data processing and exploitation to include decryption of current methods of secure communications. Quantum communications will enable improved security and unbreakable encryption. Quantum sensors will provide multispectral abilities to locate and identify objects previously undiscoverable due to cover and concealment, including objects in buildings or underground and submarines under water. Of these three applications of quantum technology, NATO has already begun R&D projects and tests related to quantum communications. 8

Exponential increases in space-based capabilities over the coming decade will impact C4ISR requirements and resilience and enable C4ISR architecture and capabilities.

Space-related technology is included in EDTs, but managed under a distinct NATO Space Policy, which recognizes the role of national contributions from space-faring nations, but also unique NATO space support requirements (i.e., communications, intelligence, early warning, targeting, positioning, navigation, and timing). 9 NATO has had its own satellite communications capability for years, but in 2020 a group of allies contracted NCIA to expand its transmission capacity and improve the capabilities of NATO ground stations. 10 More recently, NATO has established a Space Center at ACO’s Air Command (AIRCOM) in Germany, 11 a Space Situational Awareness Capability at NATO HQ, 12 and a Space Center of Excellence in France.13

Defense investment

NATO’s 2022 Strategic Concept mentions the importance of fulfilling the 2014 Defense Investment Pledge,93 which was created to ensure adequate investment in defense in support of an ambitious NATO Readiness Action Plan94 agreed at the 2014 Wales Summit.95 The NATO Readiness Action Plan and increased defense investment were meant to adapt NATO politically and militarily in response to Russia’s illegal annexation of Crimea earlier that year and its ongoing aggression against Ukraine. The pledge commits NATO allies to spend 2 percent of their gross domestic product (GDP) on defense by 2024 and to ensure 20 percent of defense spending is allocated for “major new equipment, including research and development.”96

In the 2022 Strategic Concept, allies further commit “to provide the full range of required capabilities,” “ensure that increased national defence expenditures and NATO common funding will be commensurate with the challenges of a more contested security order,” and “increase our investments in emerging and disruptive technologies to retain our interoperability and military edge.”97 These new commitments are the sine qua non foundation for strengthening deterrence and defense and achieving the level of ambition NATO has set for adapting its political and military instruments of power to meet the threats and challenges of the coming decade.

NATO C4ISR structure and NATO-owned capabilities (e.g., AGS, AWACS, AFSC, JISR, Air C2 System, and Federated Mission Network) figure prominently in NATO’s current defense investment programs and projects. Capability targets for national C4ISR are likely to increase in NATO’s next defense planning cycle because of the new strategic environment and a new level of ambition to prepare for “high-intensity, multi-domain warfighting against nuclear-armed peer-competitors.”98 Both NATO-owned and national capabilities will consequentially be the object of future increases in defense spending.

In addition to supporting the costs of NATO’s common military and civilian structure (i.e., manpower, operations, and sustainment), NATO common funding also supports collective defense investment in C4ISR capability development, which is of great political interest and subject to significant collective oversight and governance. Attempts to streamline and accelerate common-funded capability development and oversight have produced limited positive results to date. Low risk tolerance for early or any failure, detailed reporting requirements, and limited options for accelerated procurement are some of the main issues.99 Upgrades of information technology (IT), which rapidly become obsolete, are taken as distinct collective decisions instead of being embedded in upfront requirements. Upgrades and modernization of major capabilities like NATO-owned AGS have been similarly delayed. Hence the need to review how NATO manages obsolescence in the modern age. The private sector provides ample examples of faster capability development and the NIAG has provided tailored advice on how to improve agility in acquisition.100 Allies have not achieved the acceleration and expansion of common-funded capability development they desire, which has frustrated NATO military, civilian staff, and agencies involved. Further change is needed.

The biggest challenges will be in achieving the cultural shift and sustained sense of purpose needed to enable a whole-of-enterprise approach in the face of inevitable resistance to change and competing domestic and global challenges.

The NWCC, approved in 2021, managed by ACT, and supervised by the Allied Chiefs of Defense, should be a major driver of military innovation and investment over the coming decade, specifically concept and capability development.101 While details in open sources are scarce, the NWCC will be managed through a Warfare Development Agenda that includes imperatives (e.g., cognitive superiority, multi-domain command, integrated multi-domain defense) and principles (e.g., right people, data centric technology, day zero integration, persistent disruptive preparation) which are meant to influence national and NATO C4ISR development and delivery decisions.102 The ability to synchronize ACT’s Warfare Development Agenda across NATO and nations and with existing NATO defense planning and capability development processes will be a daunting task. ACT has a direct role in common-funded capability development but has not yet leveraged its authorities and abilities to support national and multinational capability development.

NATO ambition is high for its innovation and EDT adoption efforts, both of which are meant to direct investment into capability development that enables NATO’s military edge. Initial efforts like DIANA, the NATO Innovation Fund, use cases for AI, and ongoing work to develop strategies for individual EDTs are all promising. Engagement with industry and the broader private sector is strong and growing. Similar to DT efforts, success in NATO innovation efforts will rely on an agility in investing in capability development and resource management (budgetary and human capital) that does not exist within NATO’s current structure and processes. DIANA and the NATO Innovation Fund will offer alternative development and resourcing options to include bilateral, multilateral, and multinational programs. Scaling up solutions to provide NATO-wide enterprise capabilities would require common funding and be subject to NATO governance that has been historically resistant to higher risk and decentralized control. To achieve NATO’s level of ambition, the Alliance will need to embrace a whole-of-enterprise effort, ensure sustained commitment and investment, and change the way it currently does business with regard to common-funded capabilities.

Decisions taken at the Madrid Summit and work underway affecting NATO C4ISR

• Multi-domain warfighting • Digital Transformation • Strengthened deterrence and defense posture • Robust, resilient, and integrated command structure and enhanced C2 arrangements • Global awareness • Innovation and EDTs • Defense investment

Deductions from the Madrid Summit and other recent developments include the following. NATO’s 2022 Strategic Concept and recent policy decisions, including the political commitment to increase defense investment, have set the context for future NATO C4ISR. The foundation for future NATO C4ISR is being built through existing programs and initiatives, supporting concepts, assessments, and plans under development. The devil will be in the implementation of decisions taken and others still to be taken. The biggest challenges will be in achieving the cultural shift and sustained sense of purpose needed to enable a whole-of-enterprise approach in the face of inevitable resistance to change and competing domestic and global challenges.

The importance of investing in NATO C4ISR innovation. Photo by NCI Agency

Recommendations: Share, transform, implement, modernize and invest

Efforts are already underway to improve NATO C4ISR and more will follow as decisions taken at the Madrid Summit are implemented. Lessons and security implications from the Russia-Ukraine war for NATO C4ISR will and must be a priority for directing efforts and investment in C4ISR improvements, modernization, and future capability development. Due to its importance to effective Alliance security and defense, NATO C4ISR deserves special focus and effort to improve its multiple components (i.e., organizations, capabilities, networks, concepts, policies, processes, and people). NATO must change in several areas to maintain its technological and military edge and increase the likelihood of achieving the security and defense it deserves. The following recommendations build on positive momentum, leverage new concepts and initiatives, and offer suggestions for improvement, including adopting new efforts and approaches.

NATO C4ISR Policy Recommendations

To maintain a comparative advantage against potential adversaries and challengers, NATO and allies must 1) share more data and intelligence; 2) transform digitally; 3) implement new concepts, policies, and plans to clarify C4ISR requirements; 4) modernize, augment, and acquire capabilities to meet new C4ISR requirements; and 5) continue to invest in NATO C4ISR interoperability, readiness, resilience, innovation, and adaptation.

1. Share more data and intelligence

Sharing data and intelligence is first and foremost a matter of political will, as NATO relies on voluntary information sharing by its allies. Sharing requires trust in NATO, specifically that the Alliance can protect information shared. Sharing will always be a delicate subject, as not all nations trust NATO or one another to protect their shared data and intelligence in the face of aggressive espionage, cyber incidents, mishandling, and leaks. NATO and its member states collect vast amounts of data and intelligence that are not exploited for the benefit of collective security and defense or other Alliance aims.
Trust is enabled by modern and secure networks, a common data framework and standards respected by all, and an efficient and effective NIE, all of which act as guarantees that the information can be protected and effectively exploited by the Alliance. Much of this is in place, but two key elements require attention: political will (greater emphasis) and security (continued emphasis).

The NAC must commit politically to addressing obstacles and shortfalls in sharing. Shared data or shared intelligence do not appear in the 2022 Strategic Concept or Madrid Summit Declaration. Their absence may reflect a view of adequacy in current levels of sharing or discomfort in addressing the many national policy and technical issues that affect trust in NATO’s ability to protect data and intelligence.103 Technical issues also inhibit interoperability, which must be addressed through greater emphasis on common standards (see sections 4 and 5 below). Shared data, information, and intelligence are fuel for C4ISR. Sharing is not at the level it can and needs to be to ensure NATO maintains its comparative military advantage.104

Security, including cybersecurity, remains an issue. But cybersecurity, document security, and communications security are improving with policy emphasis, cyber adaptation efforts, improved security measures, and with improved supporting tools being put in place or planned for the future.

Officers analyze data coming in from the field at the trial control room during Unified Vision, NATO’s main event for Joint Intelligence, Surveillance and Reconnaissance. Photo by NATO.

A golden opportunity lies in the ability of NATO and its member states to tap into the potential of shared data and intelligence to exponentially improve the quality and speed of shared awareness, decision-making, and action. The opportunity cost of not sharing is enormous. For example, restricted sharing of intelligence on Russian violations of the Intermediate-Range Nuclear Forces (INF) Treaty complicated NATO consensus from 2014 to 2018 on US findings that the Russian 9M729 (or SSC-8) missile constituted a violation of the treaty.105 Earlier sharing of sensitive intelligence could have significantly accelerated common positions on Russian nuclear-capable missiles, leading to earlier decisions on mitigation and pressure on Russia to comply. By contrast, the early decision by the United States and other NATO allies to share sensitive intelligence on Russian intentions vis-à-vis Ukraine in early 2022 led to greater and timely shared awareness, clarity in communications, and timely consensus on decisions taken to assure and defend allies and deter Russia.106 Here are basic, but critical, recommendations for NATO:

  • Implement the NATO Data Exploitation Framework Policy (DEFP) agreed by Alliance defense ministers in October 2021. While details on the DEFP are not widely known, it is fundamental to establishing a common data framework across the NATO Enterprise to enable Big Data sharing, exchange, and exploitation. NATO Military Authorities (NMAs) have begun the implementation process, but it will require a whole-of-enterprise approach, with commitment from the nations, NATO HQ, and common funding. NCIA expertise and support will be critical. NATO should leverage the NIAG and look to industry for expertise and enabling services, such as cloud computing and Big Data management.
  • Task the NIE in conjunction with NMAs to assess and recommend critical improvements needed to enhance intelligence-sharing procedures and tools, specifically:
    • Mutually supporting strategic and operational intelligence management procedures for warfighting and crises,
    • Intelligence functional services fit for MDO, and
    • AI tools to assist in real-time exploitation of shared intelligence (including sorting, cueing, and other automated functions).
  • Set realistic and measurable objectives to share more data with metadata, information, and intelligence, both military and commercial, related to threats and challenges.

2. Transform digitally

DT is a nascent effort that is fundamental for strengthening security and defense and improving resilience. DT is a key enabler of MDO. In turn, effective MDO depend on multi-domain C4ISR. Multi-domain C4ISR is critical for delivering multi-domain effects through multi-domain awareness, decision-making, and action. Enabling multi-domain C4ISR should, therefore, be a particular focus of DT.

A DT vision was developed in fall 2022 and an implementation plan is expected in 2023.107 The 2021 DEFP is a fundamental first step in the process. The DT vision and implementation plan constitute policy that will have to be followed by investment in infrastructure, capabilities, people, supporting policies, and governance processes. Standards in data exchange and connectivity will be particularly important for networks, weapons systems, platforms, equipment, and software. The US Department of Defense’s C4ISR/Electronic Warfare Modular Open Suite of Standards (CMOSS) provides a national example of an open standard approach that could be used to develop a similar NATO open standard approach allowing various national and commercial entities to design and develop interoperable capabilities.108

NATO DT must be comprehensive in its objectives and enterprise wide in its application to achieve what NATO needs for shared awareness, decision-making, and action at the speed of relevance for multi-domain warfighting as well as for effective crisis prevention and management.109 NATO is politically committed to transform digitally, and policy development is in progress. As the NATO consultation, command, and control (C3) staff and board are central to DT policy development, implementation of DT into current and future C3 capability efforts is almost a given. A similar sense of urgency and focus will be needed across the NATO Enterprise. Given current positive momentum, NATO should:

  • Ensure funding matches political ambition for and military (and Enterprise) requirements inherent to DT.
  • Ensure requirements for enabling multi-domain C4ISR are captured, resourced, and addressed as a priority.
  • Seek and leverage private sector expertise and capabilities. Large and small industries offer expertise and capabilities (services) related to DT.
  • Look long to enable transition to technologies and applications in NATO’s near-term horizon (i.e., the next six years), such as 6G networks and space-based capabilities and services.
  • Ensure a whole-of-enterprise approach to link DT policy development and implementation, including:
    • Active collaboration between relevant NATO governance bodies (e.g., those covering C3, cyber defense, security, armaments, standards, budgeting and resourcing, IAMD policy, defense planning) and the Military Committee, and
    • Collaboration within and among key staff management bodies (e.g., those responsible for communications, information and data management, cybersecurity, JISR, and innovation), including Strategic Commands, agencies, and perhaps Centers of Excellence where relevant.
  • Ensure the political focus and funding support to the NATO C3 community to achieve and accelerate the delivery of critical C3 capabilities such as Federated Mission Network and Information Technology Modernization, and a standing operational net for current operations and activities (day zero readiness).
  • Ensure implementation of DT is integrated into related ongoing lines of effort beyond C3, i.e., cyber defense adaptation, standards development, common-funded capability development, multinational capability development cooperation, and complex armaments programs (e.g., Air C2, AWACS, and AFSC).
  • Adapt existing service contracts and capability development plans, programs, and projects to include DT implementation guidance and standards.
  • Develop and implement a human capital development and management policy focused on hiring the right talent, and training and educating NATO civilian and military workforce and leaders to enable DT. Seek and leverage private sector expertise.

3. Implement new concepts, policies, and plans to clarify requirements for NATO C4ISR

NMAs determine C4ISR requirements through the NATO defense planning process (NDPP), and the NAC and allies decide how to meet those requirements through collective, multinational, and national capabilities. NATO’s C3 community plays a key role in determining the technical aspects of interoperable and secure C2, communications, and computers for NATO’s military and broader NATO Enterprise. With this as context, several efforts underway over the next year or the longer term will directly influence future NATO C4ISR requirements. The Alliance should leverage these efforts to clarify requirements and ensure coherence in the next NDPP cycle and future capability development and delivery to develop the future C4ISR architecture NATO needs.

First, the new NATO Force Model and alignment of forces with NATO’s new family of plans (SASP and regional and subordinate strategic plans) will identify C4ISR force and capability requirements. This effort is underway and will likely conclude at the June 2023 defense ministers’ meeting.110 These requirements could include new or revised NATO C4ISR structure. If force generation shortfalls reflect shortfalls in national inventories, then C4ISR capability requirements should increase.

Second, an Alliance MDO Concept will help define what NATO C4ISR must deliver to outthink and outpace potential adversaries and how NATO C4ISR will contribute to achieving multi-domain effects. The final Alliance MDO Concept is under development by the Strategic Commands and allies expect it to be delivered in 2023. Likewise, a DT implementation plan is expected in the first half of 2023.111 DT is a fundamental condition for MDO and will set standards for digitalization, connectivity, and data exchange and exploitation that will affect current and future NATO C4ISR.

Third, NATO leaders have tasked ACO to produce a C2 Assessment to enable allied ministers to consider new requirements from NMAs and defense policy proposals (from relevant committees) by Spring 2023.112 Adjustments to the NATO Command Structure over several time horizons will impact C4ISR requirements, specifically to enable effective AOR-wide C2 and multi-domain warfighting. The NATO Force Structure, which is composed of allied national and multinational forces and HQs, should also be part of proposals for change to execute SASP and support the new NATO Force Model. Additional or new C4ISR structure should be considered as well. The timing of the ministers’ decision in 2023 is fortuitous and will allow endorsed C4ISR-related requirements to be captured in the next NDPP cycle, specifically in the Minimum Capability Requirements (MCR) that NMAs will produce for NAC approval in 2024.

NATO’s Joint Intelligence, Surveillance, and Reconnaissance (JISR) Concept. Source: NATO

Fourth, over a longer term, the JISR component of NATO C4ISR is driven by several agreed documents and programs. Strategic outcomes of NATO’s JISR Vision 2030+, discussed earlier along with the JISR Capability Development Strategy, and JISR community stakeholder decisions will drive enhancements in JISR capabilities, including existing JISR programs and initiatives (e.g., AGS, APSS). JISR Vision 2030+ strategic outcomes will address NATO TCPED (structure, tools, and processes), human capital supporting JISR architecture, and overall coherence in JISR architecture.113

There is another effort not yet on NATO’s task list that merits attention. A clarifying definition for NATO C4ISR does not exist (as a whole versus in its subcomponents of C2, C3, or C4, and JISR). NATO Architecture Framework Version 4 provides guidance for developing, designing, and managing enterprise architectures.114 According to Paul Savereux, director of Defense Planning in NATO’s Defense Policy and Planning Division, NATO C4ISR capabilities are addressed in multiple planning domains of the NDPP but are neither aggregated nor treated as part of a single function.115

Achieving the full potential of NATO C4ISR and ensuring it is fit for multi-domain warfighting requires coherence in defense planning, capability, and concept development supported by a recognized and defined NATO C4ISR architecture. A defined C4ISR architecture would harmonize defense planning efforts across multiple domains, enable aggregation and assessment of related capability targets, and ensure greater coherence in concept and capability development. A common definition would assist in the development of common standards for the various components that comprise or enable C4ISR (including interfaces and data-sharing protocols).116 A common definition would also enable engagement with the private sector. Here are some recommendations for NATO to capitalize on current efforts and improve their collective outcomes relative to C4ISR. NATO should:

  • Define NATO C4ISR architecture to provide a shared understanding of what makes up NATO C4ISR in terms of capabilities (forces, systems, platforms, networks, applications) and enabling policies, concepts, standards, and processes.
    • Author’s proposed definition: NATO C4ISR architecture is the whole of structures, organizations, systems, platforms, networks, applications, policies, concepts, and processes connecting decision-makers, operators, intelligence professionals, and capabilities in support of NATO shared awareness, decision-making, and execution in a multi-domain environment.
  • Include goals or objectives and operating principles for each of the key NATO-owned components of NATO C4ISR architecture that leverages existing elements and addresses gaps. This would allow for a methodical approach to determining effectiveness and progress over time of both components of NATO C4ISR and C4ISR architecture as a whole.
  • Ensure C4ISR requirements are rigorously collected from efforts to strengthen deterrence and defense through the NATO Force Model aligned with the SASP and family of plans, to conduct MDO, to digitally transform NATO, and to enhance C2.
  • Improvement of the TCPED process (a strategic outcome of JISR Vision 2030+) should be an early focus of DT and EDT efforts (e.g., related to AI, data, autonomy, and space) to enable speed and multidisciplinary intelligence fusion, and improvements in processing capacity and quality demanded for multi-domain warfighting.
  • Leverage existing NATO C4ISR forces and build upon their potential. Consider adjustments to NATO C4ISR forces (NAEW&CF and NAGSF) to enhance their effectiveness and contributions in support of the SASP and force generation related to the NATO Force Model.
    • The NAEW&CF has two subordinate component commands, one of which (the British national component) is currently phasing out its E3Ds for higher performance E7s. The NAEW&CF could potentially command other nationally contributed C4ISR platforms or new NATO C4ISR forces. Similarly, the NAGSF has the potential to command additional JISR assets and platforms.
    • NATO should review NAEW&CF and NAGSF manpower and operational requirements, and funding levels for operations and sustainment to support a higher level of baseline activities and missions in view of the new political ambition for strengthened deterrence and defense.
    • NATO should ensure C4ISR coherence throughout the defense planning process.
    • C4ISR elements contained in Political Guidance 2023 should be mapped and consolidated for future reference, e.g., through the delivery of MCR in 2024.
    • C4ISR-related MCR should be the subject of multi-domain wargaming based on the SASP, the NATO Force Model, ACO C2 adjustments, and known NATO capability program milestones.
    • NATO should ensure a method to aggregate and track C4ISR-related capability targets apportioned in 2025.
    • Revised procedures for capturing C4ISR requirements will also enable biennial assessments of progress in achieving C4ISR-related targets.

4. Modernize, augment, and acquire capabilities to meet new C4ISR requirements

This category of recommendations is the most extensive and associated with practical delivery of what the Alliance needs to maintain its technological edge and comparative military advantage over the coming decade. The following recommendations are grouped by central themes.

(A) The first step must be ensuring coherence in concept and capability development. Such coherence does not yet exist. A recognized definition for NATO C4ISR architecture will help, but other steps must be taken to ensure 1) a whole-of-enterprise approach, 2) synergy between political and military efforts, and 3) greater agility and effectiveness in concept and capability development.

  • NATO must take a holistic approach to C4ISR concept and capability development. Cross-committee efforts related to C4ISR policy and capability development need a forcing function, including top-down guidance with clear responsibilities for lead, but also NATO Enterprise contribution to ensure coherence and synergy. NATO committee and military efforts supporting concept and capability development must be better connected and integrated.
  • Implementation of ACT’s Warfare Development Agenda should incorporate a coherent approach to C4ISR concept and capability development, enabled by a defined NATO C4ISR architecture.
  • The approach intended for DT (modernize, optimize, transform concurrently) is practical and inherently agile and offers an example of how C4ISR capabilities can be planned and developed in concurrent phases.

(B) According to NATO Deputy ASG for Defense Investment Robert Weaver, on October 2021 the CNAD agreed a NATO armaments policy on Achieving and Accelerating Capability Development and Delivery (A2CD2).117 Speed, agility, and effectiveness are at the heart of this policy, which aims to identify opportunities for accelerated delivery, pursue approaches with highest potential payoffs, and deliver results. Greater collaboration between the CNAD, Science & Technology Board, and Strategic Commands is the primary enabler of the policy’s aims. The policy includes ideas for increased multinational cooperation, leveraging testing and experimentation within NATO exercises to enable warfighter interaction with the private sector, wargaming and tabletop exercising of capability solutions, and improved collaboration in concept development.118

A soldier sits inside a Boeing AWACS reconnaissance plane. Photo by Johanna Geron via REUTERS.

ACT and ACO need to change how they currently support capability development to enable A2CD2 policy implementation. ACT currently focuses primarily on common-funded capability development and experimentation and lower technology readiness levels, which limits support to other approaches to capability development (i.e., national and multinational). ACO owns control, design, and funding of training and exercises, which offer the venue and opportunity for critical testing and experimentation of maturing technologies. However, ACO has ceded responsibility for operational testing and experimentation to ACT along with capability integration.

  • NATO leaders should encourage NMAs to take a broader role in supporting national and multinational capability development through operational experimentation efforts. NATO should ensure both authority and funding to do so.
  • NATO leaders should align appropriate responsibilities and focus within the Strategic Commands concerning operational testing and experimentation. Testing and experimentation opportunities are critical for enabling warfighter interaction with industry. They lead to industry refinements necessary for effective capability delivery. They also lead to warfighter awareness of new technology and applications and follow-on action to develop the concepts, plans, and procedures for effective integration. ACO Maritime Command’s collaboration with ACT, nations, and private industry in preparation for exercise Dynamic Messenger in September 2022 is a good example of operational testing and experimentation that deserves replication and institutionalization.119
  • NATO leaders should expand and ensure dedicated funding for biannual Unified Vision trials (long-standing ACO interoperability tests and experimentation supported by ACT, nations, and the JISR community) to include testing and experimentation of mature promising C4ISR capabilities and enablers.

(C) Modernize, augment, and build on existing C4ISR force structure. NATO’s AFSC program’s innovative approach of partnering closely with industry to replace AWACS by 2035 with C4ISR capabilities that are fit for the future offers an excellent example of innovation in action.

At the Madrid Summit, NATO leaders expressed their commitment to support the AFSC program into design and delivery and procure an advanced C4ISR platform in time for crew training to replace NATO E3As as they start to phase out in the early 2030s. “The fast-track approach will deliver an initial element of the AFSC capability in coherence with the agreed AFSC concept and with the subsequent stages of delivery of the selected technical solution,” said Cioni, director of Armament and Aerospace Capabilities in NATO’s Defense Investment Division.120 The selected technical solution is yet to be determined and may consist of crewed and/or unmanned systems or a network of systems. Follow-through with political commitment and funding over the life of the AFSC program will be critical.

NAEW&CF and NAGSF have the potential to deliver more and to satisfy new requirements related to strengthened deterrence and defense. With respect to the NAGSF, NATO needs more platforms and sensor capabilities (such as IMINT/FMV/EO/IR and SIGINT) to enable effective support to its core tasks.

  • NATO should integrate national contributions on a permanent or rotational basis into the NAEW&CF and NAGSF based on NATO Force Model force generation to meet C4ISR requirements within NATO plans.
  • NATO should authorize and provide the funds for NAEW&CF and NAGSF commanders to leverage AI, ML, and Big Data management and exploitation tools. Such adoption must be in line with DT principles but will exploit the vast opportunities for improving image or signals recognition and classification, database management, maintenance, and planning for NAEW&CF and NAGSF. Such tools could also enable a sense and avoid capability for AGS.
  • NATO should upgrade, augment, resource, and fully exploit the NAGSF. The NAGSF has been effective and responsive but is still at Initial Operational Capability. NATO and nations should:
    • Fund and accelerate infrastructure. Provide the required manpower to achieve Full Operational Capability.
    • Fully leverage the analyst and operator training provided by the NAGSF.
    • Fully leverage the NAGSF’s PED potential through full manning and rotation of national analysts as members or augmentees. Experience in the NAGSF provides an opportunity for national analysts to gain expertise for national employment and contribute to NATO intelligence requirements.121
    • Fund the validated critical modernizations and upgrades required for current operations (especially Link 16, a standardized communications system used by the US military and its NATO allies, and secure communications accreditation).
    • Plan now and fund the acquisition of sensors (IMINT and SIGINT) to upgrade AGS platforms and fill gaps in collection capability.
    • Plan early to replace AGS RQ-4s at the end of their operational life span.
  • Fully fund AFSC development, including the fast-track approach, to ensure seamless delivery of the advanced C4ISR capabilities NATO needs for multi-domain warfighting beyond 2030.

(D) APSS needs political commitment and funding and deserves expansion. NATO-owned JISR platforms provide IMINT and measurement and signature intelligence (MASINT).122 NATO exploits significant amounts of OSINT to include commercial satellite imagery. The APSS initiative will significantly enhance the ability to receive national and commercial space-based information (imagery, signals, electronic signatures). NATO relies on nations for a greater breadth of IMINT as well as SIGINT, human intelligence (HUMINT), and cyber intelligence (multi-source). Multi-discipline intelligence fusion is critical for confidence in the analysis that enables shared awareness, consensus decision-making, and action. Additional IMINT and SIGINT capabilities (NATO-owned or contributed by nations) are needed now and offer promising prospects for improving NATO C4ISR. NATO should:

  • Expand its APSS initiative to include all allies. In support of APSS, NATO should:
    • Encourage national contributions and funding to meet strategic and operational intelligence requirements.
    • Limit bureaucracy by keeping governance simple and lean, ideally supported by existing committee structure.
    • Enable the NIE to fully exploit the multiple intelligence disciplines that space-based assets offer.
    • Consider including national and commercial high-altitude platforms (balloons, airships, aircraft that operate in the stratosphere) that can contribute to persistent surveillance.
    • Ensure space data collection, exchange, and exploitation requirements are part of DT.
    • Ensure the space expertise required to exploit space-based C4ISR capabilities is established within the Strategic Commands (ACO and ACT).
  • Integrate IMINT and SIGINT capabilities into NATO C4ISR (multiple options—additional sensor payloads for existing platforms, national contributions augmenting existing forces, and new platforms with IMINT and SIGINT sensor payloads).
  • Develop and implement policy to normalize and integrate SIGINT (military and commercial) for operational and tactical use across NATO Command and Force Structures.

(E) Integration of NATO air and missile defense requires additional efforts to close gaps in sensors, Air C2, Ground C2, and Tactical Data Links (TDLs) between sensors, weapons, and C2 platforms. NATO IAMD requires a special focus due to its critical role in protection of NATO C2, forces, and populations. NATO IAMD relies on C4ISR capabilities to ensure operational sensing, decision-making, and action. The ground-based air defense (GBAD) C2 multinational cooperation project supported by the CNAD promises focused solutions to integrating disparate allied GBAD C2 systems at the brigade and battalion level.123

A similar effort is needed to integrate Surface-Based Air and Missile Defense (SBAMD includes land and maritime systems) for area defense of NATO critical assets. NATO TDL standards are particularly important for NATO IAMD, yet not completely implemented by nations.124 Select air and missile defense platforms (i.e., fifth-generation aircraft) are becoming more advanced and capable of serving simultaneously as sensors, C2 nodes, and effectors. Yet these advanced platforms cannot seamlessly share tactical data. NATO and national investment in TDL software and hardware is critical. Additional R&D is required for data sharing between fifth-generation aircraft. NATO should:

  • Connect existing ground radars and field additional surface or space-based sensors required across the Alliance to close the radar sensor gap for low-flying threats (below 5,000 feet).
  • Develop a NATO program for the network of sensors and C2 nodes needed to ensure shared early warning, tracking, and engagement of hypersonic threats.
  • Accelerate transition to a future Air C2 system fit for multi-domain warfighting and future threat and friendly capabilities.
  • Focus innovation and capability development efforts on integrating sensors, C2, and effectors at the higher tactical (above brigade) level and AOR wide.
    • NATO needs political commitment and national action to ensure its TDL standards are implemented in national and NATO platforms.
    • Nations must follow through with integration of Link 16 capability in appropriate land, maritime, and aerial platforms.
    • NATO needs to prioritize Link 16 capability for the NAGSF in its modernization and upgrade efforts.
    • Nations must follow through with integration of Link 22 in maritime systems to replace Link 11, ensure Link 16 compatibility, and improve overall interoperability.
    • The United States needs to accelerate development of an interoperable TDL network between its fifth-generation aircraft and compatible with NATO TDLs.125

(F) EW capabilities are central to modern warfare and a principal focus of peer adversaries due to their potential for asymmetric response to Alliance comparative advantages (i.e., high-performance C4ISR platforms, precision-guided missiles). EW capabilities support intelligence collection and targeting, disrupt or destroy C4ISR, and require specialized C2 for effective employment. EW offensive capabilities can be relatively low-cost and range from radars to jammers to direct energy weapons to missiles guided by electromagnetic (EM) seekers.

Protection from adversary offensive EW capabilities is critical for NATO C4ISR. NATO operational and tactical communication networks must be secure, survivable, and resilient in a contested environment. Low probability of intercept, low probability of detection, directional communications, and autonomous functions can support improved security, survivability, and resilience.126 Self-organizing networks should be the aim with autonomous functions supported by AI and next generation network capabilities (i.e., 5G, 6G) and may require new waveforms enabled by new radio and antenna systems.127

The NATO EW community is active in promoting policy, doctrine, and capability development, but has not gained the political attention and commitment needed to ensure development of NATO EW capabilities to the level needed for modern warfare.128 NATO’s Joint Airpower Competence Center (JAPCC) has developed several recommendations for NATO action related to EW that could enhance NATO C4ISR effectiveness.129 Building on JAPCC’s recommendations NATO should:

  • Establish a Strategic EW Operations Center to enable NATO C2 of and employment guidance for nationally contributed EW capabilities and assets and assist in doctrine and concept development and training.
  • Ensure modern warfare EW capability needs are prioritized in NATO defense planning. Specifically include a focused section in Political Guidance 2023 and ensure the development of appropriate MCR in 2024 (leveraging modern warfare lessons and ambitious wargaming).
  • Promote national and multinational capability development and delivery of prioritized EW capabilities that improve security, survivability, and resilience of C4ISR, including through NATO innovation initiatives.
  • Integrate EM operations in the Alliance MDO Concept and clarify policy and doctrine on how the electromagnetic spectrum (EMS) fits into existing operational domains. (For example, should the EMS be merged into a single cyberspace-EMS domain?)
  • Develop a culture of EM signature awareness among all forces (especially land forces) and integrate EM signature monitoring, control, and mitigation into all (including C4ISR) new systems and capabilities.

(G) NATO recognizes the importance of investing in and promoting innovation and adoption of EDTs to retain its “technological and military edge.”130 The DIANA and NATO Innovation Fund initiatives as explained earlier provide great promise in developing the “innovation ecosystem” and collaboration with private sector that is needed to identify, promote, and deliver solutions to NATO’s operational and business challenges.131 DIANA will focus on leveraging innovation and creative solutions from start-ups and SMEs, but will include the NIAG throughout its processes to ensure wider industry awareness and preparation of defense and aerospace primes for scaling up promising solutions when necessary.

Complementary efforts are needed in three areas to leverage the potential that innovation and EDTs offer. First, clarification of the role of NATO’s military in innovation could empower NMAs to focus on improving the quality and substance of their collective contributions, including NATO Enterprise-wide collaboration. Second, greater agility in common-funded capability development and resourcing is needed to modernize how NATO acquires C4ISR capabilities and services. Third, NCIA as a customer-funded agency should be leveraged by allies to provide greater support to national and multinational capabilities and services related to C4ISR.132 NATO should:

  • Formalize and improve contributions from NATO’s military to innovation.133 Elements of which follow:
    • NWCC includes future capability considerations that should be refined over time through dialogue with the Armaments Community and STO.
    • The Warfare Development Agenda is meant to drive concept development and influence capability development but must be aligned with the NDPP.
    • Military requirements can be better informed by engagement with industry, the Armaments Community, and the Science & Technology Board.
    • Promotion of innovation challenges to military problem sets should be developed through greater involvement with the NATO Enterprise.
    • Military advice and input into the strategic guidance for DIANA are critical for leveraging DIANA’s potential to address military problems and challenges.
    • Support for testing and experimentation (including warfighter-industry interaction) of maturing technology and applications in NATO training and exercises needs greater focus.
    • Concept development is not yet at pace to leverage maturing technology and applications to enable integration and effective employment.
  • Adopt agile capability development and resourcing principles for common-funded C4ISR capabilities and services.
    • Revise how IT components of capabilities are addressed in requirements and acquisition to account ahead of time for cybersecurity, obsolescence replacement, upgrades, and modernization.
    • Reduce complexity in requirements drafting and committee oversight but enforce schedules.
    • Adopt modular approaches to design to enable interchangeability and interoperability among capabilities.
    • Adopt advanced technology that is mature, available, and corresponds to need rapidly.
    • Allow for an approach that includes early prototype testing and experimentation, small-scale purchases, building on success, and scaling up.
    • Allow for the appropriate risk tolerance for failure and revision.
    • Fully leverage NCIA’s potential support to national and multinational capability development and services related to C4ISR. Recent contracts for satellite communications, Strategic Space Situational Awareness System, and APSS are great examples of NCIA’s ability to leverage funding from single allies and groups of allies to provide capabilities and services that benefit the entire Alliance.
NATO Command Structure. Source: NATO

5. Continue to invest in NATO C4ISR interoperability, readiness, resilience, innovation, and adaptation

NATO’s value added to allies are its abilities to collectively decide and act, organize, and integrate. NATO provides the structural and digital backbone for nations to plug into, and develops common doctrine, concepts, procedures, and capabilities to enable interoperability and effective collective action. NATO nations have already increased defense spending by the equivalent of $350 billion since making their Defense Investment Pledge in 2014.134 More billions of dollars are planned to be spent by 2024 and beyond as additional allies meet or exceed their defense spending goal of 2 percent of their GDP. As of June 30, 2022, eight allies exceed the 2 percent goal.135 A total of nineteen allies have plans to do so by 2024 and five more plan to meet the goal shortly after 2024.136

NATO-owned C4ISR forces (e.g., NAEW&CF and NAGSF) and capabilities ensure a guaranteed minimum level of shared data and intelligence that is rapidly employable to enable political and military shared awareness. NATO-owned assets have proven their value time and again in crisis and partially compensate for the lack of standing national C4ISR contributions. The C4 elements of NATO-owned C4ISR assets provide secure and interoperable C2 and secure computer and communications networks for political consultation and NATO military operations and activities (strategic to tactical).

NATO-owned C4ISR forces and capabilities are NATO’s added value to the Alliance, providing the interoperable structure and digital backbone into which national contributions plug for collective awareness, decision-making, and action. Investment in NATO-owned C4ISR forces and capabilities can only enhance the Alliance’s capability to observe, orient, decide, and act.

NATO C4ISR will reap the benefits of known and expected increases in defense spending. While the bulk of allied defense spending will go to national defense requirements, spending on increased readiness of national C4ISR forces (personnel, training, equipment, sustainment, and infrastructure), enhanced resilience (especially communications networks and transportation), and delivery of capabilities corresponding to allied C4ISR capability targets will all contribute to the potential of NATO C4ISR.

As this report has highlighted, there are several areas where national defense spending and common funding are needed to ensure NATO C4ISR is fit for modern warfare and the threats and challenges identified in NATO’s 2022 Strategic Concept. The following recommendations are an elaboration of key investment recommendations previously mentioned. Allies should:

  • Invest in NATO interoperability and integration.
    • Accelerate development of C4ISR-related equipment and connectivity standards to ensure nations’ disparate C4ISR systems and platforms (all types—C2, communications, computers, and ISR) can talk to each other and share real-time data and intelligence. This effort must address interoperability between national and proprietary cryptographic equipment and software.
    • Ensure adequate NATO staff support to nations in standards development.
    • Implement a NATO assessment mechanism to confirm the adoption of NATO standards by national and NATO C4ISR forces.
    • Review and act on the implications of NATO military assessments of C4ISR interoperability.
    • Leverage and support the potential of NATO’s JISR interoperability trials (United Vision) to test, experiment, and validate C4ISR systems.
    • Adopt dual-use standards whenever possible to accelerate delivery of interoperable C4ISR capabilities or enablers.
  • Invest in NATO C4ISR force readiness and resilience. Review manpower and resilience (cybersecurity, communications, and infrastructure) requirements of the NAEW&CF and NAGSF for MDO.
    • Invest in NATO C4ISR innovation and adaptation commensurate with NATO C4ISR’s prominent role in shared awareness, decision-making, and action.
    • Include C4ISR challenges in the strategic guidance developed by nations for DIANA and the NATO Innovation Fund.
    • Invest in human capital development and management of leaders, operators, and intelligence professionals involved in or supporting NATO C4ISR.
  • Invest in NATO C4ISR adaptation (and modernization) to meet the needs of the Alliance now and out to 2030 and beyond.
    • Ensure funding for DT requirements that will enable and enhance NATO C4ISR.
    • Plan for and invest in the modernization and future replacement of NAGSF platforms and systems.
    • Ensure funding of NATO commitments to AFSC and a fast-track approach for an advanced platform replacement for AWACS aircraft.

Conclusion

NATO C4ISR capabilities have improved over the past decade but are not projected to meet future Alliance needs. Vulnerabilities and shortfalls persist, which are aggravated by a demanding security environment and an elevated level of NATO ambition agreed at the Madrid Summit. In particular, Russian aggression and other threats and challenges, including from terrorism, China, and climate change, raise requirements for speed and quality in NATO shared awareness, decision-making, and action. The latter are all enabled by NATO C4ISR.

The NATO 2022 Strategic Concept and recent policy decisions will set the context for future NATO C4ISR requirements. Future NATO defense planning and capability development of NATO C4ISR must respond to changing requirements and address critical issues. NATO has a unique window of opportunity over the next few years to leverage a newfound sense of cohesion and urgency among allies along with an agreed vision. Implementing recent NATO decisions, leveraging increases in defense investment, and exploiting proven or promising technologies present multiple opportunities to develop and deliver the C4ISR capabilities NATO forces need.

Five key efforts will maximize NATO’s ability to maintain its comparative military advantage over the coming decade: improving data and intelligence sharing, transforming digitally, clarifying C4ISR architecture and requirements, modernizing or acquiring C4ISR capabilities and enablers, and continuing to invest in the ingredients of NATO’s success for the past seven decades (i.e., interoperability, readiness, resilience, innovation, and adaptation).

Glossary

A2CD2

ACCS

ACO

ACT

AFSC

AGS

AI

AIRCOM

AOR

APSS

ASG

AWACS

C2

C3

C4

C4ISR


CMOSS

CNAD

COMINT

C-UAS

DCOS

DDA

DEFP

DGIMS

DI

DIANA

DT

EDTs

ELINT

EM

EMS

EO

EU

EW

FMV

GBAD

GDP

GPS

HQ

HUMINT

I&W

IAMD

IEA

IMINT

IMS

INF Treaty

IoT

IR

ISR

IT

JADC2

JAPCC

JFC

JIS

JISD

JISR

MASINT

MCR

MDO

ML

NAC

NAEW&CF

NAGSF

NATO

NCIA

NCRS

NDPP

NHQC3S

NIAG

NIE

NIF

NIFC

NMAs

NSPA

NWCC

OSINT

PDD

PED

R&D

SACEUR

SACT

SASP

SBAMD

SHAPE

SIGINT

SMEs

STO

TCPED

TDL

UAS

Achieving and Accelerating Capability Development and Delivery

Air Command and Control System

Allied Command Operations

Allied Command Transformation

Alliance Future Surveillance and Control

Alliance Ground Surveillance

artificial intelligence

Air Command

Area of Responsibility

Alliance Persistent Space Surveillance

assistant secretary general

airborne early warning and control system

command and control

consultation, command, and control

command, control, communications, and computers

command and control, communications, computers, intelligence, surveillance, and reconnaissance

C4ISR/Electronic Warfare Modular Open Suite of Standards

Conference of National Armaments Directors

communications intelligence

counter-unmanned aircraft system

Deputy Chief of Staff

Defense and Deterrence of the Euro-Atlantic Area

Data Exploitation Framework Policy

Director General of the International Military Staff

Defense Investment

Defense Innovation Accelerator for the North Atlantic

Digital Transformation

emerging and disruptive technologies

electronic intelligence

electromagnetic

electromagnetic spectrum

electrical-optical

European Union

electronic warfare

full-motion video

ground-based air defense

gross domestic product

global positioning system

headquarters

human intelligence

indicators and warnings

integrated air and missile defense

Information Environment Assessment

imagery intelligence

International Military Staff

Intermediate-Range Nuclear Forces Treaty

Internet of Things

infrared

intelligence, surveillance, and reconnaissance

information technology

Joint All Domain Command and Control

Joint Airpower Competence Center

joint force command

Joint Intelligence and Security

Joint Intelligence and Security Division

joint intelligence surveillance and reconnaissance

measurement and signature intelligence

Minimum Capability Requirements

multi-domain operations

machine learning

North Atlantic Council

NATO Airborne Early Warning and Control Force

NATO Alliance Ground Surveillance Force

North Atlantic Treaty Organization and Reconnaissance

NATO Communications and Information Agency

NATO Crisis Response System

NATO defense planning process

NATO Headquarters C3 Staff

NATO Industrial Advisory Group

NATO Intelligence Enterprise

NATO-Industry Forum

NATO Intelligence Fusion Center

NATO Military Authorities

NATO Support and Procurement Agency

NATO Warfighting Capstone Concept

open-source intelligence

Public Diplomacy Division

Processing, Exploitation, and Dissemination

Research and development

Supreme Allied Commander Europe

Supreme Allied Commander Transformation

SACEUR’s Area of Responsibility-Wide Strategic Plan

Surface-Based Air and Missile Defense

Supreme Headquarters Allied Powers Europe

signals intelligence

small and medium-sized enterprises

Science & Technology Organization

Tasking, Collection, Processing, Exploitation, and Dissemination

Tactical Data Link

unmanned aircraft system

About the author


Gordon B. “Skip” Davis Jr. is currently a Senior Fellow at the Center for European Policy Analysis. He recently served as NATO’s Deputy Assistant Secretary General for Defense Investment.

Prior to NATO, Skip served 37 years in the U.S. Army retiring as a Major General. Skip’s last military positions were as Director of Operations, U.S. European Command, Commander of Combined Security Transition Command – Afghanistan, and Director of Operations and Intelligence for Allied Command Operations. Skip’s professional life included operational and institutional assignments interspersed with study and practice of international affairs and defense issues, primarily in Europe. Skip participated in operations with U.S., NATO, and UN forces in Europe, Africa, Middle East, and Central Asia. Skip brings practical experience and conceptual understanding of contemporary and emerging defense issues as well as executive-level experience in operations, intelligence, leader development, capability development, and policy development. Skip holds an undergraduate degree in nuclear physics and graduate degrees in international business, defense and military history, and strategic studies.

Mr. Davis and his wife Rita have two daughters, Stefania and Victoria, both of whom completed their undergraduate degrees in Italy. Stefania is a Captain in the U.S. Military Intelligence Corps serving at Fort Bragg, North Carolina, and Victoria is a graduate student completing a MBA in Performing Arts in Paris.

The Transatlantic Security Initiative, in the Scowcroft Center for Strategy and Security, shapes and influences the debate on the greatest security challenges facing the North Atlantic Alliance and its key partners.

1    Scowcroft Center Task Force for Deterrence and Force Posture, Defending Every Inch of NATO Territory: Force Posture Options for Strengthening Deterrence in Europe, Atlantic Council, March 9, 2022, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/us-and-nato-force-posture-options/.
2    For this report, information technology (IT), including services, are included in the categories of “communications” and “computers.” While some countries include cyber as a related capability category (i.e., C5ISR), NATO treats cyber as an operational domain (cyberspace) and an enabling capability for C4ISR.
3    NATO, “NATO Allies Sign Protocols for Accession of Finland and Sweden,” last updated July 5, 2022, https://www.nato.int/cps/en/natohq/news_197763.htm.
4    NATO, NATO 2022 Strategic Concept, June 29, 2022, 3-6, https://www.nato.int/strategic-concept/#StrategicConcept.
5    NATO Air Command, “NATO Alliance Ground Surveillance Force takes over critical infrastructure,” November 28, 2022, https://ac.nato.int/archive/2022/NAGSF_new_infra.
6    NATO Air Command, “NATO Airborne Early Warning and Control,” accessed February 16, 2023, https://ac.nato.int/missions/indications-and-warnings/AWACS.
7    NATO 2022 Strategic, “Strategic Environment,” 4.
8    Rear Adm. Nicholas Wheeler, interview by author, August 16, 2022.
9    NATO 2022 Strategic, 6.
10     Allied Command Transformation (ACT) began talks in June 2021. See Lieutenant Colonel Jose Diaz de Leon, “Understanding Multi-Domain Operations in NATO,” Three Swords Magazine 37 (2021), 92, https://www.jwc.nato.int/application/files/1516/3281/0425/issue37_21.pdf. During the author’s assignment to Allied Command Operations (ACO), from 2013 to 2015, staff officers in the Supreme Headquarters Allied Powers Europe (SHAPE) Plans Directorate developed a draft definition and concept for MDO that was shared with senior SHAPE staff.
11    Allied Command Transformation (ACT), “Multi-Domain Operations: Enabling NATO to Out-Pace and Out-Think Its Adversaries,” July 29, 2022, https://www.act.nato.int/articles/multi-domain-operations-out-pacing-and-out-thinking-nato-adversaries.
12    Ibid.
13    Lt. Gen. David Julazadeh, interview by author, August 2, 2022.
14    The author defines defense posture as the whole of command and control (C2) structures, baseline activities for deterrence and defense, force readiness, responsiveness, reinforcement plans, and capabilities.
15    Tom Goffus, interview by author, July 15, 2022.
16    David Cattler, interview by author, July 13, 2022, and Maj. Gen. Philip Stewart, interview by author, July 11, 2022.
17    NATO, “Alliance Ground Surveillance (AGS),” last updated July 20, 2022, https://www.nato.int/cps/en/natohq/topics_48892.htm.
18    Airforce Technology, “E-3 AWACS (Sentry) Airborne Early Warning and Control System,” June 25, 2020, https://www.airforce-technology.com/projects/e3awacs/.
19    Stewart, interview and Brig. Gen. Houston Cantwell, interview by author, July 8, 2022.
20    Cattler, interview.
21    Ibid. and Stewart, interview.
22    Ibid. and Stewart, interview.
23    Camille Grand, interview by author, August 1, 2022.
24    Cattler, interview.
25    “Video: 5 Things You Should Know about NATO’s Air Shielding Mission,” SHAPE, August 19, 2022, https://shape.nato.int/news-archive/2022/video-5-things-you-should-know-about-natos-air-shielding-mission.
26    Mattia Olivari, “The Space Sector: Current Trends and Future Evolutions,” ISPI, December 11, 2021, https://www.ispionline.it/en/publication/space-sector-current-trends-and-future-evolutions-28602.
27    Signals intelligence (SIGINT) is composed of communications intelligence (COMINT) and electronic intelligence (ELINT).
28    NATO’s E-3A AWACS has a look down surveillance radar that collects measurement and signature intelligence (MASINT), but not COMINT. See Airforce Technology, “E-3 AWACS (Sentry) Airborne Warning and Control System,” June 25, 2020, https://www.airforce-technology.com/projects/e3awacs/.
29    NATO, “Alliance Persistent Surveillance from Space (APSS),” updated February 2023, https://www.nato.int/nato_static_fl2014/assets/pdf/2023/2/pdf/230215-factsheet-apss.pdf.
30    NATO Communications and Information Agency (NCIA) General Manager Ludwig Decamps, interview by author, July 21, 2022, and Director of Armament and Aerospace Capabilities in NATO’s Defense Investment Division Giorgio Cioni, interview by author, August 2, 2022.
31    Author’s personal knowledge from assignment at NATO Headquarters as deputy assistant secretary general (ASG) Defense Investment (DI).
32    NATO uses TCPED in internal documents and communications to refer to the key steps of its intelligence process. The five steps of NATO TCPED are equivalent to what the US Department of Defense describes as the six steps of the “intelligence process”: “planning and direction, collection, processing and exploitation, analysis and production, dissemination and integration, and evaluation and feedback.” See Department of the Army et al., Joint Publication 2-01. Joint and National Intelligence Support to Military Operations, January 5, 2012, GL-10, https://irp.fas.org/doddir/dod/jp2_01.pdf.
33    Maj. Gen. Tom Kunkel, interview by author, August 4, 2022.
34    INSA (Intelligence & National Security Alliance), “Coffee and Conversation with David Cattler,” July 25, 2022, YouTube video, https://www.youtube.com/watch?v=b5mJUtnNI88.
35    Ibid.
36    Daniel Michaels, “Lessons of Russia’s War in Ukraine: You Can’t Hide and Weapons Stockpiles Are Essential,” Wall Street Journal, July 4, 2022, https://www.wsj.com/articles/lessons-of-russias-war-in-ukraine-you-cant-hide-and-weapons-stockpiles-are-essential-11656927182.
37    INSA, “Coffee and Conversation.”
38    Michael Sheetz, “Elon Musk’s SpaceX Sent Thousands of Starlink Satellite Internet Dishes to Ukraine, Company’s President Says,” CNBC, March 22, 2022, https://www.cnbc.com/2022/03/22/elon-musk-spacex-thousands-of-starlink-satellite-dishes-sent-to-ukraine.html.
39    Microsoft, Defending Ukraine: Early Lessons from the Cyber War, June 22, 2022, 4, https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE50KOK.
40    David van Weel, interview by author, August 18, 2022.
41    Tara Copp, “Satellite Firms Are Helping Debunk Russian Claims, Intel Chief Says,” Defense One, April 5, 2022, https://www.defenseone.com/business/2022/04/satellite-firms-helped-debunk-russian-claims-intel-chief-says/364060/.
42    NATO Intelligence Fusion Centre, “NATO Intelligence Fusion Centre,” accessed February 16, 2023, https://web.ifc.bices.org/.
43    Van Weel, interview.
44    Decamps, interview.
45    Ibid.
46    NATO, “NATO Communications and Information Agency,” https://www.ncia.nato.int/.
47    NATO, “NATO approves 2023 strategic direction for new innovation accelerator,” last updated December 21, 2022, https://www.nato.int/cps/en/natohq/news_210393.htm.
48    NATO, Brussels Summit Communiqué, press release, last updated July 1, 2022, https://www.nato.int/cps/en/natohq/news_185000.htm; NATO, “NATO Launches Innovation Fund,” last updated June 30, 2022, https://www.nato.int/cps/en/natohq/news_197494.htm.
49    Author’s notes from NATO-Industry Forums (NIFs) 2018 and 2019 and post-NIF reports co-published by SACT and ASG DI internally after the event and edited by the author.
50    NIFs 2018, 2019, and 2021 specifically focused on innovation, emerging technologies, and inviting start-ups and SMEs. See references to NIFs 2019 and 2021 in NATO, “NATO-Industry Forum,” accessed October 3, 2022, https://www.act.nato.int/industryforum.
51    NATO, “Multinational Capability Cooperation,” last updated November 18, 2022, https://www.nato.int/cps/en/natohq/topics_163289.htm.
52    While assigned to NATO HQ, the author sponsored, enabled, or was aware of several trials leveraging advanced technology in AI and data services to demonstrate private sector capabilities to assist in security or defense-related requirements such as: tracking COVID-19-related factors impacting allies, foreign investment in allied defense industry and critical infrastructure, and tracking and analyzing open-source information related to threats.
53    ACT, “Innovation Hub,” accessed October 2, 2022, https://www.innovationhub-act.org.
54    NATO Communications and Information Agency, “Our Key Events,” accessed October 2, 2002, https://www.ncia.nato.int/business/partnerships/key-events.html.
55    NATO, “NATO Sharpens Technological Edge with Innovation Initiatives,” last updated April 7, 2022, https://www.nato.int/cps/en/natohq/news_194587.htm.
56    Ibid.
57    Charlie Parker, “Uber-Style Technology Helped Ukraine to Destroy Russian Battalion,” Times, May 14, 2022, https://www.thetimes.co.uk/article/uk-assisted-uber-style-technology-helped-ukraine-to-destroy-russian-battalion-5pxnh6m9p.
58    Ibid.
59    Ibid.
60    Ibid.
61    Lt. Gen. Hans-Werner Wiermann, interview by author, July 21, 2022.
62    Grand, interview.
63    John R. Hoehn, “Joint All-Domain Command and Control (JADC2),” Congressional Research Service, updated January 21, 2022, https://sgp.fas.org/crs/natsec/IF11493.pdf; Julazadeh, interview.
64    Atlantic Council Experts, “Our Experts Decipher NATO’s New Strategic Concept,” New Atlanticist, Atlantic Council, June 30, 2022, https://www.atlanticcouncil.org/blogs/new-atlanticist/our-experts-decipher-natos-new-strategic-concept/.
65    NATO 2022 Strategic, 1.
66    NATO 2022 Strategic, 6.
67    “Multi-Domain Operations: Enabling NATO.”
68    Based on the author’s analysis of an unclassified document, not publicly released. Supreme Headquarters Allied Powers Europe (SHAPE) – HQ SACT, “Bi-Strategic Command, Initial Alliance Concept for Multi-Domain Operations,” July 5, 2022.
69    Julazadeh, interview.
70    NATO Communications and Information Agency (NCIA), “Digitally Transforming NATO: Our Work Explained,” March 19, 2019, https://www.ncia.nato.int/about-us/newsroom/digitally-transforming-nato-our-work-explained-.html.
71    Wiermann, interview.
72    Wheeler, interview.
73    Marco Criscuolo, interview by author, August 18, 2022.
74    Wiermann, interview; Criscuolo interview; and Grand, interview.
75    NATO 2022 Strategic, 6.
77    Maj. Gen. Karl Ford, interview by author, July 27, 2022.
78    Author’s notes from unclassified ACT brief “2021 NATO Warfighting Capstone Concept” to the Conference of National Armaments Directors (CNAD) in Partner Format, NATO Headquarters, Brussels, January 29, 2021.
79    NATO, “The Alliance’s Warfare Development Agenda: Achieving a 20-year Transformation,” March 29, 2022, https://www.act.nato.int/articles/wda-achieving-20-year-transformation; Ford, interview.
80    NATO 2022 Strategic, 5–7.
81    NATO, “Environment, Climate Change and Security,” last updated July 26, 2022,  https://www.nato.int/cps/en/natohq/topics_91048.htm.
82    Cioni, interview.
83    Ibid.
84    NATO, “NATO Sharpens.”
85    NATO 2022 Strategic, 7.
86    Brussels Summit Communiqué.
87    Van Weel, interview.
88    The CNAD and its seven Main Groups and over one hundred and fifty subordinate groups constitute NATO’s largest standing committee structure and one of its longest standing. The CNAD is supported by NATO’s DI Directorate. Collectively, the CNAD and DI Directorate are referred to as the NATO armaments community. See NATO, “Conference of National Armaments Directors (CNAD),” last updated January 17, 2023, https://www.nato.int/cps/en/natolive/topics_49160.htm.
89    NATO, “NATO Steps Up Engagement with Private Sector on Emerging Technologies,” last updated September 15, 2022, https://www.nato.int/cps/en/natohq/news_207258.htm.
90    Van Weel, interview.
91    Ibid.
92    NATO 2022 Strategic, 7, par. 24.
93    NATO, “Funding NATO,” last updated January 12, 2022, https://www.nato.int/cps/en/natohq/topics_67655.htm.
94    NATO, “Readiness Action Plan,” last updated September 1, 2022, https://www.nato.int/cps/en/natohq/topics_119353.htm; NATO, “NATO Wales Summit Guide,” Newport, September 4-5, 2014,  https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_publications/20141008_140108-summitguidewales2014-eng.pdf.
95    NATO, “NATO Wales Summit 2014,” last updated September 5, 2014, https://www.nato.int/cps/en/natohq/events_112136.htm.
96    NATO, “Deterrence and Defence,” last updated September 12, 2022, https://www.nato.int/cps/en/natohq/topics_133127.htm. See section on “Investing in defence.”
97    NATO 2022 Strategic.
98    NATO 2022 Strategic, 6, par. 22.
99    Comments on NATO’s common-funded capability development governance model and progress are based on the author’s personal experience in NATO from 2018 to 2021. In 2018, a new governance model for common-funded capability development was adopted which was intended to empower NATO’s strategic commands and agencies to drive capability development, introduce acceptable risk tolerance measures, streamline governance processes, and satisfy allies’ appetite for control and cost-efficiency. Expected outcomes have been underwhelming. Learning has been steep, adaptation difficult, and control difficult for nations to release. The new governance model also controls common funding for IT and services (including cybersecurity), which require upgrades and modernization at speeds beyond which NATO processes can keep up.
100    NATO Industrial Advisory Group (NIAG), “Industry Initiative for Agile Acquisition (I2A2),” February 15, 2021.
101    Rear Admiral John W. Tammen, “NATO’s Warfighting Capstone Concept: Anticipating the Changing Character of War,” NATO Review, July 9, 2021, https://www.nato.int/docu/review/articles/2021/07/09/natos-warfighting-capstone-concept-anticipating-the-changing-character-of-war/index.html.
102    Ibid.
103    NATO’s first ASG for Joint Intelligence and Security (JIS), Arndt Freytag von Loringhoven, noted the “ingrained tradition” of national civilian intelligence agencies to restrict intelligence sharing in a 2019 article at the end of his tenure. See Arndt Freytag von Loringhoven, “A New Era for NATO Intelligence,” NATO Review, October 29, 2019, https://www.nato.int/docu/review/articles/2019/10/29/a-new-era-for-nato-intelligence/index.html.
104    This is an uncomfortable truth acknowledged by current and past senior ACO intelligence officials (of which the author is one) and NATO’s first two ASGs for JIS: David Cattler and Arndt Freytag von Loringhoven. Maj. Gen. Matt Van Wagenen, interview by author, September 11, 2022; Stewart, interview; Cattler, interview; and Von Loringhoven, “A New Era.”
105    Despite numerous NATO consultations between 2014 and 2018 on the 9M729 or SSC-8 Russian missile (including when the author was an ACO presenter in 2014 and a NATO official in 2018), it was not until December 2018 that allies decided to unanimously endorse the US finding and presume the lack of an adequate Russian response as evidence of an Intermediate-Range Nuclear Forces (INF) Treaty violation. Several allies prior to late 2018 were not ready to take US declarations at face value without the primary source intelligence behind the US position. While the INF Treaty was between the United States and the Soviet Union, European allies were directly implicated because the treaty-limited ranges provided security from attack of prohibited weapon systems. See NATO, “NATO and the INF Treaty,” last updated August 2, 2019, https://www.nato.int/cps/en/natohq/topics_166100.htm.
106    Stewart, interview; Cattler, interview; and Cioni, interview.
107    Wheeler, interview and Criscuolo, interview.
108    Sally Cole, “CMOSS: Building-Block Architecture Bring Speed, Cost Benefits,” Military Embedded Systems, November 29, 2021, https://militaryembedded.com/comms/communications/cmoss-building-block-architecture-brings-speed-cost-benefits.
109    The following Atlantic Council report explains the importance of enterprise-wide digitalization to improve shared awareness, decision-making, and action. Jeffrey Reynolds and Jeffrey Lightfoot, Digitalize the Enterprise, Atlantic Council, October 20, 2020, https://www.atlanticcouncil.org/content-series/nato20-2020/digitalize-the-enterprise/.
110    Ford, interview.
111    Criscuolo, interview.
112    Ford, interview.
113    Per AJP-2.7, JISR architecture consists of the organizations, processes, and systems connecting collectors, databases, applications, producers, and consumers of intelligence and operational data in a joint environment. See NATO Standardization Office, NATO Standard, AJP 2.7, Allied Joint Doctrine for Joint Intelligence, Surveillance and Reconnaissance, Edition A, Version 1, July 11, 2016, 1–3,https://jadl.act.nato.int/ILIAS/data/testclient/lm_data/lm_152845/Linear/JISR04222102/sharedFiles/AJP27.pdf.
114    Architecture Capability Team, Consultation, Command & Control Board, NATO Architecture Framework, Version 4, NATO, January 2018, Document Version 2020.09, https://www.nato.int/nato_static_fl2014/assets/pdf/2021/1/pdf/NAFv4_2020.09.pdf.
115    Paul Savereux, interview by author, July 29, 2022, and NATO, “NATO Defence Planning Process,” last updated March 31, 2022, https://www.nato.int/cps/en/natohq/topics_49202.htm.
116    Fabrice Fontanier, chair of NIAG C4ISR Community of Interest, notes to author, September 17, 2022.
117    Robert Weaver, interview by author, March 11, 2022.
118    Ibid.
119    NATO, “NATO Exercises with New Maritime Unmanned Systems,” last updated September 15, 2022, https://www.nato.int/cps/en/natohq/news_207293.htm.
120    Ibid.
121    Stewart, interview and Cantwell, interview.
122    NATO’s AGS RQ-4Ds are equipped with MP-RTIP ground surveillance radar that provides ground moving target indicator and synthetic aperture radar imagery. See Wikipedia, “Multi-Platform Radar Technology Insertion Program,” accessed July 29, 2022, https://en.wikipedia.org/wiki/Multi-Platform_Radar_Technology_Insertion_Program#Overview. NATO’s AWACS E-3s have look-down radar that essentially collects MASINT. See “E-3 AWACS.”
123    NATO, “Command and Control Capability for Surface Based Air and Missile Defence for the Battalion and Brigade Level (GBAD C2 Layer),” Factsheet, February 2022, https://www.nato.int/nato_static_fl2014/assets/pdf/2021/10/pdf/2110-factsheet-gbad-c2-layer.pdf.
124    Military Wiki, “Tactical Data Link,” accessed September 1, 2022 https://military-history.fandom.com/wiki/Tactical_Data_Link#TDL_standards_in_NATO.
125    Harry Lye, “Fifth-Generation Aircraft Share Bi-Directional Data in Military IoT First,“ Airforce Technology, December 15, 2020, https://www.airforce-technology.com/news/fifth-generation-aircraft-share-bi-directional-data-in-military-iot-first/.
126    Fontanier, notes to author.
127    Ibid.
128    Commander Malte von Spreckelsen, “Electronic Warfare – The Forgotten Discipline,” Journal of the JAPCC 27 (2018), 41–45,  https://www.japcc.org/articles/electronic-warfare-the-forgotten-discipline/.
129    De Angelis et al., NATO ISTAR, 52; Von Spreckelsen, “Electronic Warfare”; and Major Erik Bamford and Commander Malte von Spreckelsen, “Future Command and Control of Electronic Warfare,” Journal of the JAPCC 28 (2019), 60–66,  https://www.japcc.org/articles/future-command-and-control-of-electronic-warfare/
130    NATO 2022 Strategic, 7.
131    Van Weel, interview.
132    NATO Support and Procurement Agency (NSPA) is already involved in major C4ISR programs like AFSC, AWACS, and AGS. NCIA focuses almost overwhelmingly on common-funded capabilities and services but could provide support to multinational and national capability development given its charter and expertise.
133    Based on ideas discussed between the author and Lt. Gen. Hans-Werner Wiermann in February 2021.
134    NATO, “Remarks by NATO Secretary General Jens Stoltenberg and US President Joe Biden at the start of the 2022 NATO Summit,” last updated June 29, 2022, https://www.nato.int/cps/en/natohq/opinions_197374.htm.
135    Katharina Buchholz, “Where NATO Defense Expenditure Stands in 2022 [Infographic],” Forbes, June 30, 2022, https://www.forbes.com/sites/katharinabuchholz/2022/06/30/where-nato-defense-expenditure-stands-in-2022-infographic.
136    Patrick Goodenough, “Only 9 Out of 30 Allies Are Meeting NATO’s Defense Spending Goal,” CNSNews, June 30, 2022, https://www.cnsnews.com/article/international/patrick-goodenough/only-9-out-30-allies-are-meeting-natos-defense-spending.

The post The future of NATO C4ISR: Assessment and recommendations after Madrid appeared first on Atlantic Council.

]]>